CFP last date
20 May 2024
Reseach Article

Article:Securing Object Oriented Design: A Complexity Perspective

by Suhel Ahmad Khan, Dr. Raees Ahmad Khan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 13
Year of Publication: 2010
Authors: Suhel Ahmad Khan, Dr. Raees Ahmad Khan
10.5120/1309-1735

Suhel Ahmad Khan, Dr. Raees Ahmad Khan . Article:Securing Object Oriented Design: A Complexity Perspective. International Journal of Computer Applications. 8, 13 ( October 2010), 8-12. DOI=10.5120/1309-1735

@article{ 10.5120/1309-1735,
author = { Suhel Ahmad Khan, Dr. Raees Ahmad Khan },
title = { Article:Securing Object Oriented Design: A Complexity Perspective },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 13 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number13/1309-1735/ },
doi = { 10.5120/1309-1735 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:57:15.903586+05:30
%A Suhel Ahmad Khan
%A Dr. Raees Ahmad Khan
%T Article:Securing Object Oriented Design: A Complexity Perspective
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 13
%P 8-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security breaches are responsible for not only financial loss but affect the trustworthiness and integrity of the software design and development industry. The breaches are directly affecting the security attributes like Privacy, Availability, Confidentiality, Authorization, Authentication, and Integrity. The aim of security at design level is to protect software to any damage done to the security attributes. Complexity is one of the major factor affect the security. One way of security improvement is a proper control of complexity factor related to security attributes.

References
  1. Miller, G. March 1956. The Magical Number Seven, Plus or Minus Two: Some Limits on Our capacity for Processing Information. The Psychological Review vol. 63(2), p 86
  2. Greedy Booch ,Object Oriented Analysis and Design with Application,.. 3rd edition, Addison Wesley ISBN-0-201-89551-X
  3. Davis N., Humphrey w. Redwine S.T.Jr. Zibulski, G.Magraw,Processes, May-June 2004, for producing secure software Security & Privacy, IEEE Volume 2,Issue 3, Page(s):18-25
  4. Stephen T. Albin ,The Art of Software Architecture: Design Methods and Techniques ,John Wiley &Sons © 2003 ISBN: 0471228869
  5. Shyam R. Chidember, Chris F. Kemerer, OOPSLA’91 Towards A Metric Suite for Object Oriented Design, ACM, pp.197-211
  6. Per Hakon Meland, Jostine Jenesen, ARES.2008,Secure Software Design in Practice,.28,0-7695-3102-4/08 © IEEE
  7. Dr.R.A.Khan, Suhel Ahmad khan, A Roadmap for Security, June 2010 , International Journal of Computer Science & Emerging Technologies (IJCSET) 5 Volume 1 Issue 1, June 2010,(pp:5-8)
  8. Terry V. Benzal, Cynthiya E. Irvine ,Paul c. Clark, Design Principles for Security, Secure code Technical Report ISI-TR-605,
  9. Wang, C. and W.A., Wulf, 1997, A framework for security measurement.. Proceedings of National Information Systems Security Conference, Oct. 7-10, Baltimore, pp: 522-533.
  10. Bharat B. Madan, Trivedi, Dependable systems and networks DNS’02, Modelling and Quantification of Security Attributes of Software Systems, , 0-7695-1597-5/02© 2002 IEEE
  11. http://www.askwebhosting.com/article/129/Computer_privacy.html,
  12. Li Gong , June, 1993, Increasing Availability and Security of an Authentication Services, , IEEE Journal, vol.11,No 5, ,pp 657-662.
  13. G,H. Walton,Thomas A. Longstaff, r.C. Linder,97, Computational Evaluation of Software Security Attributes, 8-0-7695-3450-3/09 © IEEE.
  14. http://msdn.microsoft.com/en-us/library/eeyk640h.aspx
  15. Clifford J. Berg, , High-Assurance Design: Architecting Secure and Reliable Enterprise Application Addison Wesley Professional,2005, ISBN: 0-321-37577-7
Index Terms

Computer Science
Information Sciences

Keywords

Security Privacy Availability Integrity Decomposition Coupling Function Complexity