Object Oriented Software Security in Design Phase

Object oriented design and development has become popular in today’s software development environment. As development of object oriented software is raising security problem is also increasing. The software security focuses on the effort and cost spent in lateral phases is much greater than the initial phase of software development process. It is understandable that most of the software is not well designed with respect to security concern. Therefore, to secure the software after deployment is not only costlier but difficult too. The aim of the paper is to study better way of design consideration to secure the object oriented software and discuss the tools which are required for the secure software development. This paper will provide an opportunity to understand the requirement for developing a technique at design phase.

[1]  Juyang Weng,et al.  State-based SHOSLIF for indoor visual navigation , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[2]  Barry Boehm,et al.  Top 10 list [software development] , 2001 .

[3]  A. Opdahl,et al.  A Reuse-Based Approach to Determining Secur ity Requirements , 2003 .

[4]  B. Boehm Defect Reduction Top 10 List , 2001 .

[5]  Mohammad Ubaidullah Bokhari,et al.  Metrics for Requirements Engineering and Automated Requirements Tools , 2011 .

[6]  Andreas L. Opdahl,et al.  Eliciting security requirements with misuse cases , 2004, Requirements Engineering.

[7]  Issam Dagher,et al.  Face recognition using IPCA-ICA algorithm , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Hiroshi Murase,et al.  Learning and recognition of 3D objects from appearance , 1993, [1993] Proceedings IEEE Workshop on Qualitative Vision.

[9]  Mohammad Ubaidullah Bokhari,et al.  A Comparative Study of Software Requirements Tools for Secure Software Development , 2009 .

[10]  Paul Clements,et al.  Software Architecture in Practice (Second Edition) , 2011 .

[11]  Jan Jürjens Using UMLsec and goal trees for secure systems development , 2002, SAC '02.

[12]  David A. Wagner,et al.  MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.

[13]  Brian Henderson-Sellers,et al.  Object-Oriented Metrics , 1993, TOOLS.

[14]  Baowen Xu,et al.  Software maintainability improvement: integrating standards and models , 2002, Proceedings 26th Annual International Computer Software and Applications.

[15]  Hiroshi Murase,et al.  Visual learning and recognition of 3-d objects from appearance , 2005, International Journal of Computer Vision.

[16]  Eugene H. Spafford,et al.  Software vulnerability analysis , 1998 .

[17]  FrazerKen Building secure software , 2002 .

[18]  Gerrit Muller How to Create an Architecture Overview , 2013 .

[19]  Premkumar T. Devanbu,et al.  Software engineering for security: a roadmap , 2000, ICSE '00.

[20]  Yuntao Cui,et al.  Appearance-Based Hand Sign Recognition from Intensity Image Sequences , 2000, Comput. Vis. Image Underst..

[21]  Stephen H. Kan,et al.  Metrics and Models in Software Quality Engineering , 1994, SOEN.

[22]  Murugiah P. Souppaya,et al.  Guideline on Network Security Testing , 2003 .

[23]  Paul Clements,et al.  Software architecture in practice , 1999, SEI series in software engineering.