Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
Software development is a field which is filled with different types of risks. In nowdays, secure software development is very difficult task. Security risk mitigation is the activity which aims to identify and clear most of the security threats before it
- PDF / 195,531 Bytes
- 10 Pages / 439.37 x 666.142 pts Page_size
- 64 Downloads / 280 Views
Abstract Software development is a field which is filled with different types of risks. In nowdays, secure software development is very difficult task. Security risk mitigation is the activity which aims to identify and clear most of the security threats before it could harm the system software. This paper is focusing on identifying and mitigating security risks which are affect the duration of secure software after development. A hierarchical structure of durability risk factors with respect to security in software development is established. This paper aims to apply Fuzzy Analytic Hierarchy Process (FAHP) during the pre-negotiation stage to identify security risks factor. This paper aims to apply Fuzzy Analytic Hierarchy Process (FAHP) during the prenegotiation stage to identify security risks for better assessment. With the help of this prioritization, it may be helpful to developers for better management performance at late stage of development life cycle. After applying this prioritization, organizations might improve longevity of secure software. Keywords Software security serviceability
Software durability
Security risks
Secure
1 Introduction The emergence of software durability introduces new options for small medium initiatives, as well as the industry begins to generate decent sales and exploration of latest marketing techniques [1–3]. The long lasting program has evolved the best R. Kumar (&) R.A. Khan Department of Information Technology, Babasaheb Bhimrao Ambedkar Central University, Lucknow, Uttar Pradesh 226025, India e-mail: [email protected] R.A. Khan e-mail: [email protected] S.A. Khan Department of Computer Application, Integral University, Lucknow, Uttar Pradesh 226026, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2017 N. Modi et al. (eds.), Proceedings of International Conference on Communication and Networks, Advances in Intelligent Systems and Computing 508, DOI 10.1007/978-981-10-2750-5_49
469
470
R. Kumar et al.
way how the application is bought and furnished in an awfully cost-effective way. Apart from pushing corporate business to the subsequent level of progress, durability also has strong talents in the schooling sector especially in terms of constructing a flexible environment [4–8]. There are so many proposed methods for using multi-standards choice-making methodology by using AHP, so one can enable the prioritization of safety dangers. Also, there has been a sufficient of study that combines fuzzy logic and safety, which is a general approach of combining ambiguous range into the decision-making approach, with analytic hierarchy procedure for safety threat comparison [9–11]. Those threat assessment ways are largely applied to multiple fields corresponding to prioritization of protection causes. Lots of the FAHP approaches advocate each and every safety chance aspect in a framework is joined as a fuzzy measure, which is a combination of the probability and related results of data [12, 13]. For increasing software services this paper is usin
Data Loading...