Rajeev Kumar | Babu Banarsidas University (original) (raw)
Papers by Rajeev Kumar
The apparent contradiction between usability and security has been discussed in the literature fo... more The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.
Computer Systems Science & Engineering, 2022
Any natural language may have dozens of accents. Even though the equivalent phonemic formation of... more Any natural language may have dozens of accents. Even though the equivalent phonemic formation of the word, if it is properly called in different accents, humans do have audio signals that are distinct from one another. Among the most common issues with speech, the processing is discrepancies in pronunciation, accent, and enunciation. This research study examines the issues of detecting, fixing, and summarising accent defects of average Arabic individuals in English-speaking speech. The article then discusses the key approaches and structure that will be utilized to address both accent flaws and pronunciation issues. The proposed SpeakCorrect computerized interface employs a cuttingedge speech recognition system and analyses pronunciation errors with a speech decoder. As a result, some of the most essential types of changes in pronunciation that are significant for speech recognition are performed, and accent defects defining such differences are presented. Consequently, the suggested technique increases the Speaker's accuracy. SpeakCorrect uses 100 h of phonetically prepared individuals to construct a pronunciation instruction repository. These prerecorded sets are used to train Hidden Markov Models (HMM) as well as weighted graph systems. Their speeches are quite clear and might be considered natural. The proposed interface is optimized for use with an integrated phonetic pronounced dataset, as well as for analyzing and identifying speech faults in Saudi and Egyptian dialects. The proposed interface detects, analyses, and assists English learners in correcting utterance faults, overcoming problems, and improving their pronunciations.
As software applications are becoming more compound and distributed, need for security is increas... more As software applications are becoming more compound and distributed, need for security is increasing in every field. With the increasing complexity software, developers are facing hard challenges in delivering software which fulfills customer's requirements but what if the software is not secure enough. It cannot be enough capable of handling the security threats and attacks in the real world. Hence, there is a need to focus on security, even now when customer's priority is having the secure software. In this paper software security is being focussed with the challenges which developer faces when employing it in software development. Software securities with its important terms are being discussed in this research. They are a generous of non-functional requirement, alongside with such characteristics as enactment and reliability, durability, availability. In this paper, there is a discussion about software security, security types, and its issues of upcoming threats of infor...
Computer Systems Science and Engineering, 2022
Journal of King Saud University - Computer and Information Sciences, 2019
Intelligent Automation & Soft Computing, 2022
Computers, Materials & Continua, 2022
The identification of an effective network which can efficiently meet the service requirements of... more The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are not taken into account. This article describes an intelligent computing technique based on Multiple-Criteria Decision-Making (MCDM) approach developed based on integrated Fuzzy AHP-TOPSIS which ensures flexible usability and maximizes the experience of end-users in miscellaneous wireless settings. In different components the handover need is assessed and the desired network is chosen. Further, fuzzy sets provide effective solutions to address decision making problems where experts counter uncertainty to make a decision. The proposed research endeavor will support designers and developers to identify, select and prioritize best attributes for ensuring flexible usability in miscellaneous wireless settings. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the usability and experience of end-users.
The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) di... more The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the World Health Organization (WHO) on March 11, 2020. COVID-19 has already affected more than 211 nations. In such a bleak scenario, it becomes imperative to analyze and identify those regions in Saudi Arabia that are at high risk. A preemptive study done in the context of predicting the possible COVID-19 hotspots would facilitate in the implementation of prompt and targeted countermeasures against SARS-CoV-2, thus saving many lives. Working towards this intent, the present study adopts a decision making based methodology of simulation named Analytical Hierarchy Process (AHP), a multi criteria decision making approach, for assessing the risk of COVID-19 in different regions of Saudi Arabia. AHP gives the ability to measure the risks numerically. Moreover, numerical assessments are always effective and easy to understand. Hence, this research endeavour employs Fuzzy based computational method of decision making for its empirical analysis. Findings in the proposed paper suggest that Riyadh and Makkah are the most susceptible regions, implying that if sustained and focused preventive measures are not introduced at the right juncture, the two cities could be the worst afflicted with the infection. The results obtained through Fuzzy based computational method of decision making are highly corroborative and would be very useful for categorizing and assessing the current COVID-19 situation in the Kingdom of Saudi Arabia. More specifically, identifying the cities that are likely to be COVID-19 hotspots would help the country's health and medical fraternity to reinforce intensive containment strategies to counter the ills of the pandemic in such regions.
Intelligent Automation & Soft Computing, 2022
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Lear... more The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years. Practitioners are developing a variety of tools, strategies, and approaches to solve healthcare data security concerns. The author has highlighted the crucial measurements and parameters in relation to enormous organizational circumstances for securing a vast amount of data in this paper. Security measures are those that prevent developers and organizations from achieving their objectives. The goal of this work is to identify and prioritize the security approaches that are used to locate and solve problems using different versions of two approaches that have been used to analyze big data security in the past. The Fuzzy Analytic Hierarchy Process (Fuzzy AHP) approach is being used by authors to examine the priorities and overall data security. In addition, the most important features in terms of weight have been quantitatively analyzed. Experts will discover the findings and conclusions useful in improving big data security.
Journal of King Saud University – Computer and Information Sciences, 2019
Indubitably, security is an integral aspect of the development of quality software. More importan... more Indubitably, security is an integral aspect of the development of quality software. More importantly,
usability is also an elemental and pivotal factor for developing quality software. In fact, it has been
noticed that most of the practitioners are trying to develop a highly secure design while maintaining high
usability. Unfortunately, the highly secure design of software becomes worthless because the usability of
software is very low. Further, usable security is in more demand due to the increasing usage of computers
with enhanced usability and need of security in it too. When improving the usability with security of software,
underlying security and usability attributes play an important role. For this reason, usable security
assessment employs security and usability attributes to achieve the desired security solutions with
usability. Different consecutive versions of two software have been taken in this work to assess usable
security. Authors are using Fuzzy-AHP methodology to assess the priorities and overall usablesecurity.
In addition, the impact of the security on usability and impact of the usability on security have
been evaluated quantitatively. The results obtained and conclusions are useful for practitioners to
improve usable-security of software.
Security has always been a vital research topic since the birth of software. A great deal of rese... more Security has always been a vital research topic since the birth of software. A great deal of research has been conducted to determine the ways for identifying and classifying the security issues or goals. In recent years, it has been noticed that high secure software has less usability and has loosed businesses continuity. Without using the services of software, high security becomes worthless. Hence, there is a need to bridge the gap between security and usability of software. Indeed, security mechanisms must be usable to improve the security as well as the usability of software. Although security and usability are not directly related, some of their attributes impact each other indirectly. Attributes play a key role in bridging the gap between security and usability. In this respect, this paper identifies the main factors of security and usability that affect each other directly and indirectly, including confidentiality, integrity and availability and effectiveness, efficiency, and satisfaction. The importance of each attribute in terms of their weight is essential for their impact on the overall security design during the software development process. To evaluate our work, we used the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). The obtained results and conclusions are useful to software developers to achieve more secure and usable software.
During the software development process, selection of most appropriate attribute is the fundament... more During the software development process, selection of most appropriate attribute is the fundamental challenge for security design. To fulfill the security requirements specifications of software, selection procedure of security attributes plays a key role. Hence, selection of security attributes is a multi-criteria decision making problem. This article investigates the basic security attributes and assesses the priority through fuzzy-Delphi analytical hierarchy process method. Five most appropriate attributes have been taken from review of literature and best practices. The hybrid technique of fuzzy-Delphi and AHP helps software developers to decide the ranks of suitable security attributes in a consistent way. Further, the results may be helpful for developers to facilitate the security attributes during software development.
— Security is a significant issue in software engineering that is receiving vast attention from a... more — Security is a significant issue in software engineering that is receiving vast attention from academic and IT industry. In addition, due to huge investment in secure software development, durability of security is in much demand. However, selecting the right model for software development is becoming more challenging for developers day by day. Security durability attributes play vital role while designing security during software development. Each attribute has its own importance while integrating durable security during early stage of software development life cycle. This is based upon user's demand and sensitivity of information. Hence, developers need to know about the importance of each attribute when they are developing software to fulfill user's demand. In this paper, authors have proposed an approach for prioritization of these attributes using Fuzzy Analytic Hierarchy Process (Fuzzy AHP method). Literature survey reveals that the key attributes of durable security are Trustworthiness, Dependability and Human Trust. This will help developers to improve the security for longer.
In these days, use of software as services is becoming essential for user's. For improving the bu... more In these days, use of software as services is becoming essential for user's. For improving the business continuity of secure software, durability plays a important role in development of software in real scenario. Durability is predicted service life of a software. That's why in these days developers are focusing to solve the problem of secure software design for enhancing the durable service life of software. With the help of service oriented design, developers may be enhance the durability of secure software. In this paper, the relationship between durability and service-oriented design is proposed. To achieve durability, a framework is also proposed which should helpful to developers to develop a durable and secure software.
Prioritization of security risks plays an important role in helping software developers to focus ... more Prioritization of security risks plays an important role in helping software developers to focus on fulfilling security with durability.
Practices shows that the software quality is not that high as it could be. Development organizati... more Practices shows that the software quality is not that high as it could be. Development organizations spend a relatively large amount of money and effort on fixing quality issues during late stage development of software. One of the qualities of software that has received significant attention in recent years is durable serviceability. Software with poor durability is likely to fail in a highly competitive market; therefore, software developing organizations are paying more attention towards ensuring the durability of their software. To be able to develop durable software cost-effectively, there is a need to investigate the connection between durability characteristics and software. In software engineering, durability depends on four characteristics mainly; i.e. trustworthiness, human trust, dependability and usability of software. To address the relationship between these characteristics, software designers analyze the durability requirements which may need to be implemented to fulfill these specific requirements of software serviceability. The main objective of this article is to gain an in-depth understanding of the relationship between software and durability characteristics.
As software applications are becoming more compound and distributed, need for security is increas... more As software applications are becoming more compound and distributed, need for security is increasing in every field. With the increasing complexity software, developers are facing hard challenges in delivering software which fulfills customer's requirements but what if the software is not secure enough. It cannot be enough capable of handling the security threats and attacks in the real world. Hence, there is a need to focus on security, even now when customer's priority is having the secure software. In this paper software security is being focussed with the challenges which developer faces when employing it in software development. Software securities with its important terms are being discussed in this research. They are a generous of non-functional requirement, alongside with such characteristics as enactment and reliability, durability, availability. In this paper, there is a discussion about software security, security types, and its issues of upcoming threats of information technology territory and security contributions. This paper also describes challenges, problems of security in recent years.
Different surveys point toward that over the past several years’ software security has raised its... more Different surveys point toward that over the past several years’ software security has raised its precedence for many software organizations. Software security testing is upgraded with the help of security attributes, security models, testing tools and most importantly test case used in testing. Software security testing was once considered a technical obligation performed by software developers. At that time, software security was much important during the test phase of software development life cycle. Present time an emergent number of security incidents and a growing awareness among business owners about invalidated software due to security issues have moved security testing into software world of testers. It is often impossible to find all the errors in a program. This basics problem in testing thus arise an open question, as to what would be the policy that we would adopt for testing. Thus now security testing is important in each phase of development life cycle. Here is a proposed framework is finalized for that security testing.
Securing software is a never ending process. In this world approximately eighty-fi ve percent per... more Securing software is a never ending
process. In this world approximately
eighty-fi ve percent persons are connected
to each other via PCs, laptops or
mobiles. This much of communication
and data sharing produces insecurity of
information. Hence organizations need
for much higher levels of security. Security
with less maintenance is their demand.
Actually organizations mainly focus on
cost eff ective security achievements
which is achieved using durable security.
Enhancing security via durability is not an
easy process but also very complex with
some limitations. This research work can
be used in durability as a security factor
which gives a new methodology for
developing secure software. In this article,
how durability is achieved is shown, while developing security of software.
Developing a quality product will lead to
a secure product on which user can trust.
The apparent contradiction between usability and security has been discussed in the literature fo... more The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solutionindependent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.
Computer Systems Science & Engineering, 2022
Any natural language may have dozens of accents. Even though the equivalent phonemic formation of... more Any natural language may have dozens of accents. Even though the equivalent phonemic formation of the word, if it is properly called in different accents, humans do have audio signals that are distinct from one another. Among the most common issues with speech, the processing is discrepancies in pronunciation, accent, and enunciation. This research study examines the issues of detecting, fixing, and summarising accent defects of average Arabic individuals in English-speaking speech. The article then discusses the key approaches and structure that will be utilized to address both accent flaws and pronunciation issues. The proposed SpeakCorrect computerized interface employs a cuttingedge speech recognition system and analyses pronunciation errors with a speech decoder. As a result, some of the most essential types of changes in pronunciation that are significant for speech recognition are performed, and accent defects defining such differences are presented. Consequently, the suggested technique increases the Speaker's accuracy. SpeakCorrect uses 100 h of phonetically prepared individuals to construct a pronunciation instruction repository. These prerecorded sets are used to train Hidden Markov Models (HMM) as well as weighted graph systems. Their speeches are quite clear and might be considered natural. The proposed interface is optimized for use with an integrated phonetic pronounced dataset, as well as for analyzing and identifying speech faults in Saudi and Egyptian dialects. The proposed interface detects, analyses, and assists English learners in correcting utterance faults, overcoming problems, and improving their pronunciations.
As software applications are becoming more compound and distributed, need for security is increas... more As software applications are becoming more compound and distributed, need for security is increasing in every field. With the increasing complexity software, developers are facing hard challenges in delivering software which fulfills customer's requirements but what if the software is not secure enough. It cannot be enough capable of handling the security threats and attacks in the real world. Hence, there is a need to focus on security, even now when customer's priority is having the secure software. In this paper software security is being focussed with the challenges which developer faces when employing it in software development. Software securities with its important terms are being discussed in this research. They are a generous of non-functional requirement, alongside with such characteristics as enactment and reliability, durability, availability. In this paper, there is a discussion about software security, security types, and its issues of upcoming threats of infor...
Computer Systems Science and Engineering, 2022
Journal of King Saud University - Computer and Information Sciences, 2019
Intelligent Automation & Soft Computing, 2022
Computers, Materials & Continua, 2022
The identification of an effective network which can efficiently meet the service requirements of... more The identification of an effective network which can efficiently meet the service requirements of the target, while maintaining ultimate performance at an increased level is significant and challenging in a fully interconnected wireless medium. The wrong selection can contribute to unwanted situations like frustrated users, slow service, traffic congestion issues, missed and/or interrupted calls, and wastefulness of precious network components. Conventional schemes estimate the handoff need and cause the network screening process by a single metric. The strategies are not effective enough because traffic characteristics, user expectations, network terminology and other essential device metrics are not taken into account. This article describes an intelligent computing technique based on Multiple-Criteria Decision-Making (MCDM) approach developed based on integrated Fuzzy AHP-TOPSIS which ensures flexible usability and maximizes the experience of end-users in miscellaneous wireless settings. In different components the handover need is assessed and the desired network is chosen. Further, fuzzy sets provide effective solutions to address decision making problems where experts counter uncertainty to make a decision. The proposed research endeavor will support designers and developers to identify, select and prioritize best attributes for ensuring flexible usability in miscellaneous wireless settings. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the usability and experience of end-users.
The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) di... more The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the World Health Organization (WHO) on March 11, 2020. COVID-19 has already affected more than 211 nations. In such a bleak scenario, it becomes imperative to analyze and identify those regions in Saudi Arabia that are at high risk. A preemptive study done in the context of predicting the possible COVID-19 hotspots would facilitate in the implementation of prompt and targeted countermeasures against SARS-CoV-2, thus saving many lives. Working towards this intent, the present study adopts a decision making based methodology of simulation named Analytical Hierarchy Process (AHP), a multi criteria decision making approach, for assessing the risk of COVID-19 in different regions of Saudi Arabia. AHP gives the ability to measure the risks numerically. Moreover, numerical assessments are always effective and easy to understand. Hence, this research endeavour employs Fuzzy based computational method of decision making for its empirical analysis. Findings in the proposed paper suggest that Riyadh and Makkah are the most susceptible regions, implying that if sustained and focused preventive measures are not introduced at the right juncture, the two cities could be the worst afflicted with the infection. The results obtained through Fuzzy based computational method of decision making are highly corroborative and would be very useful for categorizing and assessing the current COVID-19 situation in the Kingdom of Saudi Arabia. More specifically, identifying the cities that are likely to be COVID-19 hotspots would help the country's health and medical fraternity to reinforce intensive containment strategies to counter the ills of the pandemic in such regions.
Intelligent Automation & Soft Computing, 2022
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Lear... more The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years. Practitioners are developing a variety of tools, strategies, and approaches to solve healthcare data security concerns. The author has highlighted the crucial measurements and parameters in relation to enormous organizational circumstances for securing a vast amount of data in this paper. Security measures are those that prevent developers and organizations from achieving their objectives. The goal of this work is to identify and prioritize the security approaches that are used to locate and solve problems using different versions of two approaches that have been used to analyze big data security in the past. The Fuzzy Analytic Hierarchy Process (Fuzzy AHP) approach is being used by authors to examine the priorities and overall data security. In addition, the most important features in terms of weight have been quantitatively analyzed. Experts will discover the findings and conclusions useful in improving big data security.
Journal of King Saud University – Computer and Information Sciences, 2019
Indubitably, security is an integral aspect of the development of quality software. More importan... more Indubitably, security is an integral aspect of the development of quality software. More importantly,
usability is also an elemental and pivotal factor for developing quality software. In fact, it has been
noticed that most of the practitioners are trying to develop a highly secure design while maintaining high
usability. Unfortunately, the highly secure design of software becomes worthless because the usability of
software is very low. Further, usable security is in more demand due to the increasing usage of computers
with enhanced usability and need of security in it too. When improving the usability with security of software,
underlying security and usability attributes play an important role. For this reason, usable security
assessment employs security and usability attributes to achieve the desired security solutions with
usability. Different consecutive versions of two software have been taken in this work to assess usable
security. Authors are using Fuzzy-AHP methodology to assess the priorities and overall usablesecurity.
In addition, the impact of the security on usability and impact of the usability on security have
been evaluated quantitatively. The results obtained and conclusions are useful for practitioners to
improve usable-security of software.
Security has always been a vital research topic since the birth of software. A great deal of rese... more Security has always been a vital research topic since the birth of software. A great deal of research has been conducted to determine the ways for identifying and classifying the security issues or goals. In recent years, it has been noticed that high secure software has less usability and has loosed businesses continuity. Without using the services of software, high security becomes worthless. Hence, there is a need to bridge the gap between security and usability of software. Indeed, security mechanisms must be usable to improve the security as well as the usability of software. Although security and usability are not directly related, some of their attributes impact each other indirectly. Attributes play a key role in bridging the gap between security and usability. In this respect, this paper identifies the main factors of security and usability that affect each other directly and indirectly, including confidentiality, integrity and availability and effectiveness, efficiency, and satisfaction. The importance of each attribute in terms of their weight is essential for their impact on the overall security design during the software development process. To evaluate our work, we used the Fuzzy Analytic Hierarchy Process (Fuzzy AHP). The obtained results and conclusions are useful to software developers to achieve more secure and usable software.
During the software development process, selection of most appropriate attribute is the fundament... more During the software development process, selection of most appropriate attribute is the fundamental challenge for security design. To fulfill the security requirements specifications of software, selection procedure of security attributes plays a key role. Hence, selection of security attributes is a multi-criteria decision making problem. This article investigates the basic security attributes and assesses the priority through fuzzy-Delphi analytical hierarchy process method. Five most appropriate attributes have been taken from review of literature and best practices. The hybrid technique of fuzzy-Delphi and AHP helps software developers to decide the ranks of suitable security attributes in a consistent way. Further, the results may be helpful for developers to facilitate the security attributes during software development.
— Security is a significant issue in software engineering that is receiving vast attention from a... more — Security is a significant issue in software engineering that is receiving vast attention from academic and IT industry. In addition, due to huge investment in secure software development, durability of security is in much demand. However, selecting the right model for software development is becoming more challenging for developers day by day. Security durability attributes play vital role while designing security during software development. Each attribute has its own importance while integrating durable security during early stage of software development life cycle. This is based upon user's demand and sensitivity of information. Hence, developers need to know about the importance of each attribute when they are developing software to fulfill user's demand. In this paper, authors have proposed an approach for prioritization of these attributes using Fuzzy Analytic Hierarchy Process (Fuzzy AHP method). Literature survey reveals that the key attributes of durable security are Trustworthiness, Dependability and Human Trust. This will help developers to improve the security for longer.
In these days, use of software as services is becoming essential for user's. For improving the bu... more In these days, use of software as services is becoming essential for user's. For improving the business continuity of secure software, durability plays a important role in development of software in real scenario. Durability is predicted service life of a software. That's why in these days developers are focusing to solve the problem of secure software design for enhancing the durable service life of software. With the help of service oriented design, developers may be enhance the durability of secure software. In this paper, the relationship between durability and service-oriented design is proposed. To achieve durability, a framework is also proposed which should helpful to developers to develop a durable and secure software.
Prioritization of security risks plays an important role in helping software developers to focus ... more Prioritization of security risks plays an important role in helping software developers to focus on fulfilling security with durability.
Practices shows that the software quality is not that high as it could be. Development organizati... more Practices shows that the software quality is not that high as it could be. Development organizations spend a relatively large amount of money and effort on fixing quality issues during late stage development of software. One of the qualities of software that has received significant attention in recent years is durable serviceability. Software with poor durability is likely to fail in a highly competitive market; therefore, software developing organizations are paying more attention towards ensuring the durability of their software. To be able to develop durable software cost-effectively, there is a need to investigate the connection between durability characteristics and software. In software engineering, durability depends on four characteristics mainly; i.e. trustworthiness, human trust, dependability and usability of software. To address the relationship between these characteristics, software designers analyze the durability requirements which may need to be implemented to fulfill these specific requirements of software serviceability. The main objective of this article is to gain an in-depth understanding of the relationship between software and durability characteristics.
As software applications are becoming more compound and distributed, need for security is increas... more As software applications are becoming more compound and distributed, need for security is increasing in every field. With the increasing complexity software, developers are facing hard challenges in delivering software which fulfills customer's requirements but what if the software is not secure enough. It cannot be enough capable of handling the security threats and attacks in the real world. Hence, there is a need to focus on security, even now when customer's priority is having the secure software. In this paper software security is being focussed with the challenges which developer faces when employing it in software development. Software securities with its important terms are being discussed in this research. They are a generous of non-functional requirement, alongside with such characteristics as enactment and reliability, durability, availability. In this paper, there is a discussion about software security, security types, and its issues of upcoming threats of information technology territory and security contributions. This paper also describes challenges, problems of security in recent years.
Different surveys point toward that over the past several years’ software security has raised its... more Different surveys point toward that over the past several years’ software security has raised its precedence for many software organizations. Software security testing is upgraded with the help of security attributes, security models, testing tools and most importantly test case used in testing. Software security testing was once considered a technical obligation performed by software developers. At that time, software security was much important during the test phase of software development life cycle. Present time an emergent number of security incidents and a growing awareness among business owners about invalidated software due to security issues have moved security testing into software world of testers. It is often impossible to find all the errors in a program. This basics problem in testing thus arise an open question, as to what would be the policy that we would adopt for testing. Thus now security testing is important in each phase of development life cycle. Here is a proposed framework is finalized for that security testing.
Securing software is a never ending process. In this world approximately eighty-fi ve percent per... more Securing software is a never ending
process. In this world approximately
eighty-fi ve percent persons are connected
to each other via PCs, laptops or
mobiles. This much of communication
and data sharing produces insecurity of
information. Hence organizations need
for much higher levels of security. Security
with less maintenance is their demand.
Actually organizations mainly focus on
cost eff ective security achievements
which is achieved using durable security.
Enhancing security via durability is not an
easy process but also very complex with
some limitations. This research work can
be used in durability as a security factor
which gives a new methodology for
developing secure software. In this article,
how durability is achieved is shown, while developing security of software.
Developing a quality product will lead to
a secure product on which user can trust.
Security is a significant issue in software engineering that is receiving vast attention from aca... more Security is a significant issue in software engineering that is receiving vast attention from academic and IT industry. In addition, due to huge investment in secure software development, durability of security is in much demand. However, selecting the right model for software development is becoming more challenging for developers day by day. Security durability attributes play vital role while designing security during software development. Each attribute has its own importance while integrating durable security during early stage of software development life cycle. This is based upon user's demand and sensitivity of information. Hence, developers need to know about the importance of each attribute when they are developing software to fulfill user's demand. In this paper, authors have proposed an approach for prioritization of these attributes using Fuzzy Analytic Hierarchy Process (Fuzzy AHP method). Literature survey reveals that the key attributes of durable security are Trustworthiness, Dependability and Human Trust. This will help developers to improve the security for longer.