IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Software Security Engineering – Part II: Security Policy, Analysis, and Design

Software Security Engineering – Part II: Security Policy, Analysis, and Design
View Sample PDF
Author(s): Issa Traore (University of Victoria, Canada)and Isaac Woungang (Ryerson University, Canada)
Copyright: 2015
Pages: 30
Source title: Standards and Standardization: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8111-8.ch023

Purchase

View Software Security Engineering – Part II: Security Policy, Analysis, and Design on the publisher's website for pricing and purchasing information.

Abstract

This chapter explains the major objectives of a security policy, with focus on how applications that can protect data at all access points can be developed. Access control models and their known issues are discussed. From a security policy prospective, the security design principles and modeling using the UML are also discussed. In addition, an informal discussion on potential software security metrics that can be used for security measurement, and that are currently the purpose of active research, is conducted. Finally, a discussion on security testing involving the use of these metrics, are discussed. Several examples are used to illustrate the studied concepts.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom