IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Toward an Integrative Model of Application-Software Security

Toward an Integrative Model of Application-Software Security
View Sample PDF
Author(s): Vijay V. Raghavan (Northern Kentucky University, USA)
Copyright: 2003
Pages: 7
Source title: Practicing Software Engineering in the 21st Century
Source Author(s)/Editor(s): Scott J. Lloyd (University of Rhode Island, USA)and Joan Peckham (University of Rhode Island, USA)
DOI: 10.4018/978-1-93177-750-6.ch011

Purchase

View Toward an Integrative Model of Application-Software Security on the publisher's website for pricing and purchasing information.

Abstract

Populist approaches to studying information systems security include architectural, infrastructure-related and system-level security. This study focuses on software security implemented and monitored during systems development and implementation stages. Moving away from the past checklist methods of studying software security, this study provides a model that could be used in categorizing checklists into meaningful clusters. Many constructs, such as principle of least privilege, execution monitoring, social engineering and formalism and pragmatism in security implementations, are identified in the model. The identification of useful constructs to study can form the basis of evaluating security in software systems as well as provide guidelines of implementing security in new systems developed.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom