Open Access   Article Go Back

Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process

Surabhi Saxena1 , Devendra Agarwal2

  1. Department of Computer Application, Babu Banarasi Das University (BBDU ), Lucknow (U.P.)India.
  2. Department of Computer Science, Babu Banarasi Das University (BBDU), Lucknow (U.P.) India.

Correspondence should be addressed to: saxenasurabhi1987@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-1 , Page no. 361-365, Jan-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i1.361365

Online published on Jan 31, 2018

Copyright © Surabhi Saxena, Devendra Agarwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Surabhi Saxena, Devendra Agarwal, “Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.361-365, 2018.

MLA Style Citation: Surabhi Saxena, Devendra Agarwal "Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process." International Journal of Computer Sciences and Engineering 6.1 (2018): 361-365.

APA Style Citation: Surabhi Saxena, Devendra Agarwal, (2018). Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process. International Journal of Computer Sciences and Engineering, 6(1), 361-365.

BibTex Style Citation:
@article{Saxena_2018,
author = {Surabhi Saxena, Devendra Agarwal},
title = {Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {361-365},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1685},
doi = {https://doi.org/10.26438/ijcse/v6i1.361365}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.361365}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1685
TI - Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process
T2 - International Journal of Computer Sciences and Engineering
AU - Surabhi Saxena, Devendra Agarwal
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 361-365
IS - 1
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1053 473 downloads 309 downloads
  
  
           

Abstract

Building high secured software components is very important for component-based software projects. The confidentiality of software is one of the important factors determining the security of components. Estimating confidentiality near the beginning in the software development life cycle, particularly at design phase, may help the designers to integrate required highly secured for improving overall security of the developed software. In this paper researcher introduced a metric based model “Confidentiality Assessment Model (CAMOOD)”. This model measure the confidentiality induced by the use of various object-oriented design concepts like data hiding, aggregation, inheritance, coupling and cohesion. Herein, we compared our measurement results with various contributions.

Key-Words / Index Term

Software E-Security, Confidentiality, Security Factors

References

[1]. S. Chandra & R. A. Khan, “A Methodology to Check Confidentiality of a Class Hierarchy”, Elsevier, Vol. 10, Issue 3, 2010.
[2]. Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Asoke K Talukder, Alwyn Roshan Pais, “Suraksha: A Security Designers’ Workbench”, presented in Hack.in 2009, IIT Kanpur, India, 17-19 March 2009.
[3]. I. Chowdhury, B. Chan, and M. Zulkernine, "Security metrics for source code structures," in Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems Leipzig, Germany: ACM, 2008.
[4]. A. Mishra, D. Agarwal and M. H. Khan, “Integrity Estimation Model: Fault Perspective”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol 5, Issue 5, pp 1246-1249, May 2017.
[5]. Bharat B. Madan, Katerina Goˇseva-Popstojanova, Kalyanaraman Vaidyanathan and Kishor S. Trivedi “Modeling and Quantification of Security Attributes of Software Systems”, Proceedings of the International Conference on Dependable Systems and Networks (DSN’02), IEEE, 2002, pp: 505-514.
[6]. Danijel et. al., “Software Fault Prediction Metrics:A Systematic Literature Review”, ACM, 2013.
[7]. Soham H. “Security Metric for Object Oriented Class Design- Result Analysis”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013.
[8]. Dr. Linda Rogenberg, Dinnis Brennan, “Principle Components of Orthogonal Object Oriented Metrics (323-08-14)”, White Paper Analyzing Results of NASA Object oriented Data, Oct 2001.
[9]. Raees Ahmad Khan, “Security Improvement of Object Oriented Design using Refactoring Rules”, I.J. Modern Education and Computer Science, 2015
[10]. Finding Accessibility and Interaction vulnerability of Rational Rose Class Design Using Design Metrics Soham H. Gandhi, D. R. Anekar, Mahevash A. Shaikh, Ajinkya A. Salunkhe.
[11]. Ubaidull et. al., “Security Requirement for Software Quality - A Survey of Engineering Discipline”, International Journal of ICT and Management, 2014.
[12]. Shazia Yasin, Khalid Haseeb, "Cryptography Based E-Commerce Security: A Review". IJCSI-Vol. 9, Issue 2, No 1, March 2012.
[13]. Shalini Chandra, “Availability state transition model”, ACM SIGSOFT Software Engineering Notes • May 2011
[14]. Randy C. Marchany, Joseph G. Tront, "E-Commerce Security Issues"Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.
[15]. A. Mishra, D. Agarwal and M. H. Khan, “Confidentiality Estimation Model: Fault Perspective” International Journal of Advanced Research in Computer Science (IJARCS), Volume.8 Issue. 4, June 2017.
[16]. Steve Counsell, Stephen Swift, Jason Crampton “The interpretation and Utility of Three Cohesion Metrics for Object – Oriented Design” (ACM Transactions on SE & Methodology, Vol. 15, No. 2, April 2006.
[17]. P.Nikhat, S. Kumar and M. H. Khan, “Model to Quantify Integrity at Requirement Phase”, Indian Journal of Science and Technology, Vol. 9, Aug 2016.
[18]. Amjan Shaik, “Statistical Analysis For Object Oriented Design Software Security Metrics”, International Journal of Engineering Science and Technology Vol. 2(5), 2010
[19]. Suhel Ahmad Khan, “Confidentiality Quantification Model at Design Phase”, International Journal of Information and Education Technology, Vol. 2, No. 5, October 2012.
[20]. M. Jureczko & L. Madeyski, “Towards identifying software project clusters with regard to defect prediction”, IEEE, 2010.
[21]. Leslie Lamport, Password Authentication with Insecure Communication. Technical Note. Communication of the ACM, 1981.