Toward an Integrative Model of Application-Software Security

Toward an Integrative Model of Application-Software Security

Vijay V. Raghavan (Northern Kentucky University, USA)
Copyright: © 2003 |Pages: 7
DOI: 10.4018/978-1-93177-750-6.ch011
OnDemand PDF Download:


Populist approaches to studying information systems security include architectural, infrastructure-related and system-level security. This study focuses on software security implemented and monitored during systems development and implementation stages. Moving away from the past checklist methods of studying software security, this study provides a model that could be used in categorizing checklists into meaningful clusters. Many constructs, such as principle of least privilege, execution monitoring, social engineering and formalism and pragmatism in security implementations, are identified in the model. The identification of useful constructs to study can form the basis of evaluating security in software systems as well as provide guidelines of implementing security in new systems developed.

Complete Chapter List

Search this Book:
Table of Contents
Joan Peckham, Scott J. Lloyd
Chapter 1
Joan Peckham, Scott J. Lloyd
Software patterns are used to facilitate the reuse of object-oriented designs. While most Computer Aided Software Engineering (CASE) tools support... Sample PDF
Integrating Patterns into CASE Tools
Chapter 2
Gabriel Vilallonga, Daniel Riesco, Germán Montejano, Roberto Uzal
This chapter introduces a theoretical frame for the Process Definition (PD) validation in Workflow or in those processes with temporal restrictions.... Sample PDF
Petri Nets with Clocks for the Analytical Validation of Business Process
Chapter 3
Rick Gibson
This chapter will identify the key aspects of software engineering and systems engineering in an effort to highlight areas of consensus and conflict... Sample PDF
Software and Systems Engineering: Conflict and Consensus
Chapter 4
John Mendonca, Jeff Brewer
Historically, the approach to software engineering has been based on a search for an optimal (ideal) methodology — that is, the identification and... Sample PDF
Lean, Light, Adaptive, Agile and Appropriate Software Development: The Case for a Less Methodical Methodology
Chapter 5
D. C. McDermid
This paper challenges established wisdom with respect to use cases. Use cases are classically elaborated by directly identifying objects, methods... Sample PDF
How to Elaborate a Use Case
Chapter 6
Laura Felice, Daniel Riesco
During the RAISE specification development process, a variety of components and infrastructures are built. All of these components are not... Sample PDF
A Rigorous Model for RAISE Specifications Reusability
Chapter 7
Judith Kabeli, Peretz Shoval
FOOM (Functional and Object-Oriented Methodology) is an integrated methodology for information systems’ analysis and design, which combines two... Sample PDF
The Application of FOOM Methodology to IFIP Conference Case Study
Chapter 8
Dan Shoemaker
This chapter presents a comprehensive quantitative management model for information technology (IT). It is assessment based and can be easily... Sample PDF
A Quantitative Risk Assessment Model for the Management of Software Projects
Chapter 9
Jana Dospisil
This chapter describes the foundation and properties of object-oriented software measures. Many software measures for object-oriented applications... Sample PDF
Software Metrics, Information and Entropy
Chapter 10
T. Y. Chen, Iyad Rahwan, Yun Yang
This chapter introduces a novel notion of temporal interaction diagrams for distributed and parallel programming. An interaction diagram is a... Sample PDF
Temporal Interaction Diagrams for Multi-Process Environments
Chapter 11
Vijay V. Raghavan
Populist approaches to studying information systems security include architectural, infrastructure-related and system-level security. This study... Sample PDF
Toward an Integrative Model of Application-Software Security
Chapter 12
Valentina Plekhanova
This chapter presents a project proposal that defines future work in engineering the learning processes in cognitive systems. This proposal outlines... Sample PDF
Learning Systems and their Engineering: A Project Proposal
Chapter 13
Dentcho N. Batanov, Somjit Arch-int
Global competition among today’s enterprises forces their business processes to evolve constantly, leading to changes in corresponding Web-based... Sample PDF
Towards Construction of Business Components: An Approach to Development of Web-Based Application Systems
Chapter 14
Jesús D. Garcia-Consuegra
This chapter introduces an object-oriented methodology for Geographical Information Systems (GIS) development. It argues that a COTS-based... Sample PDF
An OO Methodology Based on the Unified Process for GIS Application Development
Chapter 15
Robert Bram, Jana Dospisil
The claim of improved efficiency and reliability of networking technology provides for a framework of service discovery, where clients connect to... Sample PDF
A Framework for Intelligent Service Discovery
Chapter 16
Zoran Stojanovic, Ajantha Dahanayake
Although Component-Based Development (CBD) platforms and technologies, such as CORBA, COM+/.NET and Enterprise Java Beans (EJB), are now de facto... Sample PDF
A Service-Based Approach to Components for Effective Business-IT Alignment
Chapter 17
Gordana Jovanovic-Dolecek, Javier Diaz-Carmona
This chapter describes a design of a narrowband lowpass finite impulse response (FIR) filter using a small number of multipliers per output sample... Sample PDF
One Method for Design of Narrowband Lowpass Filters
Chapter 18
Gordana Jovanovic-Dolecek
This chapter presents the design of narrowband highpass linear-phase finite impulse response (FIR) filters using the sharpening recursive running... Sample PDF
Design of Narrowband Highpass FIR Filters Using Sharpening RRS Filter and IFIR Structure
About the Authors