Innovative Strategies for Secure Software Development

Innovative Strategies for Secure Software Development

Punam Bedi, Vandana Gandotra, Archana Singhal
ISBN13: 9781466629585|ISBN10: 1466629584|EISBN13: 9781466629592
DOI: 10.4018/978-1-4666-2958-5.ch013
Cite Chapter Cite Chapter

MLA

Bedi, Punam, et al. "Innovative Strategies for Secure Software Development." Designing, Engineering, and Analyzing Reliable and Efficient Software, edited by Hardeep Singh and Kulwant Kaur, IGI Global, 2013, pp. 217-237. https://doi.org/10.4018/978-1-4666-2958-5.ch013

APA

Bedi, P., Gandotra, V., & Singhal, A. (2013). Innovative Strategies for Secure Software Development. In H. Singh & K. Kaur (Eds.), Designing, Engineering, and Analyzing Reliable and Efficient Software (pp. 217-237). IGI Global. https://doi.org/10.4018/978-1-4666-2958-5.ch013

Chicago

Bedi, Punam, Vandana Gandotra, and Archana Singhal. "Innovative Strategies for Secure Software Development." In Designing, Engineering, and Analyzing Reliable and Efficient Software, edited by Hardeep Singh and Kulwant Kaur, 217-237. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2958-5.ch013

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses adoption of some proactive strategies in threat management for security of software systems. Security requirements play an important role for secure software systems which arise due to threats to the assets from malicious users. It is therefore imperative to develop realistic and meaningful security requirements. A hybrid technique has been presented in this chapter evolved by overlapping the strengths of misuse cases and attack trees for elicitation of flawless security requirements. This chapter also discusses an innovative technique using fuzzy logic as a proactive step to break the jinx of brittleness of present day security measures based on binary principle. In this mechanism, partially secure state evolved between safe state and failed state using fuzzy logic provides an alert signal to take appropriate additional preventive measures to save the system from entering into the failed state to the extent possible.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.