Cargando…

Security durability assessment through fuzzy analytic hierarchy process

BACKGROUND: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there...

Descripción completa

Detalles Bibliográficos
Autores principales: Agrawal, Alka, Zarour, Mohammad, Alenezi, Mamdouh, Kumar, Rajeev, Khan, Raees Ahmad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924713/
https://www.ncbi.nlm.nih.gov/pubmed/33816868
http://dx.doi.org/10.7717/peerj-cs.215
_version_ 1783659147561009152
author Agrawal, Alka
Zarour, Mohammad
Alenezi, Mamdouh
Kumar, Rajeev
Khan, Raees Ahmad
author_facet Agrawal, Alka
Zarour, Mohammad
Alenezi, Mamdouh
Kumar, Rajeev
Khan, Raees Ahmad
author_sort Agrawal, Alka
collection PubMed
description BACKGROUND: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with security. Unfortunately, the highly secure design of software becomes worthless because the durability of security services is not as it should be. METHODS: Security durability attributes have their own impact while integrating security with durability and assessment of security durability plays a crucial role during software development. Within this context, this paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2. To assess the security durability, authors are using the hybrid fuzzy analytic hierarchy process decision analysis approach. RESULTS: The impact of the security durability on other attributes has been evaluated quantitatively. The result obtained contains the assessment of security durability. The study posits conclusions which are based on this result and are useful for practitioners to assess and improve the security life span of software services.
format Online
Article
Text
id pubmed-7924713
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-79247132021-04-02 Security durability assessment through fuzzy analytic hierarchy process Agrawal, Alka Zarour, Mohammad Alenezi, Mamdouh Kumar, Rajeev Khan, Raees Ahmad PeerJ Comput Sci Security and Privacy BACKGROUND: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with security. Unfortunately, the highly secure design of software becomes worthless because the durability of security services is not as it should be. METHODS: Security durability attributes have their own impact while integrating security with durability and assessment of security durability plays a crucial role during software development. Within this context, this paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2. To assess the security durability, authors are using the hybrid fuzzy analytic hierarchy process decision analysis approach. RESULTS: The impact of the security durability on other attributes has been evaluated quantitatively. The result obtained contains the assessment of security durability. The study posits conclusions which are based on this result and are useful for practitioners to assess and improve the security life span of software services. PeerJ Inc. 2019-09-02 /pmc/articles/PMC7924713/ /pubmed/33816868 http://dx.doi.org/10.7717/peerj-cs.215 Text en © 2019 Agrawal et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Security and Privacy
Agrawal, Alka
Zarour, Mohammad
Alenezi, Mamdouh
Kumar, Rajeev
Khan, Raees Ahmad
Security durability assessment through fuzzy analytic hierarchy process
title Security durability assessment through fuzzy analytic hierarchy process
title_full Security durability assessment through fuzzy analytic hierarchy process
title_fullStr Security durability assessment through fuzzy analytic hierarchy process
title_full_unstemmed Security durability assessment through fuzzy analytic hierarchy process
title_short Security durability assessment through fuzzy analytic hierarchy process
title_sort security durability assessment through fuzzy analytic hierarchy process
topic Security and Privacy
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924713/
https://www.ncbi.nlm.nih.gov/pubmed/33816868
http://dx.doi.org/10.7717/peerj-cs.215
work_keys_str_mv AT agrawalalka securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess
AT zarourmohammad securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess
AT alenezimamdouh securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess
AT kumarrajeev securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess
AT khanraeesahmad securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess