Cargando…
Security durability assessment through fuzzy analytic hierarchy process
BACKGROUND: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924713/ https://www.ncbi.nlm.nih.gov/pubmed/33816868 http://dx.doi.org/10.7717/peerj-cs.215 |
_version_ | 1783659147561009152 |
---|---|
author | Agrawal, Alka Zarour, Mohammad Alenezi, Mamdouh Kumar, Rajeev Khan, Raees Ahmad |
author_facet | Agrawal, Alka Zarour, Mohammad Alenezi, Mamdouh Kumar, Rajeev Khan, Raees Ahmad |
author_sort | Agrawal, Alka |
collection | PubMed |
description | BACKGROUND: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with security. Unfortunately, the highly secure design of software becomes worthless because the durability of security services is not as it should be. METHODS: Security durability attributes have their own impact while integrating security with durability and assessment of security durability plays a crucial role during software development. Within this context, this paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2. To assess the security durability, authors are using the hybrid fuzzy analytic hierarchy process decision analysis approach. RESULTS: The impact of the security durability on other attributes has been evaluated quantitatively. The result obtained contains the assessment of security durability. The study posits conclusions which are based on this result and are useful for practitioners to assess and improve the security life span of software services. |
format | Online Article Text |
id | pubmed-7924713 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-79247132021-04-02 Security durability assessment through fuzzy analytic hierarchy process Agrawal, Alka Zarour, Mohammad Alenezi, Mamdouh Kumar, Rajeev Khan, Raees Ahmad PeerJ Comput Sci Security and Privacy BACKGROUND: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with security. Unfortunately, the highly secure design of software becomes worthless because the durability of security services is not as it should be. METHODS: Security durability attributes have their own impact while integrating security with durability and assessment of security durability plays a crucial role during software development. Within this context, this paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2. To assess the security durability, authors are using the hybrid fuzzy analytic hierarchy process decision analysis approach. RESULTS: The impact of the security durability on other attributes has been evaluated quantitatively. The result obtained contains the assessment of security durability. The study posits conclusions which are based on this result and are useful for practitioners to assess and improve the security life span of software services. PeerJ Inc. 2019-09-02 /pmc/articles/PMC7924713/ /pubmed/33816868 http://dx.doi.org/10.7717/peerj-cs.215 Text en © 2019 Agrawal et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Security and Privacy Agrawal, Alka Zarour, Mohammad Alenezi, Mamdouh Kumar, Rajeev Khan, Raees Ahmad Security durability assessment through fuzzy analytic hierarchy process |
title | Security durability assessment through fuzzy analytic hierarchy process |
title_full | Security durability assessment through fuzzy analytic hierarchy process |
title_fullStr | Security durability assessment through fuzzy analytic hierarchy process |
title_full_unstemmed | Security durability assessment through fuzzy analytic hierarchy process |
title_short | Security durability assessment through fuzzy analytic hierarchy process |
title_sort | security durability assessment through fuzzy analytic hierarchy process |
topic | Security and Privacy |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924713/ https://www.ncbi.nlm.nih.gov/pubmed/33816868 http://dx.doi.org/10.7717/peerj-cs.215 |
work_keys_str_mv | AT agrawalalka securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess AT zarourmohammad securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess AT alenezimamdouh securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess AT kumarrajeev securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess AT khanraeesahmad securitydurabilityassessmentthroughfuzzyanalytichierarchyprocess |