Authentication Quantification Model To Estimate Security During Effective E-Procurement Process

Authors(2) :-Surabhi Saxena, Devendra Agarwal

Security is a standout amongst the most impressive spaces of e-procurement based software development. It gives a solid system to oversee and blend security parameters for valuable estimation at design stage. The structural and behavioural design properties of classes, objects and their connections are assessed to create metric for authorization. The appraisal of security utilizing the model is more proper and its validation signifies the legitimate effect of basic and utilitarian data of object oriented design programming. The authorization evaluation model is created utilizing multiple linear regression strategy on object oriented design develops. The connected factual examination on this investigation closes its measurable importance commented that figured information is profoundly adequate. A solid hypothetical premise has been created for designing the measurements required for unpredictability factors and security qualities.

Authors and Affiliations

Surabhi Saxena
Ph.D. Research Scholar, Department of Computer Application, Babu Banarasi Das University (BBDU ) Lucknow, Uttar Pradesh, India
Devendra Agarwal
Head of Department, Department of Computer Science, Babu Banarasi Das University (BBDU) Lucknow, Uttar Pradesh, India

Authentication, Security Attributes OO Design Metrics.

  1. McGraw, “Software Security: Building Security In”, Addison Wesley Professional, ISBN:978-0-321- 35670-3, 2006.
  2. Dowd and J. McDonald, “The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities”, Addison Wesley Professional, ISBN: 978-0-321-44442-4, 2006.
  3. A. Khan et.al, “Estimating Authentication Object Oriented Design”, IAJIT, 2015.
  4. R. Chidember and C. F. Kemerer, “Towards A Metric Suite for Object Oriented Design”, OOPSLA’91, ACM, 2008.
  5. Jagdish Bansiya, Carl G.Davis, “A Hierarchical Model for Object Oriented Design Quality Assessment” IEEE Transaction on Software Engg, Vol 28, No. 1, 2002.
  6. A. Khan, K. Mustafa,“Metric Based Testability Model for Object Oriented Design(MTMOOD)”, SIGSOFT Software Engg. Notes, Vol. 34 Number 2,March 2009.
  7. H. Meland, J. Jenesen, “Secure Software Design in Practice”, ARES., IEEE, 2008.
  8. Wang and W.A. Wulf, “A framework for security measurement” Proc. of National Information Systems Security Conference, 7-10 Oct 1997.
  9. B. Madan, Trivedi, “Modelling and Quantification of Security Attributes of Software Systems”, Dependable Systems and Networks DNS’022, IEEE.
  10. B. Madan et.al., “Modeling and Quantification of Security Attributes of Software Systems”, Proceedings of the International Conference on Dependable Systems and Networks (DSN’02), IEEE, 2002.
  11. H. Walton, T. A. Longstaff and R.C. Linder, “Evaluation of Software Security Attribute’s”, IEEE, 1997.
  12. R. Chidamber and C.F. Kemerer, “A Metric Suite for Object Oriented Design”, IEEE Trans. On Software Engineering, IEEE, vol. 20, 1994.
  13. Wang and W. Wulf, “A Framweork for Security Measurement”, Proc.of National Information Systems Security Conference, (1997) October 7-10, pp. 522-533.
  14. Mishra, D. Agarwal and M. H. Khan, “Availability Estimation Model: Fault Perspective”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 6, Issue 6, June 2017.
  15. L. Rogenberg and Dinnis Brennan, “Principle Components of Orthogonal Object Oriented Metrics”, White Paper Analyzing Results of NASA Object oriented Data, 2001.
  16. Hernan, S. Lambert, T. Ostwald and A. Shostack, “Threat Modeling: Uncover Security Design Flaws using the STRIDE Approach”, 2014.
  17. Jureczko and L. Madeyski, “Towards identifying software project clusters with regard to defect prediction”, IEEE, 2010.
  18. Surabhi Saxena , Dr.Devendra Agarwal,. “A Systematic Literature Review on Software Reliability Estimation Model for Measuring the Effectiveness of Object Oriented Design”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 6 , Issue 6 , June 2017.
  19. Surabhi Saxena , Dr. Devendra Agarwal,. “A Systematic Literature Review and Implementation of Software Usability Estimation Model for Measuring the Effectiveness ", International Journal of Emerging Technology and Advanced Engineering, Volume 7 , Issue 7 , July 2017.
  20. Praveen , M. Khaliq , " A General Study for Role of the Quality in the E-Procurement Process ", International Journal of Scientific Research in Computer Science , Engineering and Information Technology ( IJSRCSEIT) January 2018.
  21. Surabhi Saxena , D Agarwal , " A Critical Literature Survey on factors that Effecting E-Procurement Software ", International Journal of Advanced Research in Computer Engineering & Technology ( IJARCET ) , Volume 7 , Issue 1, January 2018 .
  22. Surabhi Saxena, D.Agarwal, “Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process”, International Journal of Computer Sciences and Engineering ( IJCSE), Vol.6, Issue.1, pp.361-365,January 31, 2018.
  23. Surabhi Saxena, D.Agarwal , " Authorization Quantification Model to Estimate Security During Effective E-Procurement Process ", IPASJ , International Journal of Computer Science ( IIJCS ) Volume 6 , Issue 2 , 28 February 2018 .

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 961-967
Manuscript Number : CSEIT1831218
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Surabhi Saxena, Devendra Agarwal, "Authentication Quantification Model To Estimate Security During Effective E-Procurement Process ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.961-967, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831218

Article Preview

Follow Us

Contact Us