A Hierarchical Model for Object-Oriented Design Quality Assessment
IEEE Transactions on Software Engineering
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
From the Ground Up: The DIMACS Software Security Workshop
IEEE Security and Privacy
Risk Analysis in Software Design
IEEE Security and Privacy
An Integrated Approach to Software Engineering
An Integrated Approach to Software Engineering
Towards a measuring framework for security properties of software
Proceedings of the 2nd ACM workshop on Quality of protection
Vulnerability analysis For evaluating quality of protection of security policies
Proceedings of the 2nd ACM workshop on Quality of protection
A Metrics Framework to Drive Application Security Improvement
IEEE Security and Privacy
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Detection and correction of design defects in object-oriented designs
Companion to the 22nd ACM SIGPLAN conference on Object-oriented programming systems and applications companion
Security metrics for source code structures
Proceedings of the fourth international workshop on Software engineering for secure systems
Software security metric identification framework (SSM)
Proceedings of the International Conference on Advances in Computing, Communication and Control
Impact of inheritance on vulnerability propagation at design phase
ACM SIGSOFT Software Engineering Notes
Security Vulnerabilities and Mitigation Strategies for Application Development
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Security for whom? the shifting security assumptions of pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Hi-index | 0.00 |
Secure software development is still an underexplored topic for many organisations, who failed to design security in at the early stage of the development process. The issue is complicated by advanced software architectural concepts, such as object oriented design, in which multiple pieces of software inherit characteristics and methods from each other. This article discusses a practical approach to assessing vulnerabilities within object oriented designs, taking into account object-based principles such as inheritance and polymorphism. Traditional approaches to security focus primarily on antivirus, firewalls, intrusion detection, and so on.^1 In spite of these protection, the attacks continue, and data breaches and other losses are escalating. This proves that network security alone cannot protect application from attacks. What else is missing?