Prioritization of software security intangible attributes

  • Authors:
  • Regina Thienne Colombo;Marcelo Schneck Pessôa;Ana Cervigni Guerra;Amandio Balcão Filho;Célio Caruso Gomes

  • Affiliations:
  • São Paulo University (USP) Cidade Universitária, São Paulo, Brasil;São Paulo University (USP) Cidade Universitária, São Paulo, Brasil;Information Technology Center Renato Archer (CTI) Rodovia Dom Pedro I (SP - 65) Km 143,6, Campinas, Brasil;Information Technology Center Renato Archer (CTI) Rodovia Dom Pedro I (SP - 65) Km 143,6, Campinas, Brasil;Technological Institute of Aeronautics (ITA) Praça Marechal Eduardo Gomes, 50 - Vila das Acácias - São José dos Campos, Brasil

  • Venue:
  • ACM SIGSOFT Software Engineering Notes
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intangible elements, such as value ranges of software security properties (e.g., confidentiality, integrity and availability), can be seen as resources to enforce software security. There are no standard units regarding these properties, turning their measurement into a difficult process. On the other hand, we can measure or estimate priorities for intangible elements from tangible ones, since their priorities are proportional. The priorities of tangible resources can be used to assign values to the priorities of intangible resources through the experience of the involved analysts. In this paper, we present a theoretical process based on mathematical constructs to score the priority and to estimate measures of software security attributes. This process causes the complex systems decomposition into simpler and smaller systems, thus allowing the estimation of properties that will help the understanding and measurement of software security properties. Our results provide a model for access security; the priority score of security attributes is calculated using the AHP methodology. We illustrate the application of our approach in a Web management system for governmental research institutions, presenting results that may support managers in the prioritization, evaluation and management of security requirements related to Web applications.