<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-08T12:53:16Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/4848" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/4848</identifier>
        <datestamp>2022-03-24T23:13:24Z</datestamp>
        <setSpec>1582963302567:1597824273898</setSpec>
        <setSpec>user-ucsy</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Analysis of Security Assessment in Software Refactoring</dc:title>
          <dc:creator>Maw, Myint Myint</dc:creator>
          <dc:creator>Oo, Khine Khine</dc:creator>
          <dc:description>Refactoring is the process of restructuringexisting computer code – changing the factoring –without changing its external behavior. It is acommon approach to producing better qualitysoftware. However, its impact on the security ofprograms has received relatively little attention.Traditionally, security of software is not consideredfrom the very beginning of a software developmentlife cycle, and it is only incorporated in the laterstages of development as an afterthought. As aconsequence, there are increased risks of securityvulnerabilities that are introduced into softwarecoding after refactoring. The proposed systemanalyses two versions (before/after code refactoring)with two methods such as detect code flaw by Viega’s12 rules and detect vulnerabilities using Access LevelGraphs (ALGs).This approach to automatically codesecurity assessment and record documents bycomparing consecutive code versions. Usingdocumented code vulnerabilities facts, developerswill be decide this refactoring is whether codesecurity level is more or less.</dc:description>
          <dc:date>2017-02-16</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000004848</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/4848</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
