Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "6012f90f-09f9-4b9a-97b2-c7fddb7d00c8"}, "_deposit": {"created_by": 45, "id": "5371", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "5371"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5371", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An approach to Cost-effective Software Development Strategy for Secure Information Systems", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Software security attacks such as misuse\nof hardware resources, steal confidential data, or denial\nof services, are frequently occurred to software systems.\nA larger percentage is caused by software design\ndefects. Most of the organizations completely depend\non software systems for their day-to-day operations, and\nhence, it is important to produce secure software\nproducts on cost-effective way. This paper proposes a\nsecurity engineering process in the system development\nlifecycle processes that help to develop secure systems\non University of Information Technology (UIT) in costeffective\nway by using cost/benefit analysis. A Secure\nSoftware Development Model that integrates security\nengineering with software engineering is proposed so\nthat it ensures the developed software system is secure\nwithin given budget and usability constraints. In this\nproposed model, estimating techniques for assets value\nand their risk factors will help to present a cost effective\napproach for security engineering process. Security\npolicies and guidelines in forms of laws are also\nsupported to guide developers throughout the\ndevelopment process. The proposed secure system aims\nto help in developing a secure software systems based on\nUIT\u0027s Information Environment concerning with\nsecurity requirement document including cost effective\napproach."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Security Attacks"}, {"interim": "Cost/benefit analysis"}, {"interim": "Security Policies and guidelines"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-09-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf", "filesize": [{"value": "362 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 362000.0, "url": {"url": "https://meral.edu.mm/record/5371/files/An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf"}, "version_id": "91ce5948-e50d-4ec0-a595-6b09898c3f0c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_c_date": "16-18 December, 2016", "subitem_conference_title": "The Second International  Workshop on Advanced  Information Technologies", "subitem_place": "Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyawt Kyawt San"}, {"subitem_authors_fullname": "Swe Zin Hlaing"}, {"subitem_authors_fullname": "Koichiro Ochimizu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Presentation"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-12-18"}, "item_title": "An approach to Cost-effective Software Development Strategy for Secure Information Systems", "item_type_id": "21", "owner": "45", "path": ["1596102391527"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005371", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-09-15"}, "publish_date": "2020-09-15", "publish_status": "0", "recid": "5371", "relation": {}, "relation_version_is_last": true, "title": ["An approach to Cost-effective Software Development Strategy for Secure Information Systems"], "weko_shared_id": -1}
  1. University of Information Technology
  2. Faculty of Information Science

An approach to Cost-effective Software Development Strategy for Secure Information Systems

http://hdl.handle.net/20.500.12678/0000005371
http://hdl.handle.net/20.500.12678/0000005371
8a55bee9-e6c9-4df7-827d-5487bc930c73
6012f90f-09f9-4b9a-97b2-c7fddb7d00c8
None
Preview
Name / File License Actions
An An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf (362 Kb)
license.icon
Publication type
Conference paper
Upload type
Presentation
Title
Title An approach to Cost-effective Software Development Strategy for Secure Information Systems
Language en
Publication date 2016-12-18
Authors
Kyawt Kyawt San
Swe Zin Hlaing
Koichiro Ochimizu
Description
Software security attacks such as misuse
of hardware resources, steal confidential data, or denial
of services, are frequently occurred to software systems.
A larger percentage is caused by software design
defects. Most of the organizations completely depend
on software systems for their day-to-day operations, and
hence, it is important to produce secure software
products on cost-effective way. This paper proposes a
security engineering process in the system development
lifecycle processes that help to develop secure systems
on University of Information Technology (UIT) in costeffective
way by using cost/benefit analysis. A Secure
Software Development Model that integrates security
engineering with software engineering is proposed so
that it ensures the developed software system is secure
within given budget and usability constraints. In this
proposed model, estimating techniques for assets value
and their risk factors will help to present a cost effective
approach for security engineering process. Security
policies and guidelines in forms of laws are also
supported to guide developers throughout the
development process. The proposed secure system aims
to help in developing a secure software systems based on
UIT's Information Environment concerning with
security requirement document including cost effective
approach.
Keywords
Security Attacks, Cost/benefit analysis, Security Policies and guidelines
Conference papers
16-18 December, 2016
The Second International Workshop on Advanced Information Technologies
Yangon, Myanmar
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-15 09:03:50.035256
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL