MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "6012f90f-09f9-4b9a-97b2-c7fddb7d00c8"}, "_deposit": {"created_by": 45, "id": "5371", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "5371"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/5371", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "An approach to Cost-effective Software Development Strategy for Secure Information Systems", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Software security attacks such as misuse\nof hardware resources, steal confidential data, or denial\nof services, are frequently occurred to software systems.\nA larger percentage is caused by software design\ndefects. Most of the organizations completely depend\non software systems for their day-to-day operations, and\nhence, it is important to produce secure software\nproducts on cost-effective way. This paper proposes a\nsecurity engineering process in the system development\nlifecycle processes that help to develop secure systems\non University of Information Technology (UIT) in costeffective\nway by using cost/benefit analysis. A Secure\nSoftware Development Model that integrates security\nengineering with software engineering is proposed so\nthat it ensures the developed software system is secure\nwithin given budget and usability constraints. In this\nproposed model, estimating techniques for assets value\nand their risk factors will help to present a cost effective\napproach for security engineering process. Security\npolicies and guidelines in forms of laws are also\nsupported to guide developers throughout the\ndevelopment process. The proposed secure system aims\nto help in developing a secure software systems based on\nUIT\u0027s Information Environment concerning with\nsecurity requirement document including cost effective\napproach."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Security Attacks"}, {"interim": "Cost/benefit analysis"}, {"interim": "Security Policies and guidelines"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-09-15"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf", "filesize": [{"value": "362 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 362000.0, "url": {"url": "https://meral.edu.mm/record/5371/files/An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf"}, "version_id": "91ce5948-e50d-4ec0-a595-6b09898c3f0c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_c_date": "16-18 December, 2016", "subitem_conference_title": "The Second International Workshop on Advanced Information Technologies", "subitem_place": "Yangon, Myanmar"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Kyawt Kyawt San"}, {"subitem_authors_fullname": "Swe Zin Hlaing"}, {"subitem_authors_fullname": "Koichiro Ochimizu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Presentation"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-12-18"}, "item_title": "An approach to Cost-effective Software Development Strategy for Secure Information Systems", "item_type_id": "21", "owner": "45", "path": ["1596102391527"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000005371", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-09-15"}, "publish_date": "2020-09-15", "publish_status": "0", "recid": "5371", "relation": {}, "relation_version_is_last": true, "title": ["An approach to Cost-effective Software Development Strategy for Secure Information Systems"], "weko_shared_id": -1}
An approach to Cost-effective Software Development Strategy for Secure Information Systems
http://hdl.handle.net/20.500.12678/0000005371
http://hdl.handle.net/20.500.12678/00000053718a55bee9-e6c9-4df7-827d-5487bc930c73
6012f90f-09f9-4b9a-97b2-c7fddb7d00c8
Name / File | License | Actions |
---|---|---|
An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf (362 Kb)
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Presentation | ||||||
Title | ||||||
Title | An approach to Cost-effective Software Development Strategy for Secure Information Systems | |||||
Language | en | |||||
Publication date | 2016-12-18 | |||||
Authors | ||||||
Kyawt Kyawt San | ||||||
Swe Zin Hlaing | ||||||
Koichiro Ochimizu | ||||||
Description | ||||||
Software security attacks such as misuse of hardware resources, steal confidential data, or denial of services, are frequently occurred to software systems. A larger percentage is caused by software design defects. Most of the organizations completely depend on software systems for their day-to-day operations, and hence, it is important to produce secure software products on cost-effective way. This paper proposes a security engineering process in the system development lifecycle processes that help to develop secure systems on University of Information Technology (UIT) in costeffective way by using cost/benefit analysis. A Secure Software Development Model that integrates security engineering with software engineering is proposed so that it ensures the developed software system is secure within given budget and usability constraints. In this proposed model, estimating techniques for assets value and their risk factors will help to present a cost effective approach for security engineering process. Security policies and guidelines in forms of laws are also supported to guide developers throughout the development process. The proposed secure system aims to help in developing a secure software systems based on UIT's Information Environment concerning with security requirement document including cost effective approach. |
||||||
Keywords | ||||||
Security Attacks, Cost/benefit analysis, Security Policies and guidelines | ||||||
Conference papers | ||||||
16-18 December, 2016 | ||||||
The Second International Workshop on Advanced Information Technologies | ||||||
Yangon, Myanmar |