{"created":"2020-09-15T09:00:10.616692+00:00","id":5371,"links":{},"metadata":{"_buckets":{"deposit":"6012f90f-09f9-4b9a-97b2-c7fddb7d00c8"},"_deposit":{"created_by":45,"id":"5371","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"5371"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/5371","sets":["1582963342780:1596102391527"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"An approach to Cost-effective Software Development Strategy for Secure Information Systems","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Software security attacks such as misuse\nof hardware resources, steal confidential data, or denial\nof services, are frequently occurred to software systems.\nA larger percentage is caused by software design\ndefects. Most of the organizations completely depend\non software systems for their day-to-day operations, and\nhence, it is important to produce secure software\nproducts on cost-effective way. This paper proposes a\nsecurity engineering process in the system development\nlifecycle processes that help to develop secure systems\non University of Information Technology (UIT) in costeffective\nway by using cost/benefit analysis. A Secure\nSoftware Development Model that integrates security\nengineering with software engineering is proposed so\nthat it ensures the developed software system is secure\nwithin given budget and usability constraints. In this\nproposed model, estimating techniques for assets value\nand their risk factors will help to present a cost effective\napproach for security engineering process. Security\npolicies and guidelines in forms of laws are also\nsupported to guide developers throughout the\ndevelopment process. The proposed secure system aims\nto help in developing a secure software systems based on\nUIT's Information Environment concerning with\nsecurity requirement document including cost effective\napproach."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Security Attacks"},{"interim":"Cost/benefit analysis"},{"interim":"Security Policies and guidelines"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-09-15"}],"displaytype":"preview","filename":"An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf","filesize":[{"value":"362 Kb"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/5371/files/An approach to Cost-effective Software Development Strategy for Secure Information Systems.pdf"},"version_id":"91ce5948-e50d-4ec0-a595-6b09898c3f0c"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_c_date":"16-18 December, 2016","subitem_conference_title":"The Second International Workshop on Advanced Information Technologies","subitem_place":"Yangon, Myanmar"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyawt Kyawt San"},{"subitem_authors_fullname":"Swe Zin Hlaing"},{"subitem_authors_fullname":"Koichiro Ochimizu"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Presentation"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-12-18"},"item_title":"An approach to Cost-effective Software Development Strategy for Secure Information Systems","item_type_id":"21","owner":"45","path":["1596102391527"],"publish_date":"2020-09-15","publish_status":"0","recid":"5371","relation_version_is_last":true,"title":["An approach to Cost-effective Software Development Strategy for Secure Information Systems"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2021-12-13T03:32:08.626626+00:00"}