Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/253140
Title: Software security risk compliance and management model
Researcher: Kavitha D
Guide(s): Chandrasekaran S
Keywords: Compliance and management model
Engineering and Technology,Computer Science,Computer Science Software Engineering
Management
Security risk
Software security risk
University: Anna University
Completed Date: 2018
Abstract: The objectives of the research work is to propose software security engineering models based on the various security requirements of the distributed software In the context of possible attacks and threats the behaviour and functionalities of the secured software system have to be declared in mathematical ways to implement the underlying models in a newlinepragmatic style for management of the risk through compliance management The core idea in the undertaken research work is to apply strong basic mathematical theories and then transform those theories into computational models within the framework of security risks and compliance management The first phase of the research work proposes a software based security engineering model using an algebric categorical and morphisms theory using abstract algebra in mathematics The earlier models on software security engineering focus different viewpoints on parallel processing and develop rewrite based knowledge but they do not include different functional mappings between many security objects for selection of the best strategy The proposed requirement model is based on the formal theory of category of objects and the morphisms between them In addition to n categories and multiple morphisms that were used for organizing security requirements of newlinefunctional objects of different categories The on demand security requirement objects morphisms and the uncertain events in any one of the subsystems are considered for management of this security requirement category as an algebraic data types The collection of security requirement objects using classification and clustering techniques are implicitly applied by the formation of category and morphism The risk and compliances both in the form of direct and indirect categories are mapped so as to provide a security assurance functors with minimum risk on the requirements to the next design state
Pagination: xx, 148p.
URI: http://hdl.handle.net/10603/253140
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File23.72 kBAdobe PDFView/Open
02_certificates.pdf976.85 kBAdobe PDFView/Open
03_abstract.pdf13.38 kBAdobe PDFView/Open
04_acknowledgement.pdf4.08 kBAdobe PDFView/Open
05_table of contents.pdf14.69 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf5.65 kBAdobe PDFView/Open
07_chapter1.pdf281.46 kBAdobe PDFView/Open
08_chapter2.pdf357.9 kBAdobe PDFView/Open
09_chapter3.pdf75.77 kBAdobe PDFView/Open
10_chapter4.pdf359.93 kBAdobe PDFView/Open
11_chapter5.pdf544.32 kBAdobe PDFView/Open
12_conclusion.pdf23.72 kBAdobe PDFView/Open
13_references.pdf22.94 kBAdobe PDFView/Open
14_list_of_publications.pdf9 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: