Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/253140
Title: | Software security risk compliance and management model |
Researcher: | Kavitha D |
Guide(s): | Chandrasekaran S |
Keywords: | Compliance and management model Engineering and Technology,Computer Science,Computer Science Software Engineering Management Security risk Software security risk |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | The objectives of the research work is to propose software security engineering models based on the various security requirements of the distributed software In the context of possible attacks and threats the behaviour and functionalities of the secured software system have to be declared in mathematical ways to implement the underlying models in a newlinepragmatic style for management of the risk through compliance management The core idea in the undertaken research work is to apply strong basic mathematical theories and then transform those theories into computational models within the framework of security risks and compliance management The first phase of the research work proposes a software based security engineering model using an algebric categorical and morphisms theory using abstract algebra in mathematics The earlier models on software security engineering focus different viewpoints on parallel processing and develop rewrite based knowledge but they do not include different functional mappings between many security objects for selection of the best strategy The proposed requirement model is based on the formal theory of category of objects and the morphisms between them In addition to n categories and multiple morphisms that were used for organizing security requirements of newlinefunctional objects of different categories The on demand security requirement objects morphisms and the uncertain events in any one of the subsystems are considered for management of this security requirement category as an algebraic data types The collection of security requirement objects using classification and clustering techniques are implicitly applied by the formation of category and morphism The risk and compliances both in the form of direct and indirect categories are mapped so as to provide a security assurance functors with minimum risk on the requirements to the next design state |
Pagination: | xx, 148p. |
URI: | http://hdl.handle.net/10603/253140 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 23.72 kB | Adobe PDF | View/Open |
02_certificates.pdf | 976.85 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 13.38 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 4.08 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 14.69 kB | Adobe PDF | View/Open | |
06_list_of_symbols and abbreviations.pdf | 5.65 kB | Adobe PDF | View/Open | |
07_chapter1.pdf | 281.46 kB | Adobe PDF | View/Open | |
08_chapter2.pdf | 357.9 kB | Adobe PDF | View/Open | |
09_chapter3.pdf | 75.77 kB | Adobe PDF | View/Open | |
10_chapter4.pdf | 359.93 kB | Adobe PDF | View/Open | |
11_chapter5.pdf | 544.32 kB | Adobe PDF | View/Open | |
12_conclusion.pdf | 23.72 kB | Adobe PDF | View/Open | |
13_references.pdf | 22.94 kB | Adobe PDF | View/Open | |
14_list_of_publications.pdf | 9 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: