Abstract

Existing software applications become increasingly distributed as their continuity and lifetimes are lengthened; consequently, the users’ dependence on these applications is increased. The security of these applications has become a primary concern in their design, construction and evolution. Thus, these applications give rise to major concerns on t he capability of the current development approach t o develop secure systems. Component-Based Software Development (CBSD) is a software engineering approach. CBSD has been successfully applied in many domains. However, the CBSD capability to develop secure software applications is lacking to date. This study is an extension of the previous study on the challenges of the security features in CBSD models. Therefore, this study proposes a solution to the lack of security in CBSD models by highlighting the attributes that must be embedded into the CBSD process. A thorough analysis of exist ing studies is conducted to investigate the related software security attributes. The outcome analysis is beneficial for industries, such as software development companies, as well as for academic inst itutions. The analysis also serves as a baseline reference for companies that develop component-based software.

Highlights

  • Component-Based Software Development (CBSD) is a technique that focuses on the use of the lack of a suitable guide during the CBSD life cycle existing software codes to develop software applications leads to faults in software requirements, design, or codes and avoids the need to develop from scratch and results in major security threats

  • Each study on verifying safety and maintainability as well as on estimating reliability, integrity, confidentiality and availability properties in CBSD has progressed independently (Crnkovic and Grunske, 2007). This condition can be attributed to the following reasons: (1) the attributes of safety and maintainability that address challenges must be specified, composed and verified in the software component; (2) the traditional ways to estimate reliability and availability attributes in a system architecture using stochastic methods are based on uncertain and inaccurate parameters; and (3) studies that analyze the vulnerabilities of confidentiality and integrity attributes are inadequate

  • A thorough analysis of existing research was conducted in this study to investigate the related software security attributes

Read more

Summary

INTRODUCTION

(Alhazbi and Jantan, 2007; Lin, 2007). CBSD shifts the development emphasis from programming software to Existing software applications become increasingly composing software systems (Gill and Tomar, 2010). Several studies have reported the different challenges concerns on the capability of current development models in using CBSD in software development in terms of to develop dependable systems. According to Moradian and Software Development (CBSD) is a software engineering Håkansson (2010), the interdependencies of software approach (Sommerville, 2011); its capability to develop components create security issues during the integration dependable software applications is unknown to date. Dependability attributes must be verified and validated throughout the CBSD process to guarantee the dependability of software applications (Kahtan et al, 2012).

SOFTWARE SECURITY AND CBSD
SOFTWARE SECURITY
Trustworthiness
Survivability
DEPENDABILITY ATTRIBUTES
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call