Proposed Secure Activity Diagram for Software Development

نویسندگان

چکیده

Unified Modeling Language (UML) activity diagrams are derived from use case diagrams. It becomes essential to incorporate security features and maintain consistency in the during analysis phase of Software Development Life Cycle (SDLC). As part current software development practices, must be a constant effort. The used model business process. detailed diagram is done. challenge lies viewing main attacker's perspective providing defense mechanism mitigate attacks. This paper presents an extension named SecUML3Activity provide with Object Constraint (OCL) constraints using Five Primary Security Input Validation Attributes (FPSIVA) parameters for input validation. also proposed three color code notations stereotypes White represent normal state. Red dotted line attack components. Blue double defensive algorithm against SQL Injection (SQLI) attack, Cross Site Scripting (XSS) DoS/ DDoS access validation provided. mapping Secure 3-Use Case done through mathematical modeling.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Software Development Model

--Extreme programming (XP) is a modern approach for iterative development of software in which you never wait for the complete requirements and start development. Security is usually unnoticed during early phases of software life cycle. In this paper, our main objective is to focus on security requirements at each phase of software life cycle. In this regard, XP is a key solution that provides ...

متن کامل

Human Resource Allocation for Secure Software Development

Demand of software capabilities in both private and public organizations insists there is a need to provide trustworthy software. Risk management should be incorporated with the software development process for high quality deliverable. Time and cost consideration, different kind of factors consideration in risk management will provide efficient result. The growth of Internet poses different ki...

متن کامل

Idea: Interactive Support for Secure Software Development

Security breaches are often caused by software bugs, which may frequently be due to developer’s memory lapses, lack of attention/focus, and knowledge gaps. Developers have to contend with heavy cognitive loads to deal with issues such as functional requirements, deadlines, security, and runtime performance. We propose to integrate secure programming support seamlessly into Integrated Developmen...

متن کامل

Proposed Dynamic Soil Pressure Diagram On Rigid Walls.

Using finite element nonlinear analysis, the dynamic soil pressure on perimeter retainingwalls of structures is investigated. Nonlinear Drucker Prager failure criterion is used to model the soilbehavior in the near field. The far field soil and the middle structure are assumed to behave as linearelastic materials. The soil-wall interface behavior is modeled incorporating nonlinear interfaceelem...

متن کامل

Cybersecurity Through Secure Software Development

Reports about serious vulnerabilities in critical IT components have triggered increased focus on cybersecurity worldwide. Among the many initiatives to strengthen cybersecurity it is common to see the establishment and strengthening of CERTs and other centers for cybersecurity. On the other hand, strengthening education in IT security and applying methods for secure systems development are met...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2023

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2023.0140671