• Jan 05, 2017 News![CFP] 2017 the annual meeting of IJFCC Editorial Board, ICCTD 2017, will be held in Paris, France during March 20-22, 2017.   [Click]
  • Mar 24, 2016 News! IJFCC Vol. 4, No. 4 has been indexed by EI (Inspec).   [Click]
  • Mar 24, 2017 News!Vol.6, No.1 has been published with online version.   [Click]
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: Google Scholar, Engineering & Technology Digital Library, and Crossref, DOAJ, Electronic Journals LibraryEI (INSPEC, IET).
    • E-mail:  ijfcc@ejournal.net 
Editor-in-chief
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2012 Vol.1(2): 147-150 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2012.V1.38

Misuse for Security Hardening Assessment in Application Software Deployment

Kwanchanok Limbandit and Yunyong Teng-Amnuay

Abstract—In software installation, the hardening status of the target system is difficult to assessed and usually depends on the expertise and care of system administrator. These non-functional requirements can be rendered functional by using misuses in misuse case diagram. This allows the assessment to be incorporated into the software design process and implemented as part of the deployment module. The assessment can thus be carried out automatically during software installation. As system hardening is mostly independent from software functionalities, the assessment can be expressed as design patterns to accommodate the design process. Four examples of system hardening were used: program and data memory separation, Mandatory Access Control (MAC), firewall, and logging.

Index Terms—Misuse, hardening, installation, security pattern.

The authors are with Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand (Corresponding author. Tel.: +66-22186991, fax: +66-22186955, e-mail: kwanchanok.l@student.chula.ac.th, 2 yunyong.t@chula.ac.th).

[PDF]

Cite: Kwanchanok Limbandit and Yunyong Teng-Amnuay, "Misuse for Security Hardening Assessment in Application Software Deployment," International Journal of Future Computer and Communication vol. 1, no. 2, pp. 147-150, 2012.

Copyright © 2008-2016. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net