• Aug 09, 2018 News![CFP] The annual meeting of IJFCC Editorial Board, ICCTD 2019, will be held in Prague, Czech Republic during March 2-4, 2019.   [Click]
  • Aug 09, 2018 News!IJFCC Vol. 6, No. 1-No. 3 has been indexed by EI (Inspec).   [Click]
  • Dec 24, 2018 News!The papers published in Vol.7, No.1-No.2 have all received dois from Crossref.
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Cherry L. Chan
    • Abstracting/ Indexing: Google Scholar,  Crossref, Electronic Journals LibraryEI (INSPEC, IET), etc.
    • E-mail:  ijfcc@ejournal.net 
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2012 Vol.1(2): 147-150 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2012.V1.38

Misuse for Security Hardening Assessment in Application Software Deployment

Kwanchanok Limbandit and Yunyong Teng-Amnuay

Abstract—In software installation, the hardening status of the target system is difficult to assessed and usually depends on the expertise and care of system administrator. These non-functional requirements can be rendered functional by using misuses in misuse case diagram. This allows the assessment to be incorporated into the software design process and implemented as part of the deployment module. The assessment can thus be carried out automatically during software installation. As system hardening is mostly independent from software functionalities, the assessment can be expressed as design patterns to accommodate the design process. Four examples of system hardening were used: program and data memory separation, Mandatory Access Control (MAC), firewall, and logging.

Index Terms—Misuse, hardening, installation, security pattern.

The authors are with Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand (Corresponding author. Tel.: +66-22186991, fax: +66-22186955, e-mail: kwanchanok.l@student.chula.ac.th, 2 yunyong.t@chula.ac.th).


Cite: Kwanchanok Limbandit and Yunyong Teng-Amnuay, "Misuse for Security Hardening Assessment in Application Software Deployment," International Journal of Future Computer and Communication vol. 1, no. 2, pp. 147-150, 2012.

Copyright © 2008-2018. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net