• Dec 05, 2023 News!Vol.12, No.4 has been published with online version.   [Click]
  • Jan 04, 2024 News!IJFCC will adopt Article-by-Article Work Flow
  • Sep 05, 2023 News!Vol.12, No.3 has been published with online version.   [Click]
General Information
Editor-in-chief

Prof. Pascal Lorenz
University of Haute Alsace, France
 
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.

IJFCC 2012 Vol.1(2): 147-150 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2012.V1.38

Misuse for Security Hardening Assessment in Application Software Deployment

Kwanchanok Limbandit and Yunyong Teng-Amnuay

Abstract—In software installation, the hardening status of the target system is difficult to assessed and usually depends on the expertise and care of system administrator. These non-functional requirements can be rendered functional by using misuses in misuse case diagram. This allows the assessment to be incorporated into the software design process and implemented as part of the deployment module. The assessment can thus be carried out automatically during software installation. As system hardening is mostly independent from software functionalities, the assessment can be expressed as design patterns to accommodate the design process. Four examples of system hardening were used: program and data memory separation, Mandatory Access Control (MAC), firewall, and logging.

Index Terms—Misuse, hardening, installation, security pattern.

The authors are with Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand (Corresponding author. Tel.: +66-22186991, fax: +66-22186955, e-mail: kwanchanok.l@student.chula.ac.th, 2 yunyong.t@chula.ac.th).

[PDF]

Cite: Kwanchanok Limbandit and Yunyong Teng-Amnuay, "Misuse for Security Hardening Assessment in Application Software Deployment," International Journal of Future Computer and Communication vol. 1, no. 2, pp. 147-150, 2012.

Copyright © 2008-2024. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net