A Study on Cloud Security Growth Model using Non Homogenous Poisson Process

Authors

  • Alam M Department of Computer Science, Noida International University, Greater Noida, U.P., INDIA
  • Shah O Department of Electronics and Communication, Noida International University, Greater Noida, Uttar Pradesh

Keywords:

Security Growth Model, Non Homogenous Poisson Process (NHPP), Cumulative Distribution Function (CDF), Probability Distribution Function (PDF), Expected Vulnerability

Abstract

Software Security is one of the most important attributes for securing reliable and trustworthy software but unfortunately it is being least attentive among all others attributes. There are a number of models available for all the attributes like reliability, maintainability but security model is not yet developed. In this paper we propose security growth model based on log logistic that will provide a critical analysis of the underlying postulation and analyze the applicability of the proposed model during the entire process of software development. The security growth model (SGM) will play important role to provide quantitative approach to assess software in security concerns. SGM has been used to describe best performance in terms of predictability, probability and goodness-of-fit and so forth.

References

Mahtab Alam, “Software Security Requirement Checklist”, Intl. Journal of Software Engineering, IJSE, Vol. 3, No. 1, January 2010, pp. 53-62.

C Stringfellow, A Amschler Andrews “An empirical method of selecting software reliability growth models”, Empirical Software Engineering, 7, 319–343, 2002.2 Kluwer Academic Publishers. Manufactured in The Netherlands.

J.D.Musa, K. Okumoto, "A logarithmic Poisson execution time model for software reliability measurement", Proc. 7th International Conference on Software Engineering, Orlando, Florida, March 26-29, 1984, pp. 230-238.

Alan Wood “Software Reliability Growth Models”, Technical Report, Part Number 130056, September 1996

Reinhold Nafe 1 , Wolfgang Schlote, “Methods for Shape Analysis of two-dimensional closed Contours - A biologically important, but widely neglected Field in Histopathology” Electronic Journal of Pathology and Histology Volume 8.2; June 2002.

John D Musa, Kazuhira Okumoto “Application of basic and logarithmic poisson execution time models in software reliability measurement”, Proceeding Software Reliability Modelling and Identification, Springer-Verlag London, UK ©1988, ISBN:3-540-50695-0

Downloads

Published

2024-02-26

How to Cite

Alam, M., & Shah, O. (2024). A Study on Cloud Security Growth Model using Non Homogenous Poisson Process. COMPUSOFT: An International Journal of Advanced Computer Technology, 6(07), 2378–3280. Retrieved from https://ijact.in/index.php/j/article/view/411

Issue

Section

Review Article

Similar Articles

<< < 26 27 28 29 30 31 32 33 > >> 

You may also start an advanced similarity search for this article.