Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security metrics for software systems
Wang J., Wang H., Guo M., Xia M.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, SC, Mar 19-21, 2009)1-6.2009.Type:Proceedings
Date Reviewed: Oct 23 2009

Security is a very important software attribute. The ability to quantify software security will definitely help improve the quality and reliability of any type of software. Wang et al. attempt to provide a methodology to calculate software security metrics by quantifying the vulnerability parameters.

Common vulnerability scoring system (CVSS) metrics--such as base metrics, temporal metrics, and environmental metrics--are used to quantify the severity and risk of vulnerability, with due consideration to the time factor. Wang et al. detail a sample application, including a security metrics calculation, by comparing Web browsers such as Mozilla Firefox 2, Microsoft Internet Explorer 6, and Microsoft Internet Explorer 7. This paper is only a first attempt to explain and demonstrate the software security metrics calculation. Known vulnerabilities are the source for metrics calculation.

In the sample application, the weaknesses selected for various Web browsers are not the same; therefore, the calculated software security scores cannot be used for comparison purposes. The source of data used for Microsoft Internet Explorer 6 and 7 is unknown.

Reviewer:  Ponmurugarajan Thiyagarajan Review #: CR137407 (1012-1270)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Product Metrics (D.2.8 ... )
 
 
Management (D.2.9 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy