Alka Agrawal

Work place: Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, Uttar Pradesh, India

E-mail: alka_csjmu@yahoo.co.in

Website:

Research Interests: Computational Engineering, Computer systems and computational processes, Computational Learning Theory, Information Security, Network Security

Biography

Dr. Alka Agrawal is currently working as an Assistant Professor in the Department of Information Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), VidyaVihar, Raibareli Road, Lucknow, India. Dr. Alka has more than 13 years of teaching & research experience and she has more than 100 research publications with good impact factors in reputed International Journals and Conferences including IEEE, Springer, Elsevier, Inderscience, Hindawi, and IGI Global etc. She has also authored National and International Books. Her research interests are in the different areas of Security Engineering and Computational Techniques.

Author Articles
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective

By Suhel Ahmad Khan Mohd Nadeem Alka Agrawal Raees Ahmad Khan Rajeev Kumar

DOI: https://doi.org/10.5815/ijmecs.2021.06.04, Pub. Date: 8 Dec. 2021

The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.

[...] Read more.
Other Articles