Rajeev Kumar

Work place: Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, 226028, Uttar Pradesh, India

E-mail: rs0414@gmail.com

Website:

Research Interests: Image Processing, Image Manipulation, Image Compression, Computer systems and computational processes

Biography

Dr. Rajeev Kumar completed the Master’s and PhD degrees in Information Technology from Babasaheb Bhimrao Ambedkar University, Lucknow, India, in 2014 and 2018, respectively. He has more than seven years of research and teaching experience. Dr. Kumar is currently working as an Associate Professor in the Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, UP, India. His research interest includes different areas of Security Engineering.

Author Articles
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective

By Suhel Ahmad Khan Mohd Nadeem Alka Agrawal Raees Ahmad Khan Rajeev Kumar

DOI: https://doi.org/10.5815/ijmecs.2021.06.04, Pub. Date: 8 Dec. 2021

The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.

[...] Read more.
Other Articles