skip to main content
research-article

Availability state transition model

Published: 05 May 2011 Publication History

Abstract

Several security mechanisms such as digital signature, timestamp audits and trails, encryption, throttling, filtering, protect secrets etc. are available. These security mechanisms are not completely able to stop malicious attacks. For malicious hackers and attackers it is comparatively easy to exploit security loopholes at the user's end side. Behind such type of problem the main reason is bad software design and its implementation without proper risk analysis and mitigation. So, an idea to model availability states an Availability State Transition Model (ASTM) has been proposed in this article. In ASTM methodology, only design level details is required which can be easily retrieved from the software's design.

References

[1]
Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Asoke K Talukder, Alwyn Roshan Pais, "Suraksha: A Security Designers' Workbench", presented in Hack.in 2009, IIT Kanpur, India, 17-19 March 2009.
[2]
Asoke K Talukder, Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Jevitha K P, Saurabh Samanta, Alwyn Roshan Pais, "Security-aware Software Development Life Cycle (SaSDLC) -- Processes and Tools", presented in WOCN 2009, Cairo, Egypt, 28-30 April 2009.
[3]
Bharat B. Madan, Katerina Goseva-Popstojanova, Kalyanaraman Vaidyanathan and Kishor S. Trivedi "Modeling and Quantification of Security Attributes of Software Systems", Proceedings of the International Conference on Dependable Systems and Networks (DSN'02), IEEE, 2002, pp: 505--514.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 36, Issue 3
May 2011
89 pages
ISSN:0163-5948
DOI:10.1145/1968587
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 May 2011
Published in SIGSOFT Volume 36, Issue 3

Check for updates

Author Tags

  1. security metric
  2. security quantification
  3. software security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City InfrastructureJournal of Organizational and End User Computing10.4018/JOEUC.202010010532:4(85-111)Online publication date: 1-Oct-2020
  • (2019)SPHERESInternational Journal of Information and Computer Security10.5555/3302723.330272611:1(33-60)Online publication date: 1-Jan-2019
  • (2018)Auditing Defense Against XSS Worms in Online Social Network-Based Web ApplicationsApplication Development and Design10.4018/978-1-5225-3422-8.ch038(879-909)Online publication date: 2018
  • (2018)Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in CloudApplication Development and Design10.4018/978-1-5225-3422-8.ch009(216-247)Online publication date: 2018
  • (2018)RAJIVEInternational Journal of Innovative Computing and Applications10.1504/IJICA.2018.0908229:1(13-36)Online publication date: 1-Jan-2018
  • (2018)A Survey on Code Injection Attacks in Mobile Cloud Computing Environment2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)10.1109/CONFLUENCE.2018.8443032(1-6)Online publication date: Jan-2018
  • (2018)Defense Against HTML5 XSS Attack Vectors: A Nested Context-Aware Sanitization Technique2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)10.1109/CONFLUENCE.2018.8442855(442-446)Online publication date: Jan-2018
  • (2018)A survey of detection methods for XSS attacksJournal of Network and Computer Applications10.1016/j.jnca.2018.06.004118(113-143)Online publication date: Sep-2018
  • (2017)Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in CloudInternational Journal of Cloud Applications and Computing10.4018/IJCAC.20170101017:1(1-31)Online publication date: 1-Jan-2017
  • (2016)Auditing Defense against XSS Worms in Online Social Network-Based Web ApplicationsHandbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security10.4018/978-1-5225-0105-3.ch010(216-245)Online publication date: 2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media