Abstract
Security may be quantified to measure the level of software security implementation. These quantified measures are called security metrics. These metrics need to be stored in some central or local repository for further analysis and refinement of security of software proposed to be developed or modified. Through the research work carried out by the researchers, it is proposed to have a data structure for storage of metrics values which are identified and collected using the Misuse Case Oriented Quality Requirements (MCOQR) framework. The research work highlights and discusses the internal arrangement of various data sets in the data structure and their relationship with each other. The data sets thus proposed are properly synchronized with the industry accepted standards like Common Vulnerability Scoring System (CVSS), Common Vulnerability Enumeration (CVE), and Common Weakness Enumeration (CWE). The work proposed is an extension of Misuse Case Oriented Quality Requirements (MCOQR) framework and metrics and includes software application-specific database. The research work also highlights the areas where further research work can be carried out to further strengthen the entire system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Taylor, P. (2015). The importance of information and communication technologies (ICTs): An integration of the extant literature on ICT adoption in small and medium enterprises. International Journal of Economics, Commerce and Management, 3(5).
Banerjee, C., & Pandey, S. K. (2009). Software security rules. SDLC Perspective. arXiv preprint: 0911.0494.
Chess, B., Do, A., Fay, S., & Thornton, R. (2016). U.S. Patent No. 9,400,889. Washington, DC: U.S. Patent and Trademark Office.
Roztocki, N., & Weistroffer, H. R. (2015). Information and communication technology in transition economies: An assessment of research trends. Information Technology for Development, 21(3), 330–364.
Poonia, A. S., Banerjee, C., Banerjee, A., & Sharma, S. K. (2018). Vulnerability identification and misuse case classification framework. In Soft computing: Theories and applications (pp. 659–666). Singapore: Springer.
Banerjee, C., Banerjee, A., & Sharma, S. K. (2018). Estimating influence of threat using Misuse Case Oriented Quality Requirements (MCOQR) metrics: Security requirements engineering perspective. International Journal of Hybrid Intelligence Systems (IJHIS), 14(1–2), 1–11. USA: IOS Press, MIRS Lab. ISSN 1875-8819.
Banerjee, C., Banerjee, A., Poonia, A. S., Sharma, S. K., & Pandey, S. K. (2018). Improvising the results of Misuse Case Oriented Quality Requirements (MCOQR) framework metrics: Secondary objective perspective. In Proceeding of International Conference on Soft Computing: Theories and Applications SoCTA 2017, Advances in Intelligent Systems and Computing, New York: Springer Publication.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Choudhary, S., Banerjee, C., Poonia, A.S., Banerjee, A., Sharma, S.K. (2020). Proposed Data Structure for Storage of Metrics Values: Misuse Case Oriented Quality Requirements (MCOQR) Framework Perspective. In: Pant, M., Sharma, T., Basterrech, S., Banerjee, C. (eds) Performance Management of Integrated Systems and its Applications in Software Engineering. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-13-8253-6_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-8253-6_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8252-9
Online ISBN: 978-981-13-8253-6
eBook Packages: Business and ManagementBusiness and Management (R0)