Skip to main content

Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10158))

Included in the following conference series:

  • 906 Accesses

Abstract

Paying attention to authenticity, as a security requirement, in the early phases of the software life-cycle (such as requirement and-or design) can save project cost, time, and effort. However, in the ISO 25010 quality model which describes quality sub-characteristics, authenticity measures are not explicitly described, neither are they documented with sufficient details. This paper proposes a clear and precise way of measuring the “authenticity” sub-characteristic based on structural and functional size measurements. This combination can be used to identify the risk of authenticity violation in the design phase. An example of Facebook Web User Authentication is used to illustrate our proposed measurement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wagner, S.: Software Product Quality Control, pp. XII–210. Springer, Heidelberg. doi:10.1007/978-3-642-38571-1, ISSN 978-3-642- 38571-1

  2. ISO/IEC 25021:2012 Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – Quality measure elements

    Google Scholar 

  3. ISO/IEC 25000:2014 Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – Guide to SQuaRE

    Google Scholar 

  4. ISO/IEC 25010:2011 Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – System and software quality models

    Google Scholar 

  5. ISO/IEC 9126-1:2001 Software engineering – Product quality – Part 1

    Google Scholar 

  6. ISO/IEC 25020:2007 Software engineering – Software product Quality Requirements and Evaluation (SQuaRE) – Measurement reference model and guide

    Google Scholar 

  7. ISO/IEC DIS 25022.2 Systems and software engineering – Systems and software quality requirements and evaluation (SQuaRE) – Measurement of quality in use

    Google Scholar 

  8. ISO/IEC DIS 25023.2 Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE) – Measurement of system and software product quality

    Google Scholar 

  9. CISQ Specifications for Automated Quality Characteristic Measures Object Management Group, ISO/IEC 2502n – Quality Measurement Division (2012)

    Google Scholar 

  10. Karine, M.M., Jannik, L., Stéphane, D.: Modèles de mesure de la qualité des logiciels (2011)

    Google Scholar 

  11. Heitlager, I., Kuipers, T., Visser, J.: A practical model for measuring maintainability. In: 6th International Conference on the Quality of Information and Communications Technology (QUATIC 2007), pp. 30–39 (2007)

    Google Scholar 

  12. Janusz, Z., Steven, D., Andrew, J.K.: Measuring security: a challenge for the generation. In: Position papers of the Federated Conference on Computer Science and Information Systems, pp. 131–140

    Google Scholar 

  13. Asma, S., Hela, H., Alain, A., Hanene, B-A.: A measurement method for sizing the structure of UML sequence diagrams. Inf. Softw. Technol. 59, 222–232 (2015). http://dx.doi.org/10.1016/j.infsof.2014.11.002. IST-Elsevier

  14. Al-Qutaish, R.E: An investigation of the weaknesses of the ISO 9126 International Standard. In: Second International Conference on Computer and Electrical Engineering

    Google Scholar 

  15. Software Engineering - Software Product Quality Requirements and Evaluation (SQuaRE) Guide to SQuaRE (ISO/IEC 25000). International Organization for Standardization, Geneva (2005)

    Google Scholar 

  16. Won, Sh., Jin-Lee, L., Doo-Ho, P., Chun-Hyon, C.: Design of authenticity evaluation metric for android applications. In: 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), pp. 275–278, 6–8 May 2014

    Google Scholar 

  17. Haiyun, X., Jeroen, H., Joost, V.: A practical model for rating software security. In: 2013 IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), pp. 231–232, 18–20 June 2013

    Google Scholar 

  18. Jean-Marc, D.: Software Measurement. In: Analysis of ISO/IEC 9126 and 25010

    Google Scholar 

  19. ISO/IEC 14598-1:1999 Information technology – Software product evaluation – Part 1: General overview

    Google Scholar 

  20. Al-Badareen, A.B., Desharnais, J.-M., Abran, A.: A suite of rules for developing and evaluating software quality models. In: Kobyliński, A., Czarnacka-Chrobot, B., Świerczek, J. (eds.) IWSM/Mensura-2015. LNBIP, vol. 230, pp. 1–13. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24285-9_1

    Chapter  Google Scholar 

  21. http://www.uml-diagrams.org/

  22. Al-Badareen, A.B., Selamat, M.H., Jabar, M.A., Din, J., Turaev, S.: Software quality models: a comparative study. In: Mohamad Zain, J., Wan Mohd, W.M., El-Qawasmeh, E. (eds.) ICSECS 2011. CCIS, vol. 179, pp. 46–55. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22170-5_4

    Chapter  Google Scholar 

  23. Guillaume, H.: Failles de sécurité des applications web principes. parades et bonnes pratiques de développement, 03 April 2012

    Google Scholar 

  24. Alain, A., Jean-Marc, D., Barbara, K., Dylan, R., Charles, S., Steve, W.: Guideline on Non-Functional & Project Requirements, November 2015

    Google Scholar 

  25. http://cosmic-sizing.org/cosmic-fsm/

  26. Alain, A.: Software Metrics and Software Metrology. Wiley, IEEE Computer Society Press, Hoboken (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hela Hakim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hakim, H., Sellami, A., Ben Abddallah, H. (2017). Analyzing the Risk of Authenticity Violation Based on the Structural and Functional Sizes of UML Sequence Diagrams. In: Cuppens, F., Cuppens, N., Lanet, JL., Legay, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2016. Lecture Notes in Computer Science(), vol 10158. Springer, Cham. https://doi.org/10.1007/978-3-319-54876-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54876-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54875-3

  • Online ISBN: 978-3-319-54876-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy