skip to main content
research-article

Availability state transition model

Published:05 May 2011Publication History
Skip Abstract Section

Abstract

Several security mechanisms such as digital signature, timestamp audits and trails, encryption, throttling, filtering, protect secrets etc. are available. These security mechanisms are not completely able to stop malicious attacks. For malicious hackers and attackers it is comparatively easy to exploit security loopholes at the user's end side. Behind such type of problem the main reason is bad software design and its implementation without proper risk analysis and mitigation. So, an idea to model availability states an Availability State Transition Model (ASTM) has been proposed in this article. In ASTM methodology, only design level details is required which can be easily retrieved from the software's design.

References

  1. Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Asoke K Talukder, Alwyn Roshan Pais, "Suraksha: A Security Designers' Workbench", presented in Hack.in 2009, IIT Kanpur, India, 17-19 March 2009.Google ScholarGoogle Scholar
  2. Asoke K Talukder, Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Jevitha K P, Saurabh Samanta, Alwyn Roshan Pais, "Security-aware Software Development Life Cycle (SaSDLC) -- Processes and Tools", presented in WOCN 2009, Cairo, Egypt, 28-30 April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bharat B. Madan, Katerina Goseva-Popstojanova, Kalyanaraman Vaidyanathan and Kishor S. Trivedi "Modeling and Quantification of Security Attributes of Software Systems", Proceedings of the International Conference on Dependable Systems and Networks (DSN'02), IEEE, 2002, pp: 505--514. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Availability state transition model

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in

                      Full Access

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader