JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection
Choi, June-Sung; Kim, Woo-Je; Park, Won-Hyung; Kook, Kwang-Ho;
  PDF(new window)
 Abstract
In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197 secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.
 Keywords
SW Secure Development;Secure Coding;Warfare System Software;C4I Systems SW;
 Language
Korean
 Cited by
1.
무기체계 내장형 소프트웨어 시큐어 코딩 교육 과정 설계,최준성;박상현;이정민;국광호;

보안공학연구논문지, 2015. vol.12. 4, pp.351-362 crossref(new window)
 References
1.
Ban gjiho, Halan, Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software, THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY(KICS), vol. 38, no. 4, pp 335-343, 2013 crossref(new window)

2.
Jeong dahye, Choejin-yeong, Leesonghui, Nuclear-related Software analysis based on secure coding, Journal of Korea Institute of Information Security and Cryptology, vol. 23 no. 2, pp. 243-250, 2013 crossref(new window)

3.
Hangyeongsuk, KimTaeHwan, Hagiyoung, Imjaemyeong, Pyochangwoo, An Improvement of the Guideline of Secure Software Development for Korea E-Government, Journal of Korea Institute of Information Security and Cryptology, vol. 22 no. 5, pp1179-1189, 2012

4.
Kim dongwon, Han geunhui, A Study on Self Assessment of Mobile Secure Coding, Journal of Korea Institute of Information Security and Cryptology, vol. 22 no. 4, pp. 901-911, 2012

5.
Kim seonggeun, Lee jaeil, Analyzing Secure Coding Initiatives: An Ecosystem Approach, Journal of Korea Institute of Information Security and Cryptology, vol. 22 no. 5, pp. 1205-1216, 2012

6.
Junesung choi, Wooje Kim, Wonhyung Park, Kwangho Kook, Defense SW Secure Coding Application Method for Cyberwarfare Focused on the warfare System Embedded SW Application Level, Journal of Korea Association of Defense Industry Studies, vol. 19, no. 2, pp. 91-103, 2012

7.
Junesung choi, Wooje Kim, Kwangho Kook, warfare System Embedded SW Secure Coding Application Method, 2012 KORMS Proceedings pp. 1454-1466, 2012

8.
Bongwoo Lee, JaHee Kim, wooje Kim, "ITS project manager research core competencies Using QFD and AHP", Journal of IT Service, vol. 10, no. 1, pp. 89-103, 2011

9.
JaHee Kim, Wooje Kim, hyeongi Cho, eunyoung Lee, minwoo Seo, A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP, IE Interfaces, vol. 25, no. 1, pp. 96-105, 2012 crossref(new window)

10.
LeeBuyoon, Alerts on Car hacking vulnerability, Journal of Mechanics , vol. 51, no. 11, pp. 10-11, 2011

11.
Kimjungkook, Kimseyoung, Threat to weapon system in the cyberwar, Latest Technology Trends, Defense Technology and Quality, pp. 4-9, 2011

12.
MOPAS, Administrative information system notice amendment to the operating instructions, 2012

13.
MOPAS, Information System Audit Guide Line, 2012

14.
MOPAS, Software Development Secure Coding Guide, 2012

15.
MOPAS, JAVA Security Coding Guide, 2012

16.
MOPAS, Android Security Coding Guide, 2012

17.
MOPAS, Diagnostic software security weaknesses Guide, 2012

18.
Nor Harisah Zainuddin, "Secure Coding in Software Development", 2011 5th Malaysian Conference in Software Engineering, 2011

19.
Kittipong Kittichokechai, "Secure Source Coding with Action-dependent Side Information", 2011 IEEE Inetrnational Symposium on Information Theory Procdeedings

20.
Ravi Tandon, "Secure Source Coding with a Helper", IEEE TRANSACTIONS ON INFORMATION THEORY, 2011

21.
Robert C. Seacord, "Secure Coding in C and C++", Addison-Wesley Professional, 2005

22.
Fred Long, Dhruv Mohindra,Robert C. Seacord, Dean F.Sutherland, David Svoboda, "The Cert Oracle Secure Coding Standard for Java", Prentice Hall, (2008)

23.
Robert C. Seacord, "The CERT Secure Coding Standard for C", Addison-Wesley, 2008

24.
James F Dunnigan, "How to Make War : A Comprehensive Guide to Modern Warfare in the Twenty-First Century", Quill, 2003

25.
http://www.misra-c.com/Activities/MISRAC/tabid/160/Default.a, 2012.6.1