Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection 


Vol. 38,  No. 8, pp. 651-662, Aug.  2013


PDF
  Abstract

In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197 secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Choi, W. Kim, W. Park, K. Kook, "Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 651-662, 2013. DOI: .

[ACM Style]

June-sung Choi, Woo-je Kim, Won-hyung Park, and Kwang-ho Kook. 2013. Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection. The Journal of Korean Institute of Communications and Information Sciences, 38, 8, (2013), 651-662. DOI: .

[KICS Style]

June-sung Choi, Woo-je Kim, Won-hyung Park, Kwang-ho Kook, "Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 651-662, 8. 2013.