Open Access iconOpen Access

ARTICLE

crossmark

Managing Software Security Risks through an Integrated Computational Method

Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

1 Department of Information Technology, College of Computers and Information Technology, Taif University, P. O. Box 11099, Taif 21944, Saudi Arabia
2 Department of Computer Science, College of Computers and Information Technology, Taif University, P. O. Box 11099, Taif 21944, Saudi Arabia
3 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India
4 Department of Computer Application, Shri Ramswaroop Memorial University, Lucknow, 225003, India

* Corresponding Author: Rajeev Kumar. Email: email

Intelligent Automation & Soft Computing 2021, 28(1), 179-194. https://doi.org/10.32604/iasc.2021.016646

Abstract

Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must meticulously follow the Multi-Criteria Decision-Making (MCDM) methodology in the assortment of the most effective procedure for security assessment right from the developmental phase of the application. To address the security-related issues in web-based healthcare applications, we have followed the fuzzy-based integrated technique to assess the security risk of web-based healthcare applications. Further, the integrated technology is the combination of Analytic Hierarchy Process (F-AHP) and Technique for Order of Preference by Similarity to Ideal Solution (F-TOPSIS) techniques. The F-AHP approach gives the weights of the factors. We classified the risks into two-levels, Level one had the safety measures factors such as access control, integrity, confidentiality, and, authentication. We selected ten different web-based healthcare applications as alternatives. The calculations based on the proposed methodology ranked the pattern system for access control to be the most prioritized attribute. The outcomes of the study and the procedure used in this assessment would support future research and specialists’ initiatives in organizing web applications through advanced supportable safety and security.

Keywords


Cite This Article

APA Style
Alharbi, A., Alosaimi, W., Alyami, H., Nadeem, M., Faizan, M. et al. (2021). Managing software security risks through an integrated computational method. Intelligent Automation & Soft Computing, 28(1), 179-194. https://doi.org/10.32604/iasc.2021.016646
Vancouver Style
Alharbi A, Alosaimi W, Alyami H, Nadeem M, Faizan M, Agrawal A, et al. Managing software security risks through an integrated computational method. Intell Automat Soft Comput . 2021;28(1):179-194 https://doi.org/10.32604/iasc.2021.016646
IEEE Style
A. Alharbi et al., “Managing Software Security Risks through an Integrated Computational Method,” Intell. Automat. Soft Comput. , vol. 28, no. 1, pp. 179-194, 2021. https://doi.org/10.32604/iasc.2021.016646

Citations




cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2179

    View

  • 1192

    Download

  • 2

    Like

Share Link