{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:02Z","timestamp":1750308662802,"version":"3.41.0"},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T00:00:00Z","timestamp":1333411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2012,4,3]]},"abstract":"<jats:p>Various surveys indicate that over the past several years software security has risen in priority for many software organizations. Security quantification in early stage of software development life cycle assists security experts to address security related problems well in advance. Security assessment using model is proved to be one of the established methods. Keeping in view of the same, an Integrity Quantification Model (IQM) is proposed in this paper. An effort is made by authors to correlate design integrity with complexity factors. Object oriented design metrics are used to quantify complexity factors. The developed model has been validated with realistic (small set of) data to prove the significance.<\/jats:p>","DOI":"10.1145\/2108144.2108154","type":"journal-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:19:26Z","timestamp":1334060366000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Integrity quantification model for object oriented design"],"prefix":"10.1145","volume":"37","author":[{"given":"Suhel Ahmad","family":"Khan","sequence":"first","affiliation":[{"name":"Babasaheb Bhimrao Ambedkar, University, Lucknow"}]},{"given":"Raees Ahmad","family":"Khan","sequence":"additional","affiliation":[{"name":"Babasaheb Bhimrao Ambedkar, University, Lucknow"}]}],"member":"320","published-online":{"date-parts":[[2012,4,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"G. Booch \"Object Oriented Analysis and Design with Application\" Addison Wesley 3rd Edition ISBN-0-201-89551-X   G. Booch \"Object Oriented Analysis and Design with Application\" Addison Wesley 3rd Edition ISBN-0-201-89551-X"},{"key":"e_1_2_1_2_1","unstructured":"Available at www: cert.org  Available at www: cert.org"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/986655.986664"},{"volume-title":"Proc.of National Information Systems Security Conference","year":"1997","author":"Wang","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/117954.117970"},{"key":"e_1_2_1_6_1","unstructured":"G.H. Walton T. A. Longstaff R.C. Linder Computational Evaluation of Software Security Attributes IEEE 1997.  G.H. Walton T. A. Longstaff R.C. Linder Computational Evaluation of Software Security Attributes IEEE 1997."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1523103.1523250"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.142"},{"volume-title":"Proceeding of the First International Software Metrics Symposium","year":"1993","author":"Henry L.W.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5120\/1309-1735"},{"issue":"3","key":"e_1_2_1_11_1","first-page":"1549","volume":"1","author":"Mustafa K.","year":"2005","journal-title":"Journal of Comp. Sci."},{"key":"e_1_2_1_12_1","unstructured":"Dr. Linda Rogenberg Dinnis Brennan \"Principle Components of Orthogonal Object Oriented Metrics (323-08-14)\" White Paper Analyzing Results of NASA Object oriented Data Oct 2001  Dr. Linda Rogenberg Dinnis Brennan \"Principle Components of Orthogonal Object Oriented Metrics (323-08-14)\" White Paper Analyzing Results of NASA Object oriented Data Oct 2001"},{"key":"e_1_2_1_13_1","unstructured":"M. Dowd John Mcdonald \"The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities\" Addison Wesley Professional ISBN: 978-0-321-44442-4   M. Dowd John Mcdonald \"The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities\" Addison Wesley Professional ISBN: 978-0-321-44442-4"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.345830"},{"issue":"4","key":"e_1_2_1_15_1","first-page":"83","volume":"2","author":"Chandra S.","year":"2009","journal-title":"International Journal of Recent Trends in Engineering"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2108144.2108154","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2108144.2108154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:26Z","timestamp":1750276826000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2108144.2108154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,3]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4,3]]}},"alternative-id":["10.1145\/2108144.2108154"],"URL":"https:\/\/doi.org\/10.1145\/2108144.2108154","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2012,4,3]]},"assertion":[{"value":"2012-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}