M. Nadeem, Masood Ahmad, Syed Anas Ansar, Prabhash Chandra Pathak, Rajeev Kumar, R. Khan
{"title":"Security Evaluation of Software by Using Fuzzy-TOPSIS through Quantum Criteria","authors":"M. Nadeem, Masood Ahmad, Syed Anas Ansar, Prabhash Chandra Pathak, Rajeev Kumar, R. Khan","doi":"10.2174/2666294902666230817162030","DOIUrl":null,"url":null,"abstract":"\n\nQuantum computer development attracts the security experts of software. The rapid development of number of qubit in quantum computer makes the present security mechanism of software insecure. Software developers need to pay attention to the development of quantum computers in terms of software security.\n\n\n\nSoftware security evaluation focuses on the fundamental security features of software as well as the quantum enable security alternatives. The software security evaluation is the most crucial part of surveying, controlling, and administering security in order to further improve the properties of safety.\n\n\n\nIt's crucial to understand that performing a security assessment early on in the develop-ment process can help you find bugs, vulnerabilities, faults, and attacks. In this quantitative study, the definition and use of the quantum computing security approach in software security will be cov-ered. The cryptographic calculations had to secure our institutions based on computers and networks.\n\n\n\nThe Fuzzy Technique for Order Preference by Similarity to Ideal Situation (Fuzzy-TOPSIS) to quantitatively assess the rank of the quantum enable security alternatives with security factors.\n\n\n\nThe Quantum Key Distribution [A2], the quantum technique of security approach, has got the top priority and quantum key distribution in GHz state [A6] got the least in the estimation of software security during the era of quantum computer by the neural network method of Fuzzy-TOPSIS.\n\n\n\nThe quantum mechanism of computing makes classical computing insecure. The secu-rity estimation of software makes developers focus on the quantum mechanism of security. The quantum mechanism of quantum key distribution is to make software secure.\n","PeriodicalId":436903,"journal":{"name":"Journal of Fuzzy Logic and Modeling in Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Fuzzy Logic and Modeling in Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/2666294902666230817162030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Quantum computer development attracts the security experts of software. The rapid development of number of qubit in quantum computer makes the present security mechanism of software insecure. Software developers need to pay attention to the development of quantum computers in terms of software security.
Software security evaluation focuses on the fundamental security features of software as well as the quantum enable security alternatives. The software security evaluation is the most crucial part of surveying, controlling, and administering security in order to further improve the properties of safety.
It's crucial to understand that performing a security assessment early on in the develop-ment process can help you find bugs, vulnerabilities, faults, and attacks. In this quantitative study, the definition and use of the quantum computing security approach in software security will be cov-ered. The cryptographic calculations had to secure our institutions based on computers and networks.
The Fuzzy Technique for Order Preference by Similarity to Ideal Situation (Fuzzy-TOPSIS) to quantitatively assess the rank of the quantum enable security alternatives with security factors.
The Quantum Key Distribution [A2], the quantum technique of security approach, has got the top priority and quantum key distribution in GHz state [A6] got the least in the estimation of software security during the era of quantum computer by the neural network method of Fuzzy-TOPSIS.
The quantum mechanism of computing makes classical computing insecure. The secu-rity estimation of software makes developers focus on the quantum mechanism of security. The quantum mechanism of quantum key distribution is to make software secure.