Transferring components from one environment to another is referred to as portability. This portability is also considered an important factor in the proposed system. During transfer the necessary alteration can be made. The transfer of components must be done quickly and easily to the appropriate surroundings. The time and cost adopted for portability must be reduced. This portable factor is considered significant in the case of this Component-Related Development because the use and reuse of the component will be in varying environments. There are certain components which do not depend upon the platform. In this situation portability can be easily achieved. This implies the component to be transferred must not depend on the platform. On the site www.jars.com the components that are found seem to be easily portable because the surroundings do not require any alteration and can be used effectively in various sorts of application. But for certain components, if they get transferred from one environment to other, alteration is must. Due to these reasons the of portability factor is considered as significant in Component-Related Development. This implies that in estimation of component selection efforts, portability can be considered an important factor. The selection seems to be larger if the portable nature of the component is high.
Functionality is based on the number of functions and their related properties. The specific function will be offered by the component. Based on this function the process must be carried out by the component under certain circumstances. Already existing components will offer low cost and faster delivery. The selection of effort is high if the functionality is found to be higher.
The information that is transmitted, processed, stored, and created by the software must be secured and is the main objective in software; its availability, integrity, and confidentiality must be preserved. The executed program, as well as the resources, must be protected. The secured software has high probability because the data will be safe from any sort of modification or unauthorized access and the information will be in a stable condition A high rate of guarantee is necessary in certain sorts of application. Limitations in security have a significant effect on software in two major ways. One is functional security. In this the size of the function that is created in software is increased. The necessity of this function must be considered along with all other functional necessities and must be cleared on using homegrown code or COTS components. Another is nonfunctional security. In this, additional processes is required to achieve a certain level of guarantee in security verifications, testing, and documentation. The black box products will mostly create COTS components. These black boxes are referred to as third parties. Within an enterprise’s information system utilization of this component will create significant potential risk affecting reliability and security. For instance, if certain organizations use the internet through COTS components the data stored can be leaked to the global network.
In cases of accessing unauthorized services or resources by the component: For instance, the past file can be read by the attacker by means of sent mail and share it with an external user.
Unauthorized access to the resource by the component: The alternative component may also fail in this approach. For instance, the web server which is broken in an attempt to write in a HTML file, then either only reading can be carried out or else overwriting on the home page can be done.
Certain authorized rights may be misused by the component: For instance, the root privilege can be given as a command by an attacker in order to obtain full control of the system.
The ability of the component to protect any unauthorized access to the services is referred to as security. The estimation of effort in component selection will be gradually lowered if enhanced security is found in the component.
The capability of the component to render its specified function is referred to as the performance parameter. Any lack of performance is because of component technology. The main reason is that the run time system uses a resource which lacks in performance. Through an interaction mechanism the performance is also affected. Optimization can be carried out within the component to enhance the performance, but during this process the appropriate feature must not be affected. To evaluate the performance, the testing of the component needs to be carried out in various platforms. The component exhibits two types of behavior. To evaluate the performance these behaviors have to be tested. The two behaviors of the component are mentioned as follows.
Time behavior: In the appropriate circumstances, the capability of the component to carry out particular tasks at the right time.
Resource behavior: In the specified circumstances the quantity of resources utilized is referred to as resource behavior.
Through the values obtained from the parameters the ability of performance and how accurate it is can be analyzed. As performance increases the component selection effort is gradually decreased.