2019
DOI: 10.1007/978-981-15-1465-4_54
|View full text |Cite
|
Sign up to set email alerts
|

A Study on IT Security Control by Comparison of Secure Software Development Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Monitoring applications are commonly developed to monitor or detect development problems [5]. One of the approaches in monitoring applications for software development in terms of handling projects is by automatically extracting process definition in the form of constraint (i.e., Jira tracing tools) which generate mining reports for different types of issues across projects and at different times.…”
Section: Monitoring Applicationmentioning
confidence: 99%
See 4 more Smart Citations
“…Monitoring applications are commonly developed to monitor or detect development problems [5]. One of the approaches in monitoring applications for software development in terms of handling projects is by automatically extracting process definition in the form of constraint (i.e., Jira tracing tools) which generate mining reports for different types of issues across projects and at different times.…”
Section: Monitoring Applicationmentioning
confidence: 99%
“…Integrating risk management in SDLC and applying risk management to the application of SDLC are unceasing issues [5]. Predominantly, the integration between risk management and software models is conducted in a rapid application concept instead of a full development process, for example, SDLC [8][9][10].…”
Section: Secure Software Developmentmentioning
confidence: 99%
See 3 more Smart Citations