2014
DOI: 10.1007/978-3-319-07452-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Engineering Approaches in the Secure Software Development Life Cycle

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Therefore, it is necessary to consider security aspects from the early phases of development. The first phase should identify the software security requirements and lay the foundation with high-level requirement models to continue developing secure software in the next phases [5].…”
Section: Rq2: What Are the Most Prominent Activities And What Methodmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, it is necessary to consider security aspects from the early phases of development. The first phase should identify the software security requirements and lay the foundation with high-level requirement models to continue developing secure software in the next phases [5].…”
Section: Rq2: What Are the Most Prominent Activities And What Methodmentioning
confidence: 99%
“…The secure software development process comprises software requirements security, software design security, software construction security, and software testing security. This process aims to enrich security requirements, use threat models methodologies during software design, and apply best security practices for coding, code reviews, and tests [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…NESSoS, through the construction of its CBK, aims to set up a long-term research community on secure services and systems technology, bringing together researchers and professionals from the fields of security, computing and software technology (Beckers and Heisel, 2013). Based on NESSoS CBK, researchers (Busch et al , 2014a; Busch et al , 2014b) created SecEval, which is an assessment framework for secure systems technology. Further, SecWAO, an ontology based on SecEval, for secure online applications was published (Busch and Wirsing, 2015).…”
Section: Related Workmentioning
confidence: 99%