2014
DOI: 10.4018/ijsse.2014070104
|View full text |Cite
|
Sign up to set email alerts
|

Meta-Modeling Based Secure Software Development Processes

Abstract: This work suggests a multilevel support to software developers, who often lack knowledge and skills on how to proceed to develop secure software. In fact, developing software with such quality is a hard and complex task that involves many additional security-dedicated activities which are usually omitted in traditional software development lifecycles or integrated but not efficiently and appropriately deployed in some others. To federate all these software security-assurance activities in a structured way and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…A policy or security method (Table V) can be introduced through a standard, model, rule, principle or security directive (Essafi and Ben Ghazela, 2014). Given the SOA deployment, there are significant security vulnerabilities and security needs become critical.…”
Section: The Personalized Secure Composition Frameworkmentioning
confidence: 99%
“…A policy or security method (Table V) can be introduced through a standard, model, rule, principle or security directive (Essafi and Ben Ghazela, 2014). Given the SOA deployment, there are significant security vulnerabilities and security needs become critical.…”
Section: The Personalized Secure Composition Frameworkmentioning
confidence: 99%
“…Additionally, existing test methodologies, for example, unit testing or incorporation testing work for testing usefulness. These must be stretched out keeping in mind the end goal to suit express security testing .…”
Section: Introductionmentioning
confidence: 99%
“…Developing high‐quality software is a labor‐intensive, complex task. It involves additional security‐dedicated activities that are usually omitted in traditional SDLC . Because most developers are not trained in software security, Daud also stressed the importance of security requirements at each phase of the software life cycle in iterative development.…”
Section: Introductionmentioning
confidence: 99%