2014
DOI: 10.1016/j.sbspro.2014.03.712
|View full text |Cite
|
Sign up to set email alerts
|

Secure Feature Driven Development (SFDD) Model for Secure Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
18
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(22 citation statements)
references
References 16 publications
1
18
0
2
Order By: Relevance
“…The feature is defined by using action, result and object. Authors in [5] proposed Secure Feature Driven Development (SFDD), an enhanced version of FDD which introduced some changes in classical FDD to cover security related issues. The proposed model introduced two phases in classical FDD named "Build security by feature" and "Test security by feature" along with the "In-phase Security" element in each phase.…”
Section: Related Workmentioning
confidence: 99%
“…The feature is defined by using action, result and object. Authors in [5] proposed Secure Feature Driven Development (SFDD), an enhanced version of FDD which introduced some changes in classical FDD to cover security related issues. The proposed model introduced two phases in classical FDD named "Build security by feature" and "Test security by feature" along with the "In-phase Security" element in each phase.…”
Section: Related Workmentioning
confidence: 99%
“…It is a hybrid process model that integrated the practices from Extreme Programming and Feature Driven Requirement Reuse Development (FDRD). FDRD is an enhanced version of FDD presented in [16]. Authors claimed that CDD is a self-realizing requirement generation model.…”
Section: Related Workmentioning
confidence: 99%
“…Firdaus et al [16] proposed an enhanced version of FDD called Secure Feature Driven Development (SFDD) for the purpose of secure software development. This model tried to cover security related issues of FDD by making some changes in classical FDD process model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…All software faces threats from various potential malicious adversaries that are becoming more numerous every day. Threatened software includes internet‐aware applications running on personal computers, complex telecommunications, power systems accessible over the internet, and commodity software with copy protection mechanisms . These threats, and many others, can impose a significant challenge to software engineers, who must design security measures as part of their risk management activities; in addition, they are expected to design appropriate security requirements and policies.…”
Section: Introductionmentioning
confidence: 99%