2013
DOI: 10.1016/j.ijinfomgt.2013.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Security considerations for the spiral development model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…[15] and The spiral model is consistent with an approach that includes multiple software builds and allows for an orderly transition to maintenance activities [7]. Spiral models can be implemented for IT infrastructure security [17] and security protects software products from deployment [14]. Implement the security development phase in a spiral model and propose new security [13].…”
Section: Rq1 What Research Topics Use the Spiral Method?mentioning
confidence: 99%
“…[15] and The spiral model is consistent with an approach that includes multiple software builds and allows for an orderly transition to maintenance activities [7]. Spiral models can be implemented for IT infrastructure security [17] and security protects software products from deployment [14]. Implement the security development phase in a spiral model and propose new security [13].…”
Section: Rq1 What Research Topics Use the Spiral Method?mentioning
confidence: 99%
“…Key words such as "security requirements", "Software development methodologies", "Software development framework", "Traditional Software Development Methods" and "Agile software Development Methods" were appropriately combined with Boolean operators of "AND", "NOT" and "OR", to identify only literatures which focused on elucidating security requirement gathering abilities in various software development methodologies. Some security requirement standards such as CC (Davoud Mougouei, Sani, & Almasi, 2013; Wäyrynen et al, 2004), SSE-CMM, SQUARE (Mead, Viswanathan, & Padmanabhan, 2008;Ray, 2013) and NIST recommendations on information security requirement considerations, were identified in the survey and explored for security requirement activities (Jones & Rastogi, 2004;Raj et al, 2014). The suitability of the software development methodologies, regarding information security requirement development in software, were then assessed by using the security requirement activities as a reference point.…”
Section: Methodsmentioning
confidence: 99%
“…In the spiral model, a partial list of the objectives, alternatives and constraints (Ray, 2013) are initially obtained. The model usually begins with this incomplete requirement but with add on functionalities as it progresses in its various stages.…”
Section: Security Requirements In Traditional Software Development Me...mentioning
confidence: 99%
“…(2) Research on managing the software development process via Capability Maturity Model CMM and CMMI [7,8]. (3) Research on software project life cycle models, such as waterfall model [9], iterative model, incremental model [10,11], and spiral model [12]. However, there are limited studies on the optimization of software project management processes using defect management.…”
Section: Introductionmentioning
confidence: 99%