2017
DOI: 10.1007/978-3-319-64218-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Integration of Security Practices in the Software Implementation Process of ISO/IEC 29110: A Mapping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Our analysis reveals that some strategies have received more attention than others in the 14 reviewed studies. For example, a total of 7 articles address security throughout the Software Development Life Cycle (SDLC) via security practices [75], [76], [7], [73], [77], [78], [79]. This represents 10.1% of the total reviewed articles, indicating a relatively low proportion of studies focusing on addressing security comprehensively in all stages of the software development lifecycle.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Our analysis reveals that some strategies have received more attention than others in the 14 reviewed studies. For example, a total of 7 articles address security throughout the Software Development Life Cycle (SDLC) via security practices [75], [76], [7], [73], [77], [78], [79]. This represents 10.1% of the total reviewed articles, indicating a relatively low proportion of studies focusing on addressing security comprehensively in all stages of the software development lifecycle.…”
Section: Discussionmentioning
confidence: 99%
“…Another benefit is the guarantee to reach a high level of quality and functionality of the software maximizing the added value to the software by the benefits of developing a robust software. Development Life Cycle (SDLC) through security practices [75], [76], [7], [73], [77], [78], [79]. This represents 10.1% of the total reviewed articles, indicating that there is a relatively low proportion of studies that focus on addressing security comprehensively in all stages of the software development cycle.…”
Section: Articlementioning
confidence: 99%
See 1 more Smart Citation
“…We have distributed and used these practices to build our assessment framework, which is presented in the next section. [3], [15], [16], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [42], [61], [62], [63], [64], [ Use a scheme to classify applications based on data confidentiality 3 [42], [60], [65] 6 Perform design and architecture security risk analysis 15 [58], [61], [65] , [66], [67], [68], [69], [70], [50], [71], [72], [73], [74], [75] 7…”
Section: B Secure Software Design Practicesmentioning
confidence: 99%
“…[56], [54], [67], [74], [76] 8 Security specification review 2 [67], [71] 9 Minimize software attack surface or access points 8 [3], [15], [45], [49], [57], [70], [75] 10 Identify and segregate trusted entities from untrusted entities 8 [3], [46], [55], [58], [67], [70], [71], [77] 11 18 Design security features using diagrams 2 [67], [68] 19 Consider security principles in design 14 [5], [16], [45], [49], [55], [56], [57], [61], [62], [65], [70], [72], [74], [79] 20 Minimize or eliminate unnecessary functionality 3 [67], [71], [ [16], [42], [49], [56], [64], [73], [77], [80]…”
Section: B Secure Software Design Practicesmentioning
confidence: 99%