2018 25th Australasian Software Engineering Conference (ASWEC) 2018
DOI: 10.1109/aswec.2018.00018
|View full text |Cite
|
Sign up to set email alerts
|

A Perception of the Practice of Software Security and Performance Verification

Abstract: Security and performance are critical nonfunctional requirements for software systems. Thus, it is crucial to include verification activities during software development to identify defects related to such requirements, avoiding their occurrence after release. Software verification, including testing and reviews, encompasses a set of activities that have a purpose of analyzing the software searching for defects. Security and performance verification are activities that look at defects related to these specific… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(15 citation statements)
references
References 63 publications
0
15
0
Order By: Relevance
“…Security verification refers to the technical verification of the application before deployment. Security verification aims to identify security breaches and to verify that the developed software meets security requirements [10,15]. Security verification is also nec- The security verification of software, also known as security assurance, spins around the following main techniques, as shown in Figure 1:…”
Section: Security Verification Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…Security verification refers to the technical verification of the application before deployment. Security verification aims to identify security breaches and to verify that the developed software meets security requirements [10,15]. Security verification is also nec- The security verification of software, also known as security assurance, spins around the following main techniques, as shown in Figure 1:…”
Section: Security Verification Techniquementioning
confidence: 99%
“…Log inspection is a systematic process that consists of seven activities, as shown in Figure 1. These activities include planning the inspection, holding kick-off meetings, performing individual checking, conducting log meetings, editing the document, verifying corrections, and inspection closure [8,10,16]. The verification team is responsible for performing log inspections.…”
Section: Log Inspectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Software Engineering, as a discipline, has undergone constant changes since its conception, with the Internet being another evolution that strongly influenced changes in the area [8][10][14] [13] and promoting the need to evolve the software technologies previously proposed and used to develop computational solutions becomes clearer [6][7]. Such modern systems have revealed intrinsic and multidisciplinary concerns and properties for which conventional software technologies are not appropriate [3][6][14].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, several units are present in the software model each unit are linked with one another and integrated with whole system [11]. The performance of the system is evaluated based on the unit intersection in the entire system [12].…”
Section: Introductionmentioning
confidence: 99%