2019 1st International Conference on Artificial Intelligence and Data Sciences (AiDAS) 2019
DOI: 10.1109/aidas47888.2019.8971014
|View full text |Cite
|
Sign up to set email alerts
|

A Review Paper: Security Requirement Patterns for a Secure Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…In this stage, it is important to monitor responses to flaws and vulnerabilities of the system to check for newly evolved security threats. "After identifying new security risks, the same should be included in the requirement stage for further security improvements in subsequent releases" [67,103]. "Static analysis and peer review are two useful procedures for mitigating or minimizing newly discovered vulnerabilities" [14].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this stage, it is important to monitor responses to flaws and vulnerabilities of the system to check for newly evolved security threats. "After identifying new security risks, the same should be included in the requirement stage for further security improvements in subsequent releases" [67,103]. "Static analysis and peer review are two useful procedures for mitigating or minimizing newly discovered vulnerabilities" [14].…”
Section: Discussionmentioning
confidence: 99%
“…"After the software is deployed into its operational environment, it is important to monitor responses to flaws and vulnerabilities of the system to check for new evolved security patterns" [67,103]. "After identifying new security patterns, the same should bed included in the requirement stage for further security improvements in subsequent releases" [67,103]. "Static analysis and peer review are two useful procedures for mitigating or minimizing newly discovered vulnerabilities" [14].…”
Section: ) Best Practices For Deploying Secure Softwarementioning
confidence: 99%
“…The current literature on requirement security has yielded different security risks that might occur if security is not incorporated from the beginning [157]. For instance, some security risks inherent in the requirement phase of SDLC are discussed in [10], [83], [112], [150], [158], [159]. In addition, design flaws have been noted to be one of the most common sources of security threats [160] in software systems [75], [161].…”
Section: The Rising Need For Software Quality and Securitymentioning
confidence: 99%
“…As discussed in [99] and [158], after the software is deployed into its operational environment, it is critical to monitor responses to flaws and vulnerabilities of the system to check for new evolved security patterns. After the identification of new security patterns, the same should be included in the requirement stage for further security improvements in subsequent releases.…”
Section: Approaches To Software Quality and Securitymentioning
confidence: 99%
See 1 more Smart Citation