2014
DOI: 10.3844/jcssp.2014.1411.1417
|View full text |Cite
|
Sign up to set email alerts
|

Awareness of Embedding Security Features Into Component-Based Software Development Model: A Survey

Abstract: Current applications and systems contain the software components as the basic elements and Component Based Software Development (CBSD) has been successful in building applications and systems. However, the security of CBSD for the software component is still lacking. This study highlights the results of a survey pertaining to the embedding of security features in the CBSD process. The main objective of this survey is to investigate the awareness of embedding security features in the CBSD process in the Malaysi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…To adopt evidence-based practical and theoretical perspectives, researchers, especially in the penetration testing domain, rely on solid empirical evidence that reports methodologies, frameworks, models, and practices. Systematic literature review (SLR) is one of the most suitable methods to encourage evidence-based security practices [93][94][95][96][97][98]. Researchers followed the SLR rules proposed by Kitchenham & Charters [56] and Keele & Bell [99].…”
Section: -3-research Methodologymentioning
confidence: 99%
“…To adopt evidence-based practical and theoretical perspectives, researchers, especially in the penetration testing domain, rely on solid empirical evidence that reports methodologies, frameworks, models, and practices. Systematic literature review (SLR) is one of the most suitable methods to encourage evidence-based security practices [93][94][95][96][97][98]. Researchers followed the SLR rules proposed by Kitchenham & Charters [56] and Keele & Bell [99].…”
Section: -3-research Methodologymentioning
confidence: 99%
“…This study aims to find out the use and importance of integrating IoT with e-learning systems. The strategies and rules presented by [75][76][77][78][79] were adopted in the review process of this paper. Fig.…”
Section: Methodsmentioning
confidence: 99%
“…Traditionally, dependability attributes such as reliability, safety, and integrity are treated as afterthoughts, implemented after the software component is developed. Thus, evaluating component-based software for dependability attributes is critical in determining system dependability [8,[33][34][35][36][37][38].…”
Section: Motivationmentioning
confidence: 99%
“…[32], the awareness survey in Ref. [38], and the vulnerability assessment on selected web applications in Ref. [36] all inspired the design of MDDS-CBSD.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation