2013
DOI: 10.1007/978-3-642-41488-6_10
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Evaluation of Security Activities in Agile Projects

Abstract: Abstract.We compare four high-profile waterfall security-engineering processes (CLASP, Microsoft SDL, Cigital Touchpoints and Common Criteria) with the available preconditions within agile processes. Then, using a survey study, agile security activities are identified and evaluated by practitioners from large companies, e.g. software and telecommunication companies. Those activities are compared and a specific security engineering process is suggested for an agile process setting that can provide high benefit … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 18 publications
(32 reference statements)
0
10
0
Order By: Relevance
“…Description: Assign roles to individuals with expertise on QRs to assist in the documentation of QRs in ASD. Empirical evidence from the literature reveals that assigning roles to individuals with expertise in security, usability, and quality assurance have been helpful for documenting and managing QRs [17], [52], [53].…”
Section: ) Allocate Roles and Responsibilities For Documenting And Ma...mentioning
confidence: 99%
“…Description: Assign roles to individuals with expertise on QRs to assist in the documentation of QRs in ASD. Empirical evidence from the literature reveals that assigning roles to individuals with expertise in security, usability, and quality assurance have been helpful for documenting and managing QRs [17], [52], [53].…”
Section: ) Allocate Roles and Responsibilities For Documenting And Ma...mentioning
confidence: 99%
“…In light of this large number of practices, one might expect that all practices that we found in our study have already been included in the literature-indeed, most of them have. For example, the practice of utilizing experts in the field of security can be found in Ayalew et al (2013) and S. Türpe and Poller (2017); the practice of using mock-ups (or "low-fi prototypes") for QRs is described in Wale-Kolade et al (2014); the practice of continuous and automated monitoring and testing is discussed in Cruzes et al (2017), Cannizzo et al (2008), and Gary et al (2011); and the practice of using acceptance criteria and DoD, among others, for documenting QRs is detailed in Behutiye et al (2017). However, not all of these practices were used exactly as they were proposed in the literature, or for the exact same purpose.…”
Section: Practicesmentioning
confidence: 99%
“…A variety of research in secure software development suggests improvements in the development process or creating proprietary development methods [19,24,39]. With the evolution of software development methods, we see the focus of researchers shifting towards the comparison of secure development methods and integrating security into the development process or vice-versa [10,38,45,46]. Earlier work by Flechais et al [25] proposes a secure software engineering method that integrates risk and threat assessment with other project-specific parameters to provide security analysis during the development process.…”
Section: Secure Software Developmentmentioning
confidence: 99%