2017 8th International Conference on Information Technology (ICIT) 2017
DOI: 10.1109/icitech.2017.8079952
|View full text |Cite
|
Sign up to set email alerts
|

Secure software engineering: Evaluation of emerging trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
3

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 11 publications
0
3
0
3
Order By: Relevance
“…Adel Mohammad et al evaluated three security top approaches McGraw's Touchpoints, Comprehensive Lightweight Application Security Process (CLASP) from Open Web Application Security Project (OWASP) organization, and Microsoft Security Development Lifecycle (SDL) with their process commonality, strengths, limitations and recognized cost, time and Lack of security knowledge are the reasons for security is not considered in software development. They suggested Adaptive Risk Framework and Automated Tool to enhance security activities within all SDLC phases and to consider security from the beginning of the project to the end [4].Anuradha Sharma et al compared existing 8 security techniques in the view of advantages and disadvantages for secure SDLC. All the techniques emphasized in design phase [5].…”
Section: Motivation Towards Sa-sdlc Using Sps Methodologymentioning
confidence: 99%
“…Adel Mohammad et al evaluated three security top approaches McGraw's Touchpoints, Comprehensive Lightweight Application Security Process (CLASP) from Open Web Application Security Project (OWASP) organization, and Microsoft Security Development Lifecycle (SDL) with their process commonality, strengths, limitations and recognized cost, time and Lack of security knowledge are the reasons for security is not considered in software development. They suggested Adaptive Risk Framework and Automated Tool to enhance security activities within all SDLC phases and to consider security from the beginning of the project to the end [4].Anuradha Sharma et al compared existing 8 security techniques in the view of advantages and disadvantages for secure SDLC. All the techniques emphasized in design phase [5].…”
Section: Motivation Towards Sa-sdlc Using Sps Methodologymentioning
confidence: 99%
“…Here, C [e] defines the exploit component; N [sb] represents the number of securities [18] with bugs; N [nsb] is the number of nonsecurity bugs; B [pd] is the percentage of bugs discovered; B [pe] represents the percentage of bugs exploited; and T [c] is the total cost and can be computed as follows:…”
Section: Npvmentioning
confidence: 99%
“…Los sistemas expertos cobran importancia y utilidad en aquellos dominios en los que resulta difícil y costoso disponer de expertos humanos para realizar consultas de manera personal, ilimitada e instantánea (Gupta & Singhal, 2013). Las compañías de desarrollo de software generalmente no cuentan con expertos en seguridad entre sus miembros (Mohammad, Alqatawna, & Abushariah, 2017), por lo que KE-SER puede ser de gran valor.…”
Section: Ke-ser: Conocimiento Y Experienciaunclassified
“…Existen varios enfoques que así lo proponen, como ser: Software Assurance Maturity Model (SAMM, 2019) de la organización Open Web Application Security Project (OWASP, 2019), Touchpoints de McGraw (MacGraw, 2006) y Security Development Lifecycle (SDL, 2019) de Microsoft, entre otros. Análisis comparativos de algunos de estos enfoques, o, en el caso de SAAM de su predecesor, pueden encontrarse en los trabajos de: De Win, Scandariato, Buyens, Grégoire, & Joosen (2009) y Mohammad, Alqatawna, & Abushariah (2017).…”
Section: Introductionunclassified
See 1 more Smart Citation