2009 IFIP International Conference on Wireless and Optical Communications Networks 2009
DOI: 10.1109/wocn.2009.5010550
|View full text |Cite
|
Sign up to set email alerts
|

Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools

Abstract: Today an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in Software Development Life Cycle (SDLC). In Next Generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or on a fixed platform-need to be security-aware using Securityaware Software Development Life Cycle (SaSDLC), which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 3 publications
(1 reference statement)
0
4
0
Order By: Relevance
“…Traditional risk assessment approaches often overlook the socio-technical complexities inherent in smart home environments, including human behaviours, social interactions, and organizational dynamics. This research area advocates for the development of comprehensive risk assessment frameworks that account for both technical vulnerabilities and socio-cultural factors [69]. By adopting a holistic approach to risk assessment, researchers can identify interdependencies between technological risks and human factors, enabling more effective risk mitigation strategies tailored to smart home contexts.…”
Section: Socio-technical Risk Assessment Frameworkmentioning
confidence: 99%
“…Traditional risk assessment approaches often overlook the socio-technical complexities inherent in smart home environments, including human behaviours, social interactions, and organizational dynamics. This research area advocates for the development of comprehensive risk assessment frameworks that account for both technical vulnerabilities and socio-cultural factors [69]. By adopting a holistic approach to risk assessment, researchers can identify interdependencies between technological risks and human factors, enabling more effective risk mitigation strategies tailored to smart home contexts.…”
Section: Socio-technical Risk Assessment Frameworkmentioning
confidence: 99%
“…Attack trees have been implemented in a number of tools, such as SeaMonster [72], which was implemented by the SHIELDS project [159], and Suraksha [176]. They have also been researched intensively, and examples can be found in [179,190,109,106,99] where reusability of attack models has been considered.…”
Section: Architecture and Design For Security: Development And Evaluatimentioning
confidence: 99%
“…Multiple works highlight the importance of the early capture of the security needs of organizations (Basin et al , 2006; Dahbur et al , 2017; Kampová et al , 2020). This is taking into consideration that they can be useful for describing the security requirements that must be considered for software development (Lingham et al , 2020; Talukder et al , 2009). Nowadays, these needs can be specified in Enterprise Architecture (EA) models (The Open Group, 2011).…”
Section: Introductionmentioning
confidence: 99%