WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Ente
DOI: 10.1109/enabl.2003.1231415
|View full text |Cite
|
Sign up to set email alerts
|

Software security checklist for the software life cycle

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
23
0

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 4 publications
0
23
0
Order By: Relevance
“…The traditional way of dealing with security was to employ the protection mechanisms after the developmental stages of an Information System [4]. As a result, most of the research work in Information and Computer/Network Security is based on the detailed study of complex protocols or of complex systems and also given the fact that the genesis of the security holes is often backtracked to failures associated with such complex protocols and complex systems.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional way of dealing with security was to employ the protection mechanisms after the developmental stages of an Information System [4]. As a result, most of the research work in Information and Computer/Network Security is based on the detailed study of complex protocols or of complex systems and also given the fact that the genesis of the security holes is often backtracked to failures associated with such complex protocols and complex systems.…”
Section: Introductionmentioning
confidence: 99%
“…A well-established scale against which we can measure the level of security a software system exhibit is still a great challenge for the research community. Traditionally security is treated as an afterthought, in which the protection mechanisms employed after the development stages of the software [1]. To evaluate the software system for security is one of the most critical aspects of security which got attention lately.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature survey, a Software Security Checklist has been developed that builds the software security assessment instrument. It focuses on the software security checklist to ensure that all the security aspects have been included during the software development process [6]. A process has been developed that enables the developers to identify, analyze and finalize the security requirements by the means of software security components.…”
Section: Introductionmentioning
confidence: 99%