2019
DOI: 10.3390/electronics8111218
|View full text |Cite
|
Sign up to set email alerts
|

The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies

Abstract: The software development environment is focused on reaching functional products in the shortest period by making use of the least amount of resources possible. In this scenario, crucial elements such as software quality or software security are not considered at all, and in most cases, the high value offered to the projects is not taken into account. Nowadays, agile models are booming. They are defined by the way they achieve the interaction and integration of everyone involved in the software life cycle, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0
7

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(48 citation statements)
references
References 12 publications
0
41
0
7
Order By: Relevance
“…Penetration testing, fuzz testing, security testing, and dynamic analysis are the four pillars of testing in secure agile models. 27 Mohino suggests ethical hacking, which covers penetration test as well. MSSDL-A has fuzz testing at four different levels.…”
Section: Testingmentioning
confidence: 99%
“…Penetration testing, fuzz testing, security testing, and dynamic analysis are the four pillars of testing in secure agile models. 27 Mohino suggests ethical hacking, which covers penetration test as well. MSSDL-A has fuzz testing at four different levels.…”
Section: Testingmentioning
confidence: 99%
“…Despite this problem, security code analysis can reduce the review code effort [26]. SAST tools are considered the most important security activity within a SSDLC [13].…”
Section: Static Analysis Security Testingmentioning
confidence: 99%
“…Sometimes they have limited budgets. These cases often make them forget an essential component within the It is necessary to establish in the organizations a Software Development Life Cycle (SSDLC), as defined in the work of Vicente et al [13], in order to standardize the use of SAST, DAST and IAST tools with the objective of deploying in production web applications as secure as possible.…”
Section: Introductionmentioning
confidence: 99%
“…A Mohaisen talks about antivirus malware identification methods with the help of machine level method for better results [19]. There are many other papers [20,21,22] related to machine level approaches for identification, classification, and analysis of malware. Table II combines the approaches with the application of research papers.…”
Section: B Technique Analysismentioning
confidence: 99%