Survey: Security in the system development life cycle

被引:1
|
作者
Amer, SH [1 ]
Humphries, JW [1 ]
Hamilton, JA [1 ]
机构
[1] Auburn Univ, Auburn, AL 36849 USA
关键词
security architecture; policy; security threats; security attacks;
D O I
10.1109/IAW.2005.1495968
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A general approach to security architecture is introduced. A survey of existing attempts to develop the security architecture introduces the topic. Security can be highlighted as part of the system development life cycle. The authors assume that security cannot be achieved by concentrating on one system component but can be achieved by identifying the relationship between these components and how information is used among them. An original sphere of use and interaction is presented upon which security measures can be evaluated and the required security controls can be chosen.
引用
收藏
页码:310 / 316
页数:7
相关论文
共 50 条
  • [1] An Information Security Policy Development Life Cycle
    Tuyikeze, T.
    Pottas, D.
    [J]. PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 165 - 176
  • [2] Software Development Life Cycle Security Issues
    Kaur, Daljit
    Kaur, Parminder
    [J]. 2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414
  • [3] Life Cycle of Chinas Social Security System
    Cheng Wang seniorresearchfellow
    [J]. China & World Economy, 2004, (04) : 46 - 57
  • [4] A neuro-fuzzy security risk assessment system for software development life cycle
    Olusanya, Olayinka Olufunmilayo
    Jimoh, Rasheed Gbenga
    Misra, Sanjay
    Awotunde, Joseph Bamidele
    [J]. HELIYON, 2024, 10 (13)
  • [5] Embedding Security in Software Development Life Cycle (SDLC)
    Khari, Manju
    Vaishali
    Kumar, Prabhat
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2182 - 2186
  • [6] Baking in security during the systems development life cycle
    Booz Allen Hamilton
    不详
    [J]. CrossTalk, 2007, 3 (22-25): : 22 - 25
  • [7] Reframing Security in Contemporary Software Development Life Cycle
    Frijns, Pieter
    Bierwolf, Robert
    Zijderhand, Tom
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT, OPERATIONS AND DECISIONS (ICTMOD), 2018, : 230 - 236
  • [8] Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges
    Koo, Jahoon
    Kang, Giluk
    Kim, Young-Gab
    [J]. SUSTAINABILITY, 2020, 12 (24) : 1 - 32
  • [9] The system development life cycle and digital library development
    Northwestern University, Evanston, IL, United States
    [J]. OCLC Syst. Serv., 2007, 4 (348-352): : 348 - 352
  • [10] Security on software life cycle using intrusion detection system
    Myat Myat Min
    Khin Haymar Saw Hla
    [J]. APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 360 - 363