Survey: Security in the system development life cycle

被引:1
|
作者
Amer, SH [1 ]
Humphries, JW [1 ]
Hamilton, JA [1 ]
机构
[1] Auburn Univ, Auburn, AL 36849 USA
关键词
security architecture; policy; security threats; security attacks;
D O I
10.1109/IAW.2005.1495968
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A general approach to security architecture is introduced. A survey of existing attempts to develop the security architecture introduces the topic. Security can be highlighted as part of the system development life cycle. The authors assume that security cannot be achieved by concentrating on one system component but can be achieved by identifying the relationship between these components and how information is used among them. An original sphere of use and interaction is presented upon which security measures can be evaluated and the required security controls can be chosen.
引用
收藏
页码:310 / 316
页数:7
相关论文
共 50 条
  • [31] A Survey of Biometrics Security System
    Uddin, Mohammed Nasir
    Sharmin, Selina
    Ahmed, Abu Hasnat Shohel
    Hasan, Emrul
    Hossain, Shahadot
    Muniruzzaman
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (10): : 16 - 23
  • [32] Security risks of global software development life cycle: Industry practitioner's perspective
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Akbar, Muhammad Azeem
    Alzahrani, Musaad
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2024, 36 (03)
  • [33] Static Analysis for Web Service Security - Tools & Techniques for a Secure Development Life Cycle
    Masood, Adnan
    Java, Jim
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
  • [34] LIFE-CYCLE COST - A SURVEY
    DHILLON, BS
    [J]. MICROELECTRONICS AND RELIABILITY, 1981, 21 (04): : 495 - 511
  • [35] A survey of botnet crimeware life cycle
    Ibrahim, Laheeb M.
    Hatim, Karam
    [J]. International Journal of Reasoning-based Intelligent Systems, 2012, 4 (04) : 250 - 255
  • [36] Security Integration in Big Data Life Cycle
    Kanika
    Agrawal, Alka
    Khan, R. A.
    [J]. ADVANCES IN COMPUTING AND DATA SCIENCES, ICACDS 2016, 2017, 721 : 192 - 200
  • [37] A case study on the security audit methodologies in the context of information system's life cycle
    Kim, J
    Hong, K
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 38 - 43
  • [38] Software security checklist for the software life cycle
    Gilliam, DP
    Wolfe, TL
    Sherif, JS
    Bishop, M
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 243 - 248
  • [39] Addressing software security and mitigations in the life cycle
    Gilliam, D
    Powell, J
    Haugh, E
    Bishop, M
    [J]. 28TH ANNUAL NASA GODDARD SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2004, : 201 - 206
  • [40] Social security and inequality over the Life,Cycle
    Deaton, A
    Gourinchas, PO
    Paxson, C
    [J]. DISTRIBUTIONAL ASPECTS OF SOCIAL SECURITY AND SOCIAL SECURITY REFORM, 2002, : 115 - 148