A Preliminary Structure of Software Security Assurance Model

被引:15
|
作者
Khan, Rafiq Ahmad [1 ]
Khan, Siffat Ullah [1 ]
机构
[1] Univ Malakand, Software Engn Res Grp, Dept Comp Sci & IT, Khyber Paktunkhwa, Pakistan
关键词
Software Security; Software Development Life Cycle; Global Software Development; Vendors; Systematic mapping study; Systematic literature review; Empirical Study; Case study;
D O I
10.1145/3196369.3196385
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software security is an important aspect that needs to be considered during the entire software development life cycle (SDLC). Integrating software security at each phase of SDLC has become an urgent need. To address software security, various approaches, techniques, methods, practices, and models have been proposed and developed. However, recent research shows that many software development methodologies do not explicitly include methods for incorporating software security during the development of software as it evolves from requirements engineering to its final disposal. The primary objective of this research is to study the state-of-the-art of security in the context of SDLC by following systematic mapping study (SMS). In the second phase, we will identify, through systematic literature review (SLR) and empirical study in the industry, the software security contributions, security challenges and their practices for global software development (GSD) vendors. The ultimate aim is to develop a Software Security Assurance Model (SSAM) to assist GSD vendor organisations in measuring their readiness towards the development of secure software.
引用
收藏
页码:137 / 140
页数:4
相关论文
共 50 条
  • [21] Challenging software developers: dialectic as a foundation for security assurance techniques
    Weir, Charles
    Rashid, Awais
    Noble, James
    JOURNAL OF CYBERSECURITY, 2020, 6 (01): : 1 - 16
  • [22] Security Testing as part of Software Quality Assurance: Principles and Challenges
    Mallouli, Wissam
    2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2022), 2022, : 29 - 29
  • [23] Towards supporting software assurance assessments by detecting security patterns
    Michaela Bunke
    Karsten Sohr
    Software Quality Journal, 2020, 28 : 1711 - 1753
  • [24] Using concept maps to introduce software security assurance cases
    Snider, Dallas, 1600, U.S. Department of Defense (27):
  • [25] Security characterisation and integrity assurance for component-based software
    Han, J
    Zheng, YL
    INTERNATIONAL CONFERENCE ON SOFTWARE METHODS AND TOOLS, PROCEEDING, 2000, : 61 - 66
  • [26] Security Transparency Assurance Technology for Analysis and Visualization of Software Components
    Uehara T.
    Kanemoto Y.
    Nomura H.
    NTT Technical Review, 2023, 21 (04): : 67 - 70
  • [27] Challenging software developers: Dialectic as a foundation for security assurance techniques
    Weir C.
    Rashid A.
    Noble J.
    Journal of Cybersecurity, 2021, 6 (01):
  • [28] Application security code analysis: A step towards software assurance
    Rawat, Sanjay
    Saxena, Ashutosh
    International Journal of Information and Computer Security, 2009, 3 (01) : 86 - 110
  • [29] Security Assessment Techniques for Software Assurance - a "Virtual Team" Approach
    Isaacs, Derek
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 500 - 506
  • [30] Rule-Based Auditing System for Software Security Assurance
    Jang, Changbok
    Kim, Jeongseok
    Jang, Hyokyung
    Park, Sundo
    Jang, Bokman
    Kim, Bonghoi
    Choi, Euiin
    2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 198 - +