Secure software engineering processes

被引:0
|
作者
Essafi, Mehrez [1 ]
Ben Ghezala, Henda [1 ]
机构
[1] ENSI, Tunis, Tunisia
关键词
Security Engineering; Secure Software; Practices; life-cycle; Development Process;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a serious problem and, if present trends continue, could be much worse in the future. At its core, the value of a software is derived not only from its ability to increase productivity and efficiencies, but also from its resiliency to attack and always performing at needed levels during times of both crisis and normal operations. Until yet, no processes or practices have been shown to consistently produce secure software. However, some available development practices are capable of substantially improving the security of software systems including having exceptionally low defect rates. As a long-term multifaceted problem, improving software security and safeguarding the Information Technology requires multiple solutions and the application of resources throughout the lifecycle. In this paper, we start by presenting the secure software engineering challenges, then we identify the secure software life-cycle models phases and we end by presenting our approach in supporting NATURE for developing secure software.
引用
收藏
页码:295 / 298
页数:4
相关论文
共 50 条
  • [21] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [22] Building more secure software with improved development processes
    Howard, M
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 63 - 65
  • [23] Secure Software Configuration Management Processes for nuclear safety software development environment
    Chou, I-Hsin
    [J]. ANNALS OF NUCLEAR ENERGY, 2011, 38 (10) : 2174 - 2179
  • [24] Evaluation of engineering approaches in the secure software development life cycle
    Busch, Marianne
    Koch, Nora
    Wirsing, Martin
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 234 - 265
  • [25] Evaluation of engineering approaches in the secure software development life cycle
    Busch, Marianne
    Koch, Nora
    Wirsing, Martin
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 234 - 265
  • [26] CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle
    Loruenser, Thomas
    Poehls, Henrich C.
    Sell, Leon
    Laenger, Thomas
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [27] A framework to support alignment of secure software engineering with legal regulations
    Islam, Shareeful
    Mouratidis, Haralambos
    Juerjens, Jan
    [J]. SOFTWARE AND SYSTEMS MODELING, 2011, 10 (03): : 369 - 394
  • [28] SECURE SOFTWARE ENGINEERING IN ACADEMIC EDUCATION: STUDENTS' PRECONCEPTIONS OF IT SECURITY
    Jahn, S.
    Gold-Veerkamp, C.
    Reuter, R.
    Mottok, J.
    Abke, J.
    [J]. 12TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI2019), 2019, : 6825 - 6834
  • [29] A framework to support alignment of secure software engineering with legal regulations
    Shareeful Islam
    Haralambos Mouratidis
    Jan Jürjens
    [J]. Software & Systems Modeling, 2011, 10 : 369 - 394
  • [30] Secure Tropos framework for software product lines requirements engineering
    Mellado, Daniel
    Mouratidis, Haralambos
    Fernandez-Medina, Eduardo
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) : 711 - 722