Security-oriented agile approach with AgileSafe and OWASP ASVS

被引:1
|
作者
Lukasiewicz, Katarzyna [1 ]
Cyganska, Sara [2 ]
机构
[1] Gdansk Univ Technol, Ul Narutowicza 11-12, PL-80233 Gdansk, Poland
[2] IHS Markit, Ul Marynarki Polskiej 163, PL-80868 Gdansk, Poland
关键词
D O I
10.15439/2019F213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the surve's results, these practices were used as an input to AgileSafe method as well as to demonstrate their potential to comply with OWASP ASVS requirements.
引用
收藏
页码:875 / 878
页数:4
相关论文
共 50 条
  • [1] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] Security-oriented service composition and evolution
    Han, Jun
    Kowalczyk, Ryszard
    Khan, Khaled M.
    [J]. ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 71 - 78
  • [3] On some directions in security-oriented research
    Sekanina, Lukas
    Hruska, Tomas
    Vojnar, Tomas
    Kolar, Dusan
    Cernocky, Jan
    [J]. 2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 141 - +
  • [4] Improving Perimeter Security with Security-oriented Program Transformations
    Hafiz, Munawar
    Johnson, Ralph E.
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 61 - 67
  • [5] Security-oriented sensor placement in intelligent buildings
    Eliades, D. G.
    Michaelides, M. P.
    Panayiotou, C. G.
    Polycarpou, M. M.
    [J]. BUILDING AND ENVIRONMENT, 2013, 63 : 114 - 121
  • [6] SOMR: Towards a Security-Oriented MapReduce Infrastructure
    Zhao, Rui
    Meng, Zhaopeng
    Zheng, Yan
    Jin, Qiangguo
    Ruan, Anbang
    Xie, Hanglun
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 530 - 537
  • [7] Security-Oriented Network Slice Backup Method
    Chen, Ke
    Wang, Ying
    Yu, Peng
    Li, Naling
    [J]. 2021 22ND ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2021, : 330 - 335
  • [8] A Security-oriented Workflow Framework for Collaborative Environments
    Hussain, Sardar
    Sinnott, Richard O.
    Poet, Ron
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 707 - 714
  • [9] Behavioral Equivalence of Security-Oriented Interactive Systems
    Liu, Guanjun
    Jiang, Changjun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08) : 2061 - 2068
  • [10] SECURITY-ORIENTED MODEL OF BUSINESS RISK ASSESSMENT
    Hnylytska, Larysa
    Franchuk, Vasyl
    Melnyk, Stepan
    Nakonechna, Nataliya
    Leskiv, Halyna
    Hobela, Volodymyr
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2022, 4 (45): : 202 - 210