Research on Major Weakness Rules for Secure Software Development
نویسندگان
چکیده
منابع مشابه
Secure Software Development Model
--Extreme programming (XP) is a modern approach for iterative development of software in which you never wait for the complete requirements and start development. Security is usually unnoticed during early phases of software life cycle. In this paper, our main objective is to focus on security requirements at each phase of software life cycle. In this regard, XP is a key solution that provides ...
متن کاملFlexible Software Development based on Business Rules
In the current enterprise systems, with the relationships between people and organizations based on computational applications through the Web, the need of changes in these applications happens in periods shorter and shorter. In this context, this paper proposes a model that can capture business changes and quickly implement them into computational systems. The model includes an approach for fa...
متن کاملRecent Research in Secure Software
The rapid propagation of software systems into nearly every aspect of modern life together with the ever growing number of threats against these systems have given rise to one of the greatest challenges in information technology today. This is the challenge of obtaining software systems that are secure from threats. These threats range from exploitations of buffer overflows and unprotected crit...
متن کاملHuman Resource Allocation for Secure Software Development
Demand of software capabilities in both private and public organizations insists there is a need to provide trustworthy software. Risk management should be incorporated with the software development process for high quality deliverable. Time and cost consideration, different kind of factors consideration in risk management will provide efficient result. The growth of Internet poses different ki...
متن کاملIdea: Interactive Support for Secure Software Development
Security breaches are often caused by software bugs, which may frequently be due to developer’s memory lapses, lack of attention/focus, and knowledge gaps. Developers have to contend with heavy cognitive loads to deal with issues such as functional requirements, deadlines, security, and runtime performance. We propose to integrate secure programming support seamlessly into Integrated Developmen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korea Information and Communications Society
سال: 2013
ISSN: 1226-4717
DOI: 10.7840/kics.2013.38c.10.831