Software Security Engineering in Extreme Programming Methodology: a Systematic Literature Review
نویسنده
چکیده
SOFTWARE SECURITY ENGINEERING IN EXTREME PROGRAMMING METHODOLOGY: A SYSTEMATIC LITERATURE REVIEW Imran Ghani (Universiti Teknologi Malaysia, Skudai, Johor, Malaysia [email protected]) Izzaty Yasin (Universiti Teknologi Malaysia, Skudai, Johor, Malaysia [email protected]) ABSTRACT: Agile methodology such as Extreme Programming (XP) has gained enough recognition as efficient development process by delivering software fast even under the time constrains. However, like other agile methods including Scrum, Feature Driven Development (FDD), DSDM and, XP has also been criticized because of unavailability of security element in its twelve practices. In order to have a deeper look into the matter and discover more about the reality, we conducted a systematic literature review (SLR) and studied the literature and software solutions between 2000 to 2012. Our findings highlight that the in its current form the XP model partially support integrating Software Security with its twelve practices. Although, there are a few researches on this topics but the detailed information about their usage and outcome is not yet published. Thus we conclude that the existing twelve practices of XP are not enough hence security based practices in XP need to be proposed.
منابع مشابه
A systematic review of security requirements engineering
a r t i c l e i n f o One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased manner, that is, none of them perform a systematic review of security requirements engineering, and there is not, there...
متن کاملA Review on Software Development Security Engineering using Dynamic System Method (DSDM)
Agile methodology such as Scrum, Extreme Programming (XP), Feature Driven Development (FDD) and the Dynamic System Development Method (DSDM) have gained enough recognition as efficient development process by delivering software fast even under the time constrains. However, like other agile methods DSDM has been criticized because of unavailability of security element in its four phases. In orde...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملThe Web Engineering Security (WES) methodology
The World Wide Web has had a significant impact on basic operational economical components in global information rich civilizations. This impact is forcing organizations to provide justification for security from a business case perspective and to focus on security from a web application development environment perspective. This increased focus on security was the basis of a business case discu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013