Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 122
11.
  • Developer-oriented Web Security by Integrating Secure SDLC into IDEs
    Emin İslam Tatlı Sakarya university journal of computer and information sciences, 04/2018, Volume: 1, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient ...
Full text
Available for: NUK, UL, UM, UPUK
12.
  • Evaluation of requirement e... Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis
    Khan, Rafiq Ahmad; Akbar, Muhammad Azeem; Rafi, Saima ... Journal of software : evolution and process, 20/May , Volume: 36, Issue: 5
    Journal Article
    Peer reviewed

    Technological advancement makes the world a global village. Security is an evergreen and everlasting area, because of the continuous threat from Hackers and Crackers. The immense use of software ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
13.
  • The Application of a New Se... The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies
    de Vicente Mohino, Juan; Bermejo Higuera, Javier; Bermejo Higuera, Juan Ramón ... Electronics (Basel), 2019, Volume: 8, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The software development environment is focused on reaching functional products in the shortest period by making use of the least amount of resources possible. In this scenario, crucial elements such ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
14.
  • Security patterns: A system... Security patterns: A systematic mapping study
    Jafari, Abbas Javan; Rasoolzadegan, Abbas Journal of computer languages (Online), February 2020, 2020-02-00, Volume: 56
    Journal Article
    Peer reviewed
    Open access

    Security patterns are a well-established means to encapsulate and communicate proven security solutions and introduce security into the development process. Our objective is to explore the research ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
15.
  • Building a security referen... Building a security reference architecture for cloud systems
    Fernandez, Eduardo B.; Monge, Raul; Hashizume, Keiko Requirements engineering, 06/2016, Volume: 21, Issue: 2
    Journal Article
    Peer reviewed

    Reference architectures (RAs) are useful tools to understand and build complex systems, and many cloud providers and software product vendors have developed versions of them. RAs describe at an ...
Full text
Available for: DOBA, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, IZUM, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UILJ, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
16.
  • Implications of regulatory ... Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory
    Ardo, Abdulhamid A.; Bass, Julian M.; Gaber, Tarek The Electronic journal of information systems in developing countries, 11/2023, Volume: 89, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Abstract Nigeria is ranked second worldwide, after India, in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have adequately considered ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
17.
  • A Preventive Secure Softwar... A Preventive Secure Software Development Model for a Software Factory: A Case Study
    Nunez, Jose Carlos Sancho; Lindo, Andres Caro; Rodriguez, Pablo Garcia IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The number of cyberattacks has greatly increased in in the last years, as well as their sophistication and impact. For this reason, new emerging software development models are demanded, which help ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
18.
  • Integrating security and pr... Integrating security and privacy in software development
    Baldassarre, Maria Teresa; Barletta, Vita Santa; Caivano, Danilo ... Software quality journal, 09/2020, Volume: 28, Issue: 3
    Journal Article
    Peer reviewed

    As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously ...
Full text
Available for: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
19.
  • Agile Development of Secure... Agile Development of Secure Software for Small and Medium-Sized Enterprises
    Mihelič, Anže; Vrhovec, Simon; Hovelja, Tomaž Sustainability, 01/2023, Volume: 15, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Although agile methods gained popularity and became globally widespread, developing secure software with agile methods remains a challenge. Method elements (i.e., roles, activities, and artifacts) ...
Full text
Available for: NUK, UL, UM, UPUK
20.
  • A Case-based Management Sys... A Case-based Management System for Secure Software Development Using Software Security Knowledge
    Saito, Masahito; Hazeyama, Atsuo; Yoshioka, Nobukazu ... Procedia computer science, 2015, 2015-00-00, Volume: 60
    Journal Article
    Peer reviewed
    Open access

    In recent years, importance on software security technologies has been recognized and various types of technologies have been developed. On the other hand, in spite of recognition of necessity of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
1 2 3 4 5
hits: 122

Load filters