Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 122
21.
  • The practice of secure soft... The practice of secure software development in SDLC: an investigation through existing model and a case study
    Karim, Nor Shahriza Abdul; Albuolayan, Arwa; Saba, Tanzila ... Security and communication networks, December 2016, 2016-12-00, 20161201, Volume: 9, Issue: 18
    Journal Article
    Peer reviewed
    Open access

    Software security is an essential requirement for software systems. However, recent investigation indicates that many software development methodologies do not explicitly include methods for ...
Full text
Available for: NUK, UL, UM, UPUK
22.
  • Secure Global Software Deve... Secure Global Software Development: A Practitioners’ Perspective
    Humayun, Mamoona; Niazi, Mahmood; Assiri, Mohammed ... Applied Sciences, 02/2023, Volume: 13, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Global software development (GSD) is rapidly becoming standard practice in the software industry due to its many potential benefits. However, one of the biggest challenges in GSD projects is to ...
Full text
Available for: NUK, UL, UM, UPUK
23.
  • Identifying Key Activities,... Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering
    Mihelič, Anže; Hovelja, Tomaž; Vrhovec, Simon Applied Sciences, 04/2023, Volume: 13, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key ...
Full text
Available for: NUK, UL, UM, UPUK
24.
  • An Ontology for Security Patterns
    Vale, Anelis Pereira; Fernandez, Eduardo B. 2019 38th International Conference of the Chilean Computer Science Society (SCCC), 2019-Nov.
    Conference Proceeding

    Security is a fundamental requirement that we must keep in mind when developing a system. We approach the secure construction of software through the use of security patterns, as a way to mitigate ...
Full text
Available for: IJS, NUK, UL, UM
25.
  • An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
    Aljedaani, Bakheet; Ahmad, Aakash; Zahedi, Mansooreh ... 2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020-Dec.
    Conference Proceeding
    Open access

    Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and enhanced interaction. Specifically, mobile ...
Full text
Available for: IJS, NUK, UL, UM

PDF
26.
  • Secure software development... Secure software development training course
    Gorbatov, V. S.; Meshcheriakov, A. A. Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ, 06/2017, Volume: 24, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Information security is one of the most important criteria for the quality of developed software. To obtain a sufficient level of application security companies implement security process into ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
27.
  • CIA-level driven secure SDL... CIA-level driven secure SDLC framework for integrating security into SDLC process
    Kang, Sooyoung; Kim, Seungjoo Journal of ambient intelligence and humanized computing, 10/2022, Volume: 13, Issue: 10
    Journal Article
    Peer reviewed

    From the early 1970s, the U.S. government began to recognize that simple penetration testing could not assure the security quality of products. The results of penetration testing such as identified ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
28.
  • Software Development Initia... Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
    Silva, Paulina; Noël, René; Matalonga, Santiago ... CLEI electronic journal, 12/2016, Volume: 19, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
29.
  • Abstract security patterns ... Abstract security patterns and the design of secure systems
    Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori ... Cybersecurity (Singapore), 04/2022, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software realizations. Security constraints should be introduced ...
Full text
Available for: NUK, UL, UM, UPUK
30.
  • Security Thinking in Online... Security Thinking in Online Freelance Software Development
    Rauf, Irum; Petre, Marian; Tun, Thein ... 2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS), 05/2023
    Conference Proceeding
    Open access

    Online freelance software development (OFSD) is a significant part of the software industry and is a thriving online economy; a recent survey by Stack Overflow reported that nearly 15% of developers ...
Full text
Available for: IJS, NUK, UL, UM
1 2 3 4 5
hits: 122

Load filters