UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 104
11.
  • Security patterns: A system... Security patterns: A systematic mapping study
    Jafari, Abbas Javan; Rasoolzadegan, Abbas Journal of computer languages (Online), February 2020, 2020-02-00, Volume: 56
    Journal Article
    Peer reviewed
    Open access

    Security patterns are a well-established means to encapsulate and communicate proven security solutions and introduce security into the development process. Our objective is to explore the research ...
Full text

PDF
12.
  • Building a security referen... Building a security reference architecture for cloud systems
    Fernandez, Eduardo B.; Monge, Raul; Hashizume, Keiko Requirements engineering, 06/2016, Volume: 21, Issue: 2
    Journal Article
    Peer reviewed

    Reference architectures (RAs) are useful tools to understand and build complex systems, and many cloud providers and software product vendors have developed versions of them. RAs describe at an ...
Full text
13.
  • Implications of regulatory ... Implications of regulatory policy for building secure agile software in Nigeria: A grounded theory
    Ardo, Abdulhamid A.; Bass, Julian M.; Gaber, Tarek The Electronic journal of information systems in developing countries, 11/2023, Volume: 89, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    Abstract Nigeria is ranked second worldwide, after India, in reported incidences of cyberattacks. Attackers usually exploit vulnerabilities in software which may not have adequately considered ...
Full text
14.
  • A Preventive Secure Softwar... A Preventive Secure Software Development Model for a Software Factory: A Case Study
    Nunez, Jose Carlos Sancho; Lindo, Andres Caro; Rodriguez, Pablo Garcia IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The number of cyberattacks has greatly increased in in the last years, as well as their sophistication and impact. For this reason, new emerging software development models are demanded, which help ...
Full text

PDF
15.
  • Agile Development of Secure... Agile Development of Secure Software for Small and Medium-Sized Enterprises
    Mihelič, Anže; Vrhovec, Simon; Hovelja, Tomaž Sustainability, 01/2023, Volume: 15, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Although agile methods gained popularity and became globally widespread, developing secure software with agile methods remains a challenge. Method elements (i.e., roles, activities, and artifacts) ...
Full text
16.
  • A Case-based Management Sys... A Case-based Management System for Secure Software Development Using Software Security Knowledge
    Saito, Masahito; Hazeyama, Atsuo; Yoshioka, Nobukazu ... Procedia computer science, 2015, 2015-00-00, Volume: 60
    Journal Article
    Peer reviewed
    Open access

    In recent years, importance on software security technologies has been recognized and various types of technologies have been developed. On the other hand, in spite of recognition of necessity of ...
Full text

PDF
17.
  • Integrating security and pr... Integrating security and privacy in software development
    Baldassarre, Maria Teresa; Barletta, Vita Santa; Caivano, Danilo ... Software quality journal, 09/2020, Volume: 28, Issue: 3
    Journal Article
    Peer reviewed

    As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously ...
Full text
18.
  • Secure Global Software Deve... Secure Global Software Development: A Practitioners’ Perspective
    Humayun, Mamoona; Niazi, Mahmood; Assiri, Mohammed ... Applied Sciences, 02/2023, Volume: 13, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Global software development (GSD) is rapidly becoming standard practice in the software industry due to its many potential benefits. However, one of the biggest challenges in GSD projects is to ...
Full text
19.
  • The Application of a New Se... The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies
    de Vicente Mohino, Juan; Bermejo Higuera, Javier; Bermejo Higuera, Juan Ramón ... Electronics (Basel), 2019, Volume: 8, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The software development environment is focused on reaching functional products in the shortest period by making use of the least amount of resources possible. In this scenario, crucial elements such ...
Full text

PDF
20.
  • Identifying Key Activities,... Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering
    Mihelič, Anže; Hovelja, Tomaž; Vrhovec, Simon Applied Sciences, 04/2023, Volume: 13, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key ...
Full text
1 2 3 4 5
hits: 104

Load filters