• No results found

Secure Software Development

AN ENHANCED TECHNOLOGY ACCEPTANCE MODEL TO MEASURE CUSTOMERS’ WILLINGNESS TO PAY MORE FOR SECURE SOFTWARE DEVELOPMENT

AN ENHANCED TECHNOLOGY ACCEPTANCE MODEL TO MEASURE CUSTOMERS’ WILLINGNESS TO PAY MORE FOR SECURE SOFTWARE DEVELOPMENT

... a secure software development as well as the factors that motivate them to pay extra-cost and the outcome of the action to the ...security software and features and they have high rate of ...

16

Significance of Security Metrics in Secure Software Development

Significance of Security Metrics in Secure Software Development

... the secure software development ...the software development phases namely; pre- requirements, requirements, design to the final stages of the secure software ...

6

Secure Software Development Model: A Guide for Secure Software Life Cycle

Secure Software Development Model: A Guide for Secure Software Life Cycle

... the software to be ...for secure software ...on software system then attack trees can be plotted to clear understanding of attacker’s ...

5

A Survey on Requirements and Design Methods for Secure Software Development*

A Survey on Requirements and Design Methods for Secure Software Development*

... Aprville and Pourzandi [16] propose a SSDLC process based on their experience while developing an instant messaging software. According to their process, the first step in the requirements specifications phase is ...

26

Integrating Automated Tools Into a Secure Software Development Process

Integrating Automated Tools Into a Secure Software Development Process

... in software development, from static source code analysis tools to penetration testing ...many development organizations fail to get the maximum benefit from the ...

7

The Ten Best Practices for Secure Software Development

The Ten Best Practices for Secure Software Development

... In this day and age, an industry that is not regulated is more the exception than the norm as opposed to just a few years ago when the industry that was regulated was the exception. The increase in regulatory and privacy ...

8

Developer Essentials:Top Five Interventions to Support Secure Software Development

Developer Essentials:Top Five Interventions to Support Secure Software Development

... improve software security was the ‘Secure Development Life-Cycle’, a prescriptive set of instructions to the development team ...allow development teams to find their own approaches to ...

10

Security Engineering towards Building a Secure Software

Security Engineering towards Building a Secure Software

... Agile software development method can be used for secure software ...rapid development pace [17]. Security elements are identified in agile software development method to ...

6

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

... forwarding devices. At the control layer, S&D patterns can ensure secure connectiv- ity between the controllers and the programmable switches. In this paper, we give a detailed description of the scheme for ...

26

Software engineering and their conflicts in development of software

Software engineering and their conflicts in development of software

... the software development process, there are various strategies for risk management could be identified and ...whose software development projects are connected with new and unproven ...

8

Secure Environment via Prediction of Software Vulnerabilities-Severity

Secure Environment via Prediction of Software Vulnerabilities-Severity

... Finally, we only consider the Sorted Vulnerability severity as the feature vector and the time series data. We create a feature vector based on the number of time delay. The number of time delays that used for different ...

6

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

... Permanent repository link: http://openaccess.city.ac.uk/15284/ Link to published version: http://dx.doi.org/10.1016/j.comnet.2016.06.028 Copyright and reuse: City Research Online aims to[r] ...

6

Secure Software Update Service (SSUS ) White Paper

Secure Software Update Service (SSUS ) White Paper

... malware software have been developed to address security concerns for computers and networks connected to the internet and to protect them from possible cyber ...

12

Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems

Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems

... the development of health and social care information ...the software engineering community, can be quite confusing for someone not familiar with software engineering methods such as the health and ...

62

Software Testing and Software Development Lifecycles

Software Testing and Software Development Lifecycles

... the software produced by the cycle will be discarded, or kept as a starting point for the next cycle (sometimes referred to as incremental ...the software can be delivered, or it becomes impossible to ...

6

Development Of Secure Water Filter

Development Of Secure Water Filter

... As the time moves the life style of the person has completely changed and there is no time for the people to have micro management of every issue personally. So, this is the right time to provide some space to the new ...

24

SOFTWARE DEVELOPMENT PRODUCTIVITY: CONSIDERING THE SOCIO-TECHNICAL SIDE OF SOFTWARE DEVELOPMENT

SOFTWARE DEVELOPMENT PRODUCTIVITY: CONSIDERING THE SOCIO-TECHNICAL SIDE OF SOFTWARE DEVELOPMENT

... of software engineering researchers are simply paying lip ...of software engineering is long over due ...by software engineers on a daily basis need to be better ...what software engineers do ...

7

TMOS Secure Development and Implementation

TMOS Secure Development and Implementation

... augment secure development initiatives - and to provide an additional layer of security to the TMOS source code - F5 has implemented a sophisticated 3rd party scanning application, one which analyzes ...

5

The need for secure web development

The need for secure web development

... As a result of the development of server technologies web applications can now interact with a server operating system like never before. You can upload or download files, create, modify or delete entries in ...

8

Significance of Software Documentation in Software Development Process

Significance of Software Documentation in Software Development Process

... 7. Briand. L. C [7] Briand states that, it is a well-known fact that software documentation is, in practice, poor and incomplete. Though specification, design, and test documents-among other things-are required by ...

7

Show all 10000 documents...

Related subjects