首页> 外文会议>2011 6th International Conference for Internet Technology and Secured Transactions >Extrapolating security requirements to an established software process: Version 1.0
【24h】

Extrapolating security requirements to an established software process: Version 1.0

机译:将安全要求外推到已建立的软件过程:1.0版

获取原文
获取原文并翻译 | 示例

摘要

This paper presents the mechanisms on integrating security related activities to an established software process in an organization. The main challenge is to attain a security model that is fit to the organization's security objectives and environment. We quest for an adapted security model that is lightweight yet provides an optimized security impacts in delivering software products. Implementation of the adapted security model must also comprehend the limiting factor of people resources. We share experiences and lesson learned in transforming the adapted security model into secure software process.
机译:本文介绍了将安全相关活动集成到组织中已建立的软件过程中的机制。主要挑战是要获得适合组织的安全目标和环境的安全模型。我们寻求一种适应性强的安全模型,该模型轻巧但在交付软件产品时提供了优化的安全影响。调整后的安全模型的实现还必须理解人力资源的限制因素。我们分享了将适应性安全模型转换为安全软件过程的经验和教训。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号