首页> 外文期刊>Computer standards & interfaces >Exploring software security approaches in software development lifecycle: A systematic mapping study
【24h】

Exploring software security approaches in software development lifecycle: A systematic mapping study

机译:在软件开发生命周期中探索软件安全性方法:系统的映射研究

获取原文
获取原文并翻译 | 示例

摘要

There is an increase use of security driven approaches to support software development activities, such as requirements, design and implementation. The objective of this paper is to identify the existing software security approaches used in the software development lifecycle (SDLC). In order to meet our goal, we conducted a systematic mapping study to identify the primary studies on the use of software security techniques in SDLC. In total, we selected and categorized 118 primary studies. After analyzing the selected studies, we identified 52 security approaches and we categorized them in to five main categories, namely, 'secure requirements modeling', 'vulnerability identification, adaption and mitigation', 'software security focused process', 'extended UML-based secure modeling profiles', 'non UML-based secure modeling notations'. The results show that the most frequently used approaches are static analysis and dynamic analysis that provide security checks in the coding phase. In addition, our results show that many studies in this review considered security checks around the coding stage of software development. This work will assist software development organizations in better understanding the existing software security approaches used in the software development lifecycle. It can also provide researchers with a firm basis on which to develop new software security approaches.
机译:安全驱动方法越来越多地用于支持软件开发活动,例如需求,设计和实施。本文的目的是确定在软件开发生命周期(SDLC)中使用的现有软件安全性方法。为了实现我们的目标,我们进行了系统的制图研究,以识别关于在SDLC中使用软件安全技术的主要研究。我们总共选择并分类了118项主要研究。在对选定的研究进行分析之后,我们确定了52种安全方法,并将它们分为五个主要类别,即“安全需求建模”,“漏洞识别,适应和缓解”,“软件安全重点过程”,“基于UML的扩展”安全建模配置文件”,“非基于UML的安全建模符号”。结果表明,最常用的方法是静态分析和动态分析,它们在编码阶段提供安全检查。此外,我们的结果表明,本次审查中的许多研究都在软件开发的编码阶段考虑了安全检查。这项工作将帮助软件开发组织更好地了解软件开发生命周期中使用的现有软件安全性方法。它还可以为研究人员提供坚实的基础,以开发新的软件安全性方法。

著录项

  • 来源
    《Computer standards & interfaces》 |2017年第2期|107-115|共9页
  • 作者单位

    Information of Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia;

    Information of Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia,Faculty of Computing, Riphah International University, Islamabad, Pakistan;

    Information of Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia;

    Information of Computer Science Department, King Fahd University of Petroleum and Minerals, Saudi Arabia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Systematic mapping study; Empirical study; Software development life cycle; Software security;

    机译:系统制图研究;实证研究;软件开发生命周期;软件安全性;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号