Systematic Mapping Study on Security Approaches in Secure Software Engineering

被引:32
作者
Khan, Rafiq Ahmad [1 ]
Khan, Siffat Ullah [1 ]
Khan, Habib Ullah [2 ]
Ilyas, Muhammad [1 ]
机构
[1] Univ Malakand, Dept Comp Sci & IT, Software Engn Res Grp, Chakdara 18800, Pakistan
[2] Qatar Univ, Dept Accounting & Informat Syst, Coll Business & Econ, Doha, Qatar
关键词
Software; Security; Buildings; Software systems; Software measurement; Systematics; Software engineering; Software security; secure software development; secure software engineering; software development life cycle; security approaches; systematic mapping study; ESTIMATING USABLE-SECURITY; FUZZY-LOGIC; REQUIREMENTS; MODEL; HYBRID; VULNERABILITY; DEPLOYMENT; IMPACT;
D O I
10.1109/ACCESS.2021.3052311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.
引用
收藏
页码:19139 / 19160
页数:22
相关论文
共 108 条
[1]   Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis [J].
Agrawal, Alka ;
Pandey, Abhishek Kumar ;
Baz, Abdullah ;
Alhakami, Hosam ;
Alhakami, Wajdi ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2020, 8 :135770-135783
[2]   Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS [J].
Agrawal, Alka ;
Alenezi, Mamdouh ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2019, 7 :153936-153951
[3]   Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS [J].
Al-Zahrani, Fahad Ahmed .
IEEE ACCESS, 2020, 8 :109905-109916
[4]   A model-driven framework for trusted computing based systems [J].
Alam, Masoom ;
Seifert, Jean-Pierre ;
Zhan, Xinwen .
11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, :75-+
[5]  
Alberts C., 2003, INTRO OCTAVE APPROAC
[6]   Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective [J].
Alenezi, Mamdouh ;
Agrawal, Alka ;
Kumar, Rajeev ;
Khan, Raees Ahmad .
IEEE ACCESS, 2020, 8 :25543-25556
[7]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[8]   Secure software - Development by example [J].
Apvrille, A ;
Pourzandi, M .
IEEE SECURITY & PRIVACY, 2005, 3 (04) :10-17
[9]   Automatic deployment of distributed software systems: Definitions and state of the art [J].
Arcangeli, Jean-Paul ;
Boujbel, Raja ;
Leriche, Sebastien .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 103 :198-218
[10]  
Aslanyan Z, 2016, P IEEE CSFW, P105, DOI 10.1109/CSF.2016.15