Towards the Integration of Security Practices in the Software Implementation Process of ISO/IEC 29110: A Mapping

被引:3
作者
Sanchez-Gordon, Mary-Luz [1 ]
Colomo-Palacios, Ricardo [2 ]
Sanchez, Alex [3 ]
de Amescua Seco, Antonio [1 ]
Larrucea, Xabier [4 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Ave Univ 30 Leganes, Madrid 28911, Spain
[2] Ostfold Univ Coll, Fac Comp Sci, Postboks 700, N-1757 Halden, Norway
[3] LogicStudio, Bldg 235, Panama City, Panama
[4] Tecnalia, Bizkaia, Spain
来源
SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2017) | 2017年 / 748卷
关键词
Software security; CSSLP; S-SDLC; Small companies; VSE; ISO/IEC; 29110;
D O I
10.1007/978-3-319-64218-5_1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure software practices are gradually gaining relevance among software practitioners and researchers. This is happening because today more than ever software is becoming part of our lives and cybercrimes are constantly appearing. Despite its importance, its current practice in the software industry is still scarce. Indeed, software security problems are divided 50/50 between bugs and flaws. In particular, it remains a significant challenge for software practitioners in small software companies. Therefore, there is a need to support small companies in changing their existing ways of work to integrate these new and unfamiliar practices. The aim of this study is twofold. First, to help building an awareness of the software security process among practitioners in small companies. Second, to help the integration of these practices with software implementation process of ISO/IEC 29110 which results in an extension of the latter with additional activities identified from the industry best practices. Nevertheless, the extension proposal is to be performed selectively, based on the value of the software as an asset to the stakeholders and on stakeholders needs.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 21 条
[1]  
Allen Julia H, 2008, Software security engineering.
[2]  
[Anonymous], 2006, Software security: building security in
[3]   Harmonization of ISO/IEC 9001:2000 and CMMI-DEV: from a theoretical comparison to a real case application [J].
Baldassarre, Maria Teresa ;
Caivano, Danilo ;
Pino, Francisco J. ;
Piattini, Mario ;
Visaggio, Giuseppe .
SOFTWARE QUALITY JOURNAL, 2012, 20 (02) :309-335
[4]   Software Security in Practice [J].
Chess, Brian ;
Arkin, Brad .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :89-92
[5]  
Daud M. I, 2010, P INT MUTICONFERENCE
[6]  
Engemann K, 2017, ROUTLEDGE COMPANION
[7]   The Cybersecurity Risk [J].
Garfinkel, Simson L. .
COMMUNICATIONS OF THE ACM, 2012, 55 (06) :29-32
[8]   Computer security [J].
Gollmann, Dieter .
WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2010, 2 (05) :544-554
[9]  
Grover M., 2016, J INF SYST APPL RES, V9, P38
[10]  
Haralambos M., 2006, INTEGRATING SECURITY