The ISDF Framework: Towards Secure Software Development

被引:4
作者
Alkussayer, Abdulaziz [1 ]
Allen, William H. [1 ]
机构
[1] Florida Inst Technol, Dept Comp Sci, Melbourne, FL 32901 USA
来源
JOURNAL OF INFORMATION PROCESSING SYSTEMS | 2010年 / 6卷 / 01期
关键词
Security Patterns; Secure Development; Security Framework;
D O I
10.3745/JIPS.2010.6.1.091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.
引用
收藏
页码:91 / 106
页数:16
相关论文
共 44 条
  • [1] Alexander C., 1977, PATTERN LANGUAGE TOW
  • [2] Alkussayer A., 2009, 3 INT C INF SEC ASS
  • [3] Alkussayer A., 2009, 47 ACM SE C 2009
  • [4] Andrews M., 2006, BREAK WEB SOFTWARE
  • [5] [Anonymous], 2005, TECH REP
  • [6] Secure software - Development by example
    Apvrille, A
    Pourzandi, M
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (04) : 10 - 17
  • [7] Blakley B., 2004, TECH REP
  • [8] Static analysis for security
    Chess, B
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (06) : 76 - 79
  • [9] Processes for producing secure software - Summary of US National Cybersecurity Summit Subgroup Report
    Davis, N
    Humphrey, W
    Redwine, ST
    Zibulski, G
    McGraw, G
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 18 - 25
  • [10] FERNANDEZ EB, 2007, 1 INT WORKSH SOFTW P