Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

Systematic literature review on security risks and its practices in secure software development

RA Khan, SU Khan, HU Khan, M Ilyas - ieee Access, 2022 - ieeexplore.ieee.org
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …

[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams

S Seifermann, R Heinrich, D Werle… - Journal of Systems and …, 2022 - Elsevier
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …

Security assurance model of software development for global software development vendors

RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …

Architectural attack propagation analysis for identifying confidentiality issues

M Walter, R Heinrich… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …

Costing secure software development: A systematic mapping study

E Venson, X Guo, Z Yan, B Boehm - Proceedings of the 14th …, 2019 - dl.acm.org
Building more secure software is a recent concern for software engineers due to increasing
incidences of data breaches and other types of cyber attacks. However, software security …

The importance of security is in the eye of the beholder: Cultural, organizational, and personal factors affecting the implementation of security by design

R Arizon-Peretz, I Hadar, G Luria - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security by design is a recommended approach, addressing end-to-end security and privacy
in the design of software systems. To realize this approach, proactive security behavior is …

[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

S Seifermann, R Heinrich, D Werle, RH Reussner - SECRYPT, 2021 - scitepress.org
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …

Handling environmental uncertainty in design time access control analysis

N Boltz, S Hahner, M Walter… - 2022 48th Euromicro …, 2022 - ieeexplore.ieee.org
The high complexity, connectivity, and data exchange of modern software systems make it
crucial to consider confidentiality early. An often used mechanism to ensure confidentiality is …

Secure software development methodologies: a multivocal literature review

A Kudriavtseva, O Gadyatskaya - arXiv preprint arXiv:2211.16987, 2022 - arxiv.org
In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce
the attack surface and protect software is adoption of methodologies that apply security at …