Security and privacy requirements for the internet of things: A survey
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
complicated than that for desktop, mobile, or web applications. First, IoT applications require …
Systematic literature review on security risks and its practices in secure software development
Security is one of the most critical aspects of software quality. Software security refers to the
process of creating and developing software that assures the integrity, confidentiality, and …
process of creating and developing software that assures the integrity, confidentiality, and …
[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …
reputation are potential consequences of not maintaining confidentiality, which is an …
Security assurance model of software development for global software development vendors
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …
years. As a result, new emerging software development models are required that assist in …
Architectural attack propagation analysis for identifying confidentiality issues
M Walter, R Heinrich… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
Exchanging data between different systems enables us to build new smart services and
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
digitise various areas of our daily life. This digitalisation leads to more efficient usage of …
Costing secure software development: A systematic mapping study
Building more secure software is a recent concern for software engineers due to increasing
incidences of data breaches and other types of cyber attacks. However, software security …
incidences of data breaches and other types of cyber attacks. However, software security …
The importance of security is in the eye of the beholder: Cultural, organizational, and personal factors affecting the implementation of security by design
Security by design is a recommended approach, addressing end-to-end security and privacy
in the design of software systems. To realize this approach, proactive security behavior is …
in the design of software systems. To realize this approach, proactive security behavior is …
[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …
way. Information Flow (IF) and Access Control (AC) are established confidentiality …
Handling environmental uncertainty in design time access control analysis
The high complexity, connectivity, and data exchange of modern software systems make it
crucial to consider confidentiality early. An often used mechanism to ensure confidentiality is …
crucial to consider confidentiality early. An often used mechanism to ensure confidentiality is …
Secure software development methodologies: a multivocal literature review
A Kudriavtseva, O Gadyatskaya - arXiv preprint arXiv:2211.16987, 2022 - arxiv.org
In recent years, the number of cyber attacks has grown rapidly. An effective way to reduce
the attack surface and protect software is adoption of methodologies that apply security at …
the attack surface and protect software is adoption of methodologies that apply security at …