메뉴 건너뛰기




Volumn , Issue , 2005, Pages 47-54

Towards agile security assurance

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; SOFTWARE ENGINEERING;

EID: 29244436687     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1065907.1066034     Document Type: Conference Paper
Times cited : (79)

References (36)
  • 1
    • 0002846126 scopus 로고
    • West Yarmouth, MA: The Standish Group
    • Standish Group, The Chaos Report, West Yarmouth, MA: The Standish Group, 1995.
    • (1995) The Chaos Report
  • 3
    • 29244456856 scopus 로고    scopus 로고
    • Extreme security engineering: On employing XP practices to achieve 'good enough security' without defining it
    • Fairfax, VA, USA
    • K. Beznosov, "Extreme Security Engineering: On Employing XP Practices to Achieve 'Good Enough Security' without Defining It," presented at First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, USA, 2003.
    • (2003) First ACM Workshop on Business Driven Security Engineering (BizSec)
    • Beznosov, K.1
  • 7
    • 33244478562 scopus 로고    scopus 로고
    • A pair programming experience
    • R. W. Jensen, "A Pair Programming Experience," in CrossTalk, 2003.
    • (2003) CrossTalk
    • Jensen, R.W.1
  • 11
    • 0011759755 scopus 로고    scopus 로고
    • Property based testing: A new approach to testing for assurance
    • G. Fink and M. Bishop, "Property Based Testing: A New Approach to Testing for Assurance," in ACM SIGSOFT Software Engineering Notes, vol. 22, 1997.
    • (1997) ACM SIGSOFT Software Engineering Notes , vol.22
    • Fink, G.1    Bishop, M.2
  • 19
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • D. Evans and D. Larochelle, "Improving Security Using Extensible Lightweight Static Analysis," in IEEE Software, vol. 19, 2002, pp. 42-51.
    • (2002) IEEE Software , vol.19 , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 21
    • 0034270432 scopus 로고    scopus 로고
    • Statically scanning java code: Finding security vulnerabilities
    • J. Viega, G. McGraw, T. Mutdosch, and E. W. Feiten, "Statically Scanning Java Code: Finding Security Vulnerabilities," in IEEE Software, vol. 17, 2000, pp. 68-77.
    • (2000) IEEE Software , vol.17 , pp. 68-77
    • Viega, J.1    McGraw, G.2    Mutdosch, T.3    Feiten, E.W.4
  • 27
    • 0032595618 scopus 로고    scopus 로고
    • Embracing change with extreme programming
    • K. Beck, "Embracing Change with Extreme Programming," IEEE Computer, vol. 32, pp. 70-77, 1999.
    • (1999) IEEE Computer , vol.32 , pp. 70-77
    • Beck, K.1
  • 28
    • 35048816560 scopus 로고    scopus 로고
    • Security engineering and eXtreme programming: An impossible marriage?
    • C. Zannier, H. Erdogmus, and L. Lindstrom, Eds. LNSC3134, Berlin: Springer-Verlag
    • J. Wäyrynen, M. Bodén, and G. Boström, "Security Engineering and eXtreme Programming: an Impossible marriage?," in Extreme programming and agile methods-XP/Agile Universe 2004, C. Zannier, H. Erdogmus, and L. Lindstrom, Eds. LNSC3134, Berlin: Springer-Verlag, 2004, pp. 117-128.
    • (2004) Extreme Programming and Agile Methods-XP/Agile Universe 2004 , pp. 117-128
    • Wäyrynen, J.1    Bodén, M.2    Boström, G.3
  • 29
    • 0346043242 scopus 로고    scopus 로고
    • Using XP for safety-critical software
    • M. Poppendieck and R. Morsicato, "Using XP for Safety-Critical Software," Cutter IT Journal, vol. 15, no. 9, 2002, pp. 12-16.
    • (2002) Cutter IT Journal , vol.15 , Issue.9 , pp. 12-16
    • Poppendieck, M.1    Morsicato, R.2
  • 30
    • 29244448120 scopus 로고    scopus 로고
    • Security engineering in an evolutionary acquisition environment
    • Charlottsville, VA
    • M. D. Abrams, "Security Engineering in an Evolutionary Acquisition Environment," in Proceedings of New Security Paradigms Workshop, Charlottsville, VA, 1998, pp. 11-20.
    • (1998) Proceedings of New Security Paradigms Workshop , pp. 11-20
    • Abrams, M.D.1
  • 31
    • 70450274755 scopus 로고    scopus 로고
    • Software Process Subgroup of the Task Force on Security across the Software Development Lifecycle National Cyber Security Summit
    • S. T. Redwine and N. Davis, ed., Processes to Produce Secure Software Towards more Secure Software, Software Process Subgroup of the Task Force on Security across the Software Development Lifecycle National Cyber Security Summit, 2004.
    • (2004) Processes to Produce Secure Software Towards More Secure Software
    • Redwine, S.T.1    Davis, N.2
  • 34
    • 29244454074 scopus 로고    scopus 로고
    • USA House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities, Testimony July 24
    • E. H. Spafford, "Cyber Terrorism: The New Asymmetrie Threat," USA House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities, Testimony July 24 2003.
    • (2003) Cyber Terrorism: the New Asymmetrie Threat
    • Spafford, E.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.