메뉴 건너뛰기




Volumn 48 LNBIP, Issue , 2010, Pages 14-27

Security testing in agile web application development - A case study using the EAST methodology

Author keywords

Scrum; Security testing; Web applications

Indexed keywords

SOFTWARE ENGINEERING; WORLD WIDE WEB;

EID: 80455177539     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-13054-0_2     Document Type: Conference Paper
Times cited : (14)

References (37)
  • 1
    • 34748872855 scopus 로고    scopus 로고
    • Some trends in Web application development
    • DOI 10.1109/FOSE.2007.26, 4221621, FoSE 2007: Future of Software Engineering
    • Jazayeri, M.: Some trends in Web application development. In: International Conference on Software Engineering, pp. 199-213. IEEE Computer Society, Washington (2007) (Pubitemid 47484926)
    • (2007) FoSE 2007: Future of Software Engineering , pp. 199-213
    • Jazayeri, M.1
  • 5
    • 26444465547 scopus 로고    scopus 로고
    • Agile security using an incremental security architecture
    • Extreme Programming and Agile Processes in Software Engineering: 6th International Conference, XP 2005. Proceedings
    • Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005) (Pubitemid 41424950)
    • (2005) Lecture Notes in Computer Science , vol.3556 , pp. 57-65
    • Chivers, H.1    Paige, R.F.2    Ge, X.3
  • 7
    • 35048816560 scopus 로고    scopus 로고
    • Security engineering and extreme programming: An impossible marriage?
    • Zannier, C., Erdogmus, H., Lindstrom, L. (eds.). XP/Agile Universe 2004, Springer, Heidelberg
    • Wayrynen, J., Bodén, M., Bostrom, G.: Security Engineering and eXtreme Programming: An Impossible Marriage? In: Zannier, C., Erdogmus, H., Lindstrom, L. (eds.) XP/Agile Universe 2004. LNCS, vol. 3134, pp. 117-128. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3134 , pp. 117-128
    • Wayrynen, J.1    Bodén, M.2    Bostrom, G.3
  • 8
    • 29244456856 scopus 로고    scopus 로고
    • Extreme security engineering: On employing XP practices to achieve "good enough security" without defining it
    • Fairfax, VA
    • Beznosov, K.: Extreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security" without Defining It. In: First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA (2003)
    • (2003) First ACM Workshop on Business Driven Security Engineering (BizSec)
    • Beznosov, K.1
  • 9
    • 84876226464 scopus 로고    scopus 로고
    • Last date accessed 2009-12-10
    • Agile Manifesto, http://agilemanifesto.org/ (Last date accessed 2009-12-10)
  • 10
    • 0036496386 scopus 로고    scopus 로고
    • Going faster: Testing the Web application
    • DOI 10.1109/52.991333
    • Hieatt, E., Mee, R.: Going Faster: Testing TheWeb Application. IEEE Software 19, 60-65 (2002) (Pubitemid 34249427)
    • (2002) IEEE Software , vol.19 , Issue.2 , pp. 60-65
    • Hieatt, E.1    Mee, R.2
  • 12
    • 33750613475 scopus 로고    scopus 로고
    • Testing Web-based applications: The state of the art and future trends
    • DOI 10.1016/j.infsof.2006.06.006, PII S0950584906000851
    • Di Lucca, G.A., Fasolino, A.R.: Testing Web-based applications: The state of the art and future trends. Information and Software Technology 48, 1172-1186 (2006) (Pubitemid 44693351)
    • (2006) Information and Software Technology , vol.48 , Issue.12 , pp. 1172-1186
    • Di Lucca, G.A.1    Fasolino, A.R.2
  • 14
    • 3042823607 scopus 로고    scopus 로고
    • Why security testing is hard
    • Thompson, H.H.: Why Security Testing Is Hard. IEEE Security & Privacy 1, 83-86 (2003)
    • (2003) IEEE Security & Privacy , vol.1 , pp. 83-86
    • Thompson, H.H.1
  • 15
    • 33847756784 scopus 로고    scopus 로고
    • Agile security testing of web-based systems via HTTPUnit
    • DOI 10.1109/ADC.2005.11, 1609802, Proceedings - AGILE Confernce 2005
    • Tappenden, A., Beatty, P., Miller, J., Geras, A., Smith, M.: Agile security testing of Web-based systems via HTTP Unit. In: Proceedings of Agile Conference, pp. 29-38 (2005) (Pubitemid 46379839)
    • (2005) Proceedings - AGILE Confernce 2005 , vol.2005 , pp. 29-38
    • Tappenden, A.1    Beatty, P.2    Miller, J.3    Geras, A.4    Smith, M.5
  • 18
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10, 34-44 (2005)
    • (2005) Requirements Engineering , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 20
    • 14744271696 scopus 로고    scopus 로고
    • Software penetration testing
    • DOI 10.1109/MSP.2005.23
    • Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Security & Privacy 3, 84-87 (2005) (Pubitemid 40325588)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 84-87
    • Arkin, B.1    Stender, S.2    McGraw, G.3
  • 21
    • 14744271048 scopus 로고    scopus 로고
    • Application penetration testing
    • DOI 10.1109/MSP.2005.3
    • Thompson, H.H.: Application penetration testing. IEEE Security & Privacy 3, 66-69 (2005) (Pubitemid 40325585)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 66-69
    • Thompson, H.H.1
  • 22
    • 84876238169 scopus 로고    scopus 로고
    • Last date accessed 2009-11-13
    • The Open Web Application Security Project. OWASP Testing Guide V3.0, http://www.owasp.org/index.php/Category:OWASP-Testing-Project (Last date accessed 2009-11-13)
    • OWASP Testing Guide V3.0
  • 23
    • 0036575072 scopus 로고    scopus 로고
    • Knowledge management in software engineering
    • DOI 10.1109/MS.2002.1003450
    • Rus, I., Lindvall, M.: Knowledge management in software engineering. IEEE Software 19, 26-38 (2002) (Pubitemid 34631149)
    • (2002) IEEE Software , vol.19 , Issue.3 , pp. 26-38
    • Rus, I.1    Lindvall, M.2
  • 24
    • 77953034868 scopus 로고    scopus 로고
    • Agile Trends Survey, (Last date accessed 2009-11-26)
    • Davidson, M.: Survey: Agile interest high, but waterfall still used by many. Agile Trends Survey (2008), http://searchsoftwarequality.techtarget.com/ news/article/0,289142,sid92-gci1318992,00.html (Last date accessed 2009-11-26)
    • (2008) Survey: Agile Interest High, but Waterfall Still Used by Many
    • Davidson, M.1
  • 27
    • 84876278827 scopus 로고    scopus 로고
    • Last date accessed 2009-11-13
    • BugTraq mailing list, http://www.securityfocus.com/archive/1 (Last date accessed 2009-11-13)
    • BugTraq Mailing List
  • 28
    • 84876221470 scopus 로고    scopus 로고
    • Last date accessed 2009-11-13
    • Common Vulnerabilities and Exposures, http://cve.mitre.org/ (Last date accessed 2009-11-13)
  • 29
    • 84876260115 scopus 로고    scopus 로고
    • Last date accessed 2009-11-13
    • Computer Emergency Readiness Team (CERT), http://www.cert.org/ (Last date accessed 2009-11-13)
  • 30
    • 84876276473 scopus 로고    scopus 로고
    • Last date accessed 2009-11-13
    • OWASP Top 10 vulnerabilities, http://www.owasp.org/index.php/Top-10-2007 (Last date accessed 2009-11-13)
    • Top 10 Vulnerabilities
  • 32
    • 84876238169 scopus 로고    scopus 로고
    • Last date accessed 2009-12-02
    • The OpenWeb Application Security Project. OWASP Testing Guide V3.0, http://www.owasp.org/index.php/Category:OWASP-Testing-Project (Last date accessed 2009-12-02)
    • OWASP Testing Guide V3.0
  • 33
    • 33747238250 scopus 로고    scopus 로고
    • Guest editor's introduction: The state of web security
    • Andrews, M.: Guest Editor's Introduction: The State of Web Security. IEEE Security and Privacy 4, 14-15 (2006)
    • (2006) IEEE Security and Privacy , vol.4 , pp. 14-15
    • Andrews, M.1
  • 35
    • 84876230092 scopus 로고    scopus 로고
    • Last date accessed 2009-11-14
    • Acunetix Web Vulnerability Scanner, http://www.acunetix.com/ (Last date accessed 2009-11-14)
  • 36
    • 84876230915 scopus 로고    scopus 로고
    • Last date accessed 2009-11-14
    • SeaMonster V3.0, http://sourceforge.net/projects/seamonster/ (Last date accessed 2009-11-14)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.