메뉴 건너뛰기




Volumn 8, Issue 2, 2014, Pages 646-663

Integrating software security into agile-Scrum method

Author keywords

Agile methodologies; Scrum; Security backlog; Software security

Indexed keywords

INFORMATION SYSTEMS;

EID: 84896845646     PISSN: 19767277     EISSN: 22881468     Source Type: Journal    
DOI: 10.3837/tiis.2014.02.019     Document Type: Article
Times cited : (21)

References (38)
  • 1
    • 44649189162 scopus 로고    scopus 로고
    • Empirical studies of agile software development: A systematic review
    • Article (CrossRef Link)
    • Dyba, T. and Dingsoyr, T., "Empirical studies of agile software development: A systematic review," Information and Software Technology, Vol.50, pp.833-859, 2008. Article (CrossRef Link)
    • (2008) Information and Software Technology , vol.50 , pp. 833-859
    • Dyba, T.1    Dingsoyr, T.2
  • 2
    • 84860445044 scopus 로고    scopus 로고
    • Agile practices: The Impact on Trust in Software Project Teams
    • Article (CrossRef Link)
    • Mchugh, O. and Conboy, k. and Lang, M., "Agile practices: The Impact on Trust in Software Project Teams," IEEE Software, Vol.29, pp.71-76, 2012. Article (CrossRef Link)
    • (2012) IEEE Software , vol.29 , pp. 71-76
    • McHugh, O.1    Conboy, K.2    Lang, M.3
  • 3
    • 33646914526 scopus 로고    scopus 로고
    • Understanding Student Perceptions of Pair Programming and Agile Software Development Methodologies: Verifying a Model of Social Interaction
    • Article (CrossRef Link)
    • Slaten, k., Droujkova, M., Berenson, S. B., Williams, L. and Layman, L., "Understanding Student Perceptions of Pair Programming and Agile Software Development Methodologies: Verifying a Model of Social Interaction," IEEE Agile Conference, pp.323-330, 2005. Article (CrossRef Link)
    • (2005) IEEE Agile Conference , pp. 323-330
    • Slaten, K.1    Droujkova, M.2    Berenson, S.B.3    Williams, L.4    Layman, L.5
  • 4
    • 84878733669 scopus 로고    scopus 로고
    • Toward Empowering Extreme Programming from an Architectural Viewpoint
    • Article (CrossRef Link)
    • Amir S. S., Amir A. S. and Fereidoon S., "Toward Empowering Extreme Programming from an Architectural Viewpoint," in Proc. of 9th International Conference XP 2008, Vol. 9, pp.222-223, 2008. Article (CrossRef Link)
    • (2008) Proc. of 9th International Conference XP 2008 , vol.9 , pp. 222-223
    • Amir, S.S.1    Amir, A.S.2    Fereidoon, S.3
  • 8
    • 84896812110 scopus 로고    scopus 로고
    • A Review on Software Development Security Engineering using Dynamic System Method(DSDM)
    • Article (CrossRef Link)
    • Sani, A., Firdaus, A., Jeong, S. R. and Ghani, I., "A Review on Software Development Security Engineering using Dynamic System Method(DSDM)," International Journal of Computer Applications, Vol.69, No.25, pp.33-44, 2013. Article (CrossRef Link)
    • (2013) International Journal of Computer Applications , vol.69 , Issue.25 , pp. 33-44
    • Sani, A.1    Firdaus, A.2    Jeong, S.R.3    Ghani, I.4
  • 9
    • 84896895759 scopus 로고    scopus 로고
    • Software Security Engineering in Extreme Programming Methodology: A Systematic Literature Review
    • Article (CrossRef Link)
    • Ghani, I., Yasin, N. I. B., "Software Security Engineering in Extreme Programming Methodology: A Systematic Literature Review," Journal Science International Lahore, Vol.25, No.2, pp.215-221, 2013. Article (CrossRef Link)
    • (2013) Journal Science International Lahore , vol.25 , Issue.2 , pp. 215-221
    • Ghani, I.1    Yasin, N.I.B.2
  • 10
    • 84896888319 scopus 로고    scopus 로고
    • Developing Websites using Feature Driven Development: A Case Study
    • Article (CrossRef Link)
    • Firdaus, A., Ghani, I., Yasin, N. I. M., "Developing Websites using Feature Driven Development: A Case Study," Journal of Clean Energy Technologies, Vol.1, No.4, pp.322-326, 2013. Article (CrossRef Link)
    • (2013) Journal of Clean Energy Technologies , vol.1 , Issue.4 , pp. 322-326
    • Firdaus, A.1    Ghani, I.2    Yasin, N.I.M.3
  • 11
    • 84896872770 scopus 로고    scopus 로고
    • Secure Dynamic System Development Method (Sdsdm) Model For Secure Software Development
    • Article (CrossRef Link)
    • Sani, A., Ghani, I., Jeong, S. R., "Secure Dynamic System Development Method (Sdsdm) Model For Secure Software Development," Journal, Science International Lahore, Special Issue, 1059-64, 2013. Article (CrossRef Link)
    • (2013) Journal, Science International Lahore, Special Issue , pp. 1059-1064
    • Sani, A.1    Ghani, I.2    Jeong, S.R.3
  • 15
    • 37849033133 scopus 로고    scopus 로고
    • An evaluation of the degree of agility in six agile methods and it applicability for method engineering
    • Article (CrossRef Link)
    • Qumer, A. and Henderson-Sellers, B., "An evaluation of the degree of agility in six agile methods and it applicability for method engineering," Information and Software Technology, Vol.50, pp.280-295, 2008. Article (CrossRef Link)
    • (2008) Information and Software Technology , vol.50 , pp. 280-295
    • Qumer, A.1    Henderson-Sellers, B.2
  • 16
    • 84896840981 scopus 로고    scopus 로고
    • Improving Software Economics: Top 10 Principles of Achieving Agility At Scale
    • Article (CrossRef Link)
    • Walker, R., "Improving Software Economics: Top 10 Principles of Achieving Agility At Scale," Improving Software Economics white paper, 2009. Article (CrossRef Link)
    • (2009) Improving Software Economics White Paper
    • Walker, R.1
  • 18
    • 80455177539 scopus 로고    scopus 로고
    • Security Testing in Agile Web Application Development - A Case Study Using the East Methodology
    • Article (CrossRef Link)
    • Erdogan, G., Meland, P. H. and Mathieson, D., "Security Testing in Agile Web Application Development - A Case Study Using the East Methodology," in Proc. of 11th International Conference XP2010, Vol.48, pp.14-27, 2010. Article (CrossRef Link)
    • (2010) Proc. of 11th International Conference XP2010 , vol.48 , pp. 14-27
    • Erdogan, G.1    Meland, P.H.2    Mathieson, D.3
  • 21
    • 84896815039 scopus 로고    scopus 로고
    • Article (CrossRef Link)
    • Anti, V, S., et al., "Secure software development and agile methods - notes," at http://confluence.agilefinland.com/display/af/Secure+software+development+and+agile+methods+-+notes, 2010. Article (CrossRef Link)
    • (2010) Secure Software Development and Agile Methods - Notes
    • Anti, V.1
  • 24
    • 34547700307 scopus 로고    scopus 로고
    • Addison-wesley software security series, Article (CrossRef Link)
    • McGraw, G., "Software Security: Building Security In," Addison-wesley software security series, 2006. Article (CrossRef Link)
    • (2006) Software Security: Building Security In
    • McGraw, G.1
  • 25
    • 0004030933 scopus 로고
    • Toronto, Ontario, Canada: John Wiley & Sons, Article (CrossRef Link)
    • Checkland, P., "Soft Systems Methodology in Action," Toronto, Ontario, Canada: John Wiley & Sons, 1990. Article (CrossRef Link)
    • (1990) Soft Systems Methodology In Action
    • Checkland, P.1
  • 26
    • 34249848744 scopus 로고    scopus 로고
    • QFD Institute, Article (CrossRef Link)
    • QFD Institute, "Frequently Asked Questions About QFD," at http://www.qfdi.org/what_is_qfd/faqs_about_qfd.html, 2005. Article (CrossRef Link)
    • (2005) Frequently Asked Questions About QFD
  • 30
    • 0004235369 scopus 로고
    • Oxford, UK: Blackwell, Article (CrossRef Link)
    • Schiffrin, D., "Approaches to Discourse," Oxford, UK: Blackwell, 1994. Article (CrossRef Link)
    • (1994) Approaches to Discourse
    • Schiffrin, D.1
  • 31
    • 0033683937 scopus 로고    scopus 로고
    • An Assessment of the Relative Efficiency of a Facilitator-Driven Requirements Collection Process with Respect to the Conventional Interview Method
    • Article (CrossRef Link)
    • Hubbard, R., Mead, N. and Schroeder, C., "An Assessment of the Relative Efficiency of a Facilitator-Driven Requirements Collection Process with Respect to the Conventional Interview Method," in Proc. of 4th International Conference on Requirements Engineering, pp.178-186, 2000. Article (CrossRef Link)
    • (2000) Proc. of 4th International Conference On Requirements Engineering , pp. 178-186
    • Hubbard, R.1    Mead, N.2    Schroeder, C.3
  • 32
    • 84896816511 scopus 로고    scopus 로고
    • Security Development Lifecycle for Agile Development
    • Sullivan, Article (CrossRef Link)
    • Sullivan., "Security Development Lifecycle for Agile Development," Mirosoft, at http://www.blackhat.com/presentations/bh-dc-10/Sullivan_Bryan/BlackHat-DC-2010-Sullivan-SDL-Agile-wp.pdf, 2009. Article (CrossRef Link)
    • (2009) Mirosoft
  • 33
    • 84896869538 scopus 로고    scopus 로고
    • Master Thesis Norwegian University of Science and Technology Department of Computer and Information Science, Article (CrossRef Link)
    • Gencer, E., "Security Testing of Web Based Applications," Master Thesis Norwegian University of Science and Technology Department of Computer and Information Science, 2009. Article (CrossRef Link)
    • (2009) Security Testing of Web Based Applications
    • Gencer, E.1
  • 37
    • 78650777193 scopus 로고    scopus 로고
    • A proposed framework for understanding information security culture and practices in the Saudi context
    • SECAU - Edith Cowan University, Australia, Perth, Australia, Article (CrossRef Link)
    • Alnatheer, M., Nelson, K.: A proposed framework for understanding information security culture and practices in the Saudi context. In: Proceedings of the 7th Australian Information Security Management Conference, pp. 6-17. SECAU - Edith Cowan University, Australia, Perth, Australia, 2009. Article (CrossRef Link)
    • (2009) Proceedings of the 7th Australian Information Security Management Conference , pp. 6-17
    • Alnatheer, M.1    Nelson, K.2
  • 38
    • 84896848487 scopus 로고    scopus 로고
    • accessed on May 2013, Article (CrossRef Link)
    • Vaha-Sipila, A., "Software security in agile product management," http://www.fokkusu.fi/agile-security/Software%20security%20in%20agile%20product%20management.pdf (2011) accessed on May 2013. Article (CrossRef Link)
    • (2011) Software Security In Agile Product Management
    • Vaha-Sipila, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.