DocumentCode :
561292
Title :
Extrapolating security requirements to an established software process: Version 1.0
Author :
Haron, Galoh Rashidah ; Siong, Ng Kang
Author_Institution :
Inf. Syst. Security Lab., MIMOS Berhad, Kuala Lumpur, Malaysia
fYear :
2011
fDate :
11-14 Dec. 2011
Firstpage :
752
Lastpage :
757
Abstract :
This paper presents the mechanisms on integrating security related activities to an established software process in an organization. The main challenge is to attain a security model that is fit to the organization´s security objectives and environment. We quest for an adapted security model that is lightweight yet provides an optimized security impacts in delivering software products. Implementation of the adapted security model must also comprehend the limiting factor of people resources. We share experiences and lesson learned in transforming the adapted security model into secure software process.
Keywords :
security of data; software engineering; security environment; security impact; security model; security objective; security requirement; software process; software product; Authentication; Authorization; Documentation; Organizations; Personnel; Software; secure software development process; security requirement; software process;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
Conference_Location :
Abu Dhabi
Print_ISBN :
978-1-4577-0884-8
Type :
conf
Filename :
6148432
Link To Document :
بازگشت