Title :
Extrapolating security requirements to an established software process: Version 1.0
Author :
Haron, Galoh Rashidah ; Siong, Ng Kang
Author_Institution :
Inf. Syst. Security Lab., MIMOS Berhad, Kuala Lumpur, Malaysia
Abstract :
This paper presents the mechanisms on integrating security related activities to an established software process in an organization. The main challenge is to attain a security model that is fit to the organization´s security objectives and environment. We quest for an adapted security model that is lightweight yet provides an optimized security impacts in delivering software products. Implementation of the adapted security model must also comprehend the limiting factor of people resources. We share experiences and lesson learned in transforming the adapted security model into secure software process.
Keywords :
security of data; software engineering; security environment; security impact; security model; security objective; security requirement; software process; software product; Authentication; Authorization; Documentation; Organizations; Personnel; Software; secure software development process; security requirement; software process;
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
Conference_Location :
Abu Dhabi
Print_ISBN :
978-1-4577-0884-8