Abstract | ||
---|---|---|
It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of trust in the security and quality of these applications is crucial to their ultimate success. Information security has therefore become a core requirement for software applications, driven by the need to protect critical assets and the need to build and preserve widespread trust in computing. The aim of this paper is to provide guidance to software designers and developers by defining a set of guidelines for secure software development. The guidelines established are based on various internationally recognised standards and best practices and some of the processes developed by many key role players. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1145/1456659.1456667 | SAICSIT Conf. |
Keywords | Field | DocType |
secure software development,core requirement,software application,critical asset,widespread trust,focal point,best practice,information security,deploying software application,software designer,software development,process development | Computer science,Computer security,Package development process,Software security assurance,Software peer review,Knowledge management,Software quality management,Risk analysis (engineering),Resource-oriented architecture,Software construction,Software development,Social software engineering | Conference |
Citations | PageRank | References |
7 | 0.63 | 4 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lynn Futcher | 1 | 35 | 10.66 |
Rossouw Von Solms | 2 | 1025 | 98.95 |