Abstract | ||
---|---|---|
Security testing is an important step in the lifetime of both newly-designed and existing systems. Different methodologies exist to guide testers to the selection, design, and implementation of the most appropriate testing procedures for various contexts. Typically, each methodology stems from the specific needs of a particular category of actors, and consequently is biased towards some aspect of peculiar interest to them. This work compares the most commonly adopted methodologies to point out their strengths and weaknesses, and, building on the results of the performed analysis, proposes a path towards the definition of an integrated approach, by defining the characteristics that a new methodology should exhibit in order to combine the best aspects of the existing ones. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/ISCC.2010.5546813 | ISCC |
Keywords | Field | DocType |
integrated approach,new methodology,different methodology,effective security testing methodology,particular category,best aspect,important step,security testing,specific need,peculiar interest,appropriate testing procedure,writing,tv,planning,security,testing | Security testing,Software engineering,Computer science,Computer security,Program testing,Strengths and weaknesses,Distributed computing | Conference |
Citations | PageRank | References |
3 | 0.43 | 3 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Marco Prandini | 1 | 45 | 14.09 |
Marco Ramilli | 2 | 94 | 11.10 |