Abstract | ||
---|---|---|
Security engineering and agile development are often perceived as a clash of cultures. To address this clash, several approaches have been proposed that allow for agile security engineering. Unfortunately, agile development organization differ in their actual procedures and environmental properties resulting in varying requirements. We propose an approach to compare and select methods for agile security engineering. Furthermore, our approach addresses adaptation or construction of a tailored method taking the existing development culture into account. We demonstrate the feasibility of our proposal and report early experiences from its application within a small development organization for digital solutions in the automotive domain. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/ARES.2015.96 | International Conference on availability, reliability and security |
Keywords | Field | DocType |
Threat modeling, security analysis, agile soft-ware development, Scrum (Software development) | Agile Unified Process,Computer science,Computer security,Security engineering,Lean software development,Requirements analysis,Risk analysis (engineering),Agile software development,Agile usability engineering,Requirement,Empirical process (process control model) | Conference |
Citations | PageRank | References |
0 | 0.34 | 8 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Stephan Renatus | 1 | 0 | 0.68 |
Clemens Teichmann | 2 | 0 | 0.68 |
Jörn Eichler | 3 | 5 | 2.47 |