Cart (Loading....) | Create Account
Close category search window
 

Security Engineering Approach to Support Software Security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Nunes, F.J.B. ; Mestrado em Inf. Aplic., Univ. de Fortaleza, Fortaleza, Brazil ; Belchior, A.D. ; Albuquerque, A.B.

As information security and privacy become increasingly important to organizations, the demand grows for software development processes that assure information integrity, availability, and confidentiality. Unfortunately, despite the investments made in process improvement, there is still no guarantee that the developed software products are protected from attacks or do not present security vulnerabilities. As soon as software products continue to present security flaws and be compromised by attacks, the Systems Security Engineering - Capability Maturity Model (SSE-CMM) becomes the de facto model to structure a software security approach. Moreover, security best practices, practical experience or international standards, like ISO/IEC 15408, should also be considered to support security engineering as they propose activities that can be adapted to enhance security in a software development process and contribute towards the overall software security. This paper proposes a security engineering approach to support software security through a specialized process that helps develop more secure software, entitled Process to Support Software Security (PSSS). In addition, one of PSSS's subprocess, Model Security Threat, is explained in detail. This paper also presents the results of the case study when the PSSS was first applied in a software development project as well as the preliminary results of a large project implementation.

Published in:

Services (SERVICES-1), 2010 6th World Congress on

Date of Conference:

5-10 July 2010

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.