The ISDF Framework: Towards Secure Software Development


Abdulaziz Alkussayer, William H Allen, Journal of Information Processing Systems Vol. 6, No. 1, pp. 91-106, Mar. 2010  

10.3745/JIPS.2010.6.1.091
Keywords: Security Patterns, Secure Development, Security Framework
Fulltext:

Abstract

The rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Alkussayer, A. & Allen, W. (2010). The ISDF Framework: Towards Secure Software Development. Journal of Information Processing Systems, 6(1), 91-106. DOI: 10.3745/JIPS.2010.6.1.091.

[IEEE Style]
A. Alkussayer and W. H. Allen, "The ISDF Framework: Towards Secure Software Development," Journal of Information Processing Systems, vol. 6, no. 1, pp. 91-106, 2010. DOI: 10.3745/JIPS.2010.6.1.091.

[ACM Style]
Abdulaziz Alkussayer and William H Allen. 2010. The ISDF Framework: Towards Secure Software Development. Journal of Information Processing Systems, 6, 1, (2010), 91-106. DOI: 10.3745/JIPS.2010.6.1.091.