Affiliation:
1. Chandigarh University, India
Abstract
Managerial and commercialization approach that operate software systems continue to look for assurance that software they acquire should have security attributes they hope for. Methods used to assess the security of software development are software design, coding, testing, and support and consideration of security as well. Researchers of software development face many issues which remain constant and very frequent as there was no development in earlier phase of software development to avoid threats and loopholes in the software. Researchers analyze existing methods and their efficiency for software development within an open-source software supply chain. These efforts yielded valuable insights for an automated tool and knowledge base that has the potential for overcoming some of the major and in practice limitations of secure development on a wider scale. As a summarized development of software services along with authenticated approach is mandatory to make its usage on wider expands.
Reference33 articles.
1. Threat risk modeling.;S.Al-Fedaghi;Proc. 2nd ICCSN
2. Allan, D., Hahn, T., Szakal, A., Whitmore, J., & Buecker, A. (2010). Security in development: The IBM secure engineering framework. IBM Corporation.
3. Intelligent stress calculation and scheduling in segmented processor systems using buddy approach
4. Bhullar, R. K., Pawar, L., & Kumar, V. (2016, October). A novel prime numbers based hashing technique for minimizing collisions. In Proceedings of the 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), (pp. 522-527). IEEE.
5. Chen, Y., Boehm, B., & Sheppard, L. (2007, Jan). Value driven security threat modeling based on attack path analysis. In Proc. 40th Annu. HICSS (pp. 280a–288a).