Evolution of Security Engineering Artifacts

Author:

Felderer Michael1,Katt Basel1,Kalb Philipp1,Jürjens Jan2,Ochoa Martín3,Paci Federica4,Tran Le Minh Sang5,Tun Thein Than6,Yskout Koen7,Scandariato Riccardo7,Piessens Frank7,Vanoverberghe Dries7,Fourneret Elizabeta8,Gander Matthias1,Solhaug Bjørnar9,Breu Ruth1

Affiliation:

1. Institute of Computer Science, University of Innsbruck, Innsbruck, Austria

2. Department of Software Engineering, Technical University of Dortmund, Dortmund, Germany

3. Department of Software Engineering, Technical University of Munich, Munich, Germany

4. Department of Information Engineering and Computer Science, University of Trento, Trento, Italy

5. Security Research Group, University of Trento, Trento, Italy

6. Department of Computing, The Open University, Milton Keynes, UK

7. iMinds-DistriNet, KU Leuven, Leuven, Belgium

8. SnT Centre, University of Luxembourg, Luxembourg

9. Information and Communication Technology (ICT), SINTEF, Oslo, Norway

Abstract

Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution. Security evolution can only be managed adequately if it is considered for all artifacts throughout the software development lifecycle. This article provides state of the art on the evolution of security engineering artifacts. The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring. For each of these artifacts the authors give an overview of evolution and security aspects and discuss the state of the art on its security evolution in detail. Based on this comprehensive survey, they summarize key issues and discuss directions of future research.

Publisher

IGI Global

Subject

General Medicine

Reference265 articles.

1. Security analysis and enhancements of computer operating systems

2. Checking threat modeling data flow diagrams for implementation conformance and security

3. Ahmad, A., Jamshidi, P., & Pahl, C. (2012). Pattern-driven reuse in architecture-centric evolution for service software. In 7th international conference on software paradigm trends ICSOFT’2012.

4. Alberts, C. J., & Dorofee, A. J. (2001). OCTAVE Criteria (Tech. Rep. No. CMU/SEI-2001-TR-016). CERT.

5. Towards Systematic Integration of Quality Requirements into Software Architecture

Cited by 9 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Human-centred cyber secure software engineering;Zeitschrift für Arbeitswissenschaft;2022-12-23

2. An Exploratory Study on Regression Vulnerabilities;ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM);2022-09-19

3. Cybersecurity management for distributed control system: systematic approach;Journal of Ambient Intelligence and Humanized Computing;2021-01-03

4. On the Modeling of Automotive Security: A Survey of Methods and Perspectives;Future Internet;2020-11-16

5. Distributed Control Systems Security for CPS;Studies in Computational Intelligence;2018

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3