In this article, we contrast the results of a series of interviews with agile software development organizations with a case study of a distributed agile development effort, focusing on how information security is taken care of in an agile context. The interviews indicate that small and medium-sized agile software development organizations do not use any particular methodology to achieve security goals, even when their software is web-facing and potential targets of attack, and our case study confirms that even in cases where security is an articulated requirement, and where security design is fed as input to the implementation team, there is no guarantee that the end result meets the security objectives. We contend that security must be bu...
The agile software development approach makes developing secure software challenging. Existing appro...
The agile software development approach makes developing secure software challenging. Existing appro...
Agile processes have become ubiquitous in the software development community, and are used by the ma...
In this article, we contrast the results of a series of interviews with agile software development o...
Given the widespread adoption of agile methods and the rising number of software vulnerabilities, we...
Background: Software developers are facing increased pressure to lower development time, release new...
Cybersecurity has been identified as a major challenge confronting the digital world,neglecting cybe...
Context: Software security engineering provides the means to define, implement and verify security i...
Context: Today’s software development industry requires high-speed software delivery from the develo...
Context: Software security engineering provides the means to define, implement and verify security i...
A set of challenges of developing secure software using the agile development approach and methods a...
This thesis is about an empirical study on the effects of using predominant security mechanisms for ...
Agile development methods are promising to become the next generation replacing waterfall developmen...
Agile methods are widely employed to develop high-quality software, but theoretical analyses argue t...
A set of challenges of developing secure software using the agile development approach and methods a...
The agile software development approach makes developing secure software challenging. Existing appro...
The agile software development approach makes developing secure software challenging. Existing appro...
Agile processes have become ubiquitous in the software development community, and are used by the ma...
In this article, we contrast the results of a series of interviews with agile software development o...
Given the widespread adoption of agile methods and the rising number of software vulnerabilities, we...
Background: Software developers are facing increased pressure to lower development time, release new...
Cybersecurity has been identified as a major challenge confronting the digital world,neglecting cybe...
Context: Software security engineering provides the means to define, implement and verify security i...
Context: Today’s software development industry requires high-speed software delivery from the develo...
Context: Software security engineering provides the means to define, implement and verify security i...
A set of challenges of developing secure software using the agile development approach and methods a...
This thesis is about an empirical study on the effects of using predominant security mechanisms for ...
Agile development methods are promising to become the next generation replacing waterfall developmen...
Agile methods are widely employed to develop high-quality software, but theoretical analyses argue t...
A set of challenges of developing secure software using the agile development approach and methods a...
The agile software development approach makes developing secure software challenging. Existing appro...
The agile software development approach makes developing secure software challenging. Existing appro...
Agile processes have become ubiquitous in the software development community, and are used by the ma...