A security-enhanced agile software development process, SEAP, is introduced in the development of a mobile money transfer system at Ericsson Corp. A specific characteristic of SEAP is that it includes a security group consisting of four different competences, i.e., Security manager, security architect, security master and penetration tester. Another significant feature of SEAP is an integrated risk analysis process. In analyzing risks in the development of the mobile money transfer system, a general finding was that SEAP either solves risks that were previously postponed or solves a larger proportion of the risks in a timely manner. The previous software development process, i.e., The baseline process of the comparison outlined in this pape...
Little attention has been given so far to the process of security risk management at the early stage...
Little attention has been given so far to the process of security risk management at the early stage...
The agile software development approach makes developing secure software challenging. Existing appro...
A security-enhanced agile software development process, SEAP, is introduced in the development of a ...
In this paper, a novel security-enhanced agile software development process, SEAP, is introduced. It...
Background: Software developers are facing increased pressure to lower development time, release new...
Agile software development has been used by industry to create a more flexible and lean software dev...
Context: Today’s software development industry requires high-speed software delivery from the develo...
In this study, a framework was developed, based on a literature review, to help managers incorporate...
Although agile methods gained popularity and became globally widespread, developing secure software ...
The agile software development approach makes developing secure software challenging. Existing appro...
This thesis is about an empirical study on the effects of using predominant security mechanisms for ...
The security directives at Ericsson Group IT have recently been re-worked to apply to modern securit...
Agile development methods are promising to become the next generation replacing waterfall developmen...
The agile software development approach makes developing secure software challenging. Existing appro...
Little attention has been given so far to the process of security risk management at the early stage...
Little attention has been given so far to the process of security risk management at the early stage...
The agile software development approach makes developing secure software challenging. Existing appro...
A security-enhanced agile software development process, SEAP, is introduced in the development of a ...
In this paper, a novel security-enhanced agile software development process, SEAP, is introduced. It...
Background: Software developers are facing increased pressure to lower development time, release new...
Agile software development has been used by industry to create a more flexible and lean software dev...
Context: Today’s software development industry requires high-speed software delivery from the develo...
In this study, a framework was developed, based on a literature review, to help managers incorporate...
Although agile methods gained popularity and became globally widespread, developing secure software ...
The agile software development approach makes developing secure software challenging. Existing appro...
This thesis is about an empirical study on the effects of using predominant security mechanisms for ...
The security directives at Ericsson Group IT have recently been re-worked to apply to modern securit...
Agile development methods are promising to become the next generation replacing waterfall developmen...
The agile software development approach makes developing secure software challenging. Existing appro...
Little attention has been given so far to the process of security risk management at the early stage...
Little attention has been given so far to the process of security risk management at the early stage...
The agile software development approach makes developing secure software challenging. Existing appro...