liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
How can the developer benefit from security modeling?
Linköping University, The Institute of Technology. Linköping University, Department of Computer and Information Science, Database and information techniques.
Linköping University, The Institute of Technology. Linköping University, Department of Computer and Information Science, Database and information techniques.
SINTEF ICT, Trondheim, Norway.
SINTEF ICT, Trondheim, Norway.
Show others and affiliations
2007 (English)In: Second International Conference on Availability, Reliability and Security, 2007, IEEE Computer Society, 2007, 1017-1025 p.Conference paper, Published paper (Refereed)
Abstract [en]

Security has become a necessary part of nearly every software development project, as the overall risk from malicious users is constantly increasing, due to increased consequences of failure, security threats and exposure to threats. There are few projects today where software security can be ignored. Despite this, security is still rarely taken into account throughout the entire software lifecycle; security is often an afterthought, bolted on late in development, with little thought to what threats and exposures exist. Little thought is given to maintaining security in the face of evolving threats and exposures. Software developers are usually not security experts. However, there are methods and tools available today that can help developers build more secure software. Security modeling, modeling of e.g., threats and vulnerabilities, is one such method that, when integrated in the software development process, can help developers prevent security problems in software. We discuss these issues, and present how modeling tools, vulnerability repositories and development tools can be connected to provide support for secure software development

Place, publisher, year, edition, pages
IEEE Computer Society, 2007. 1017-1025 p.
Keyword [en]
Software Security, Software Development Process, Security Modeling
National Category
Computer Science
Identifiers
URN: urn:nbn:se:liu:diva-37698DOI: 10.1109/ARES.2007.96Local ID: 37625ISBN: 978-0-7695-2775-8 (print)ISBN: 0-7695-2775-2 (print)OAI: oai:DiVA.org:liu-37698DiVA: diva2:258547
Conference
Second International Conference on Availability, Reliability and Security (ARES 2007), 10-13 April, 2007 Vienna, Austria
Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2014-06-24

Open Access in DiVA

No full text

Other links

Publisher's full text

Authority records BETA

Ardi, ShanaiByers, DavidShahmehri, Nahid

Search in DiVA

By author/editor
Ardi, ShanaiByers, DavidShahmehri, Nahid
By organisation
The Institute of TechnologyDatabase and information techniques
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 135 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf