liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Prioritisation and Selection of Software Security Activities
Linköping University, The Institute of Technology. Linköping University, Department of Computer and Information Science, Database and information techniques.
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, The Institute of Technology.
2009 (English)In: International Conference on Availability, Reliability and Security, 2009, IEEE , 2009, 201-207 p.Conference paper, Published paper (Refereed)
Abstract [en]

Software security is accomplished by introducing security-related activities into the software development process or by altering existing activities so that security is taken into account. Since the importance of software security has only relatively recently received the recognition it deserves, security is not ingrained into the development processes in common use today. A variety of approaches to software security have been proposed, but they rarely support developers in determining which security activities are appropriate for them and which they should choose to implement. An exception to this rule is the Sustainable Software Security Process (S3P). This paper describes the final step of the S3P, which helps developers estimate the cost of security-related activities and select the combination of security activities that best suits their needs. This is accomplished by applying the Analytic Hierarchy Process and an automated search heuristic, scatter search, to the models created as part of the S3P.  

Place, publisher, year, edition, pages
IEEE , 2009. 201-207 p.
Keyword [en]
Software security, analytic hierarchy process, software engineering, software process improvement
National Category
Computer Science
Identifiers
URN: urn:nbn:se:liu:diva-43647DOI: 10.1109/ARES.2009.52ISI: 000270612000027Local ID: 74474ISBN: 978-1-4244-3572-2 (print)ISBN: e-978-0-7695-3564-7 OAI: oai:DiVA.org:liu-43647DiVA: diva2:264507
Conference
4th International Conference on Availability, Reliability and Security (ARES 2009), 16-19 March 2009, Fukuoka, Japan
Note

Acceptance rate: 25 percent

Available from: 2009-10-10 Created: 2009-10-10 Last updated: 2014-06-24

Open Access in DiVA

No full text

Other links

Publisher's full text

Authority records BETA

Byers, DavidShahmehri, Nahid

Search in DiVA

By author/editor
Byers, DavidShahmehri, Nahid
By organisation
The Institute of TechnologyDatabase and information techniques
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 93 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf