Agile security using an incremental security architecture

被引:0
|
作者
Chivers, H [1 ]
Paige, RF [1 ]
Ge, XC [1 ]
机构
[1] Univ York, Dept Comp Sci, York YO10 5DD, N Yorkshire, England
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The effective provision of security in an agile development requires a new approach: traditional security practices are bound to equally traditional development methods. However, there are concerns that security is difficult to build incrementally, and can prove prohibitively expensive to refactor. This paper describes how to grow security, organically, within an agile project, by using an incremental security architecture which evolves with the code. The architecture provides an essential bridge between system-wide security properties and implementation mechanisms, a focus for understanding security in the project, and a trigger for security refactoring. The paper also describes criteria that allow implementers to recognize when refactoring is needed, and a concrete example that contrasts incremental and 'top-down' architectures.
引用
收藏
页码:57 / 65
页数:9
相关论文
共 50 条
  • [21] INDECT Security Architecture
    Uruena, Manuel
    Machnik, Petr
    Niemiec, Marcin
    Stoianov, Nikolai
    MULTIMEDIA COMMUNICATIONS, SERVICES AND SECURITY, MCSS 2013, 2013, 368 : 273 - 287
  • [22] Development of Agile Security Framework Using a Hybrid Technique for Requirements Elicitation
    Sonia
    Singhal, Archana
    ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL, 2011, 125 : 178 - 188
  • [23] CATV security architecture
    Volner, R
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 209 - 215
  • [24] ezHPC security architecture
    Moncrief, George
    Townsend, Trent
    Swillie, Scotty
    PROCEEDINGS OF THE HPCMP USERS GROUP CONFERENCE 2006, 2006, : 422 - 426
  • [25] Internet security architecture
    Molva, R
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 787 - 804
  • [26] A knowledge architecture - for IT security
    Kesh, Someswar
    Ratnasingam, Pauline
    COMMUNICATIONS OF THE ACM, 2007, 50 (07) : 103 - 108
  • [27] Cyber Security - Security strategy for distribution management system and security architecture considerations
    Vittor, Timothy R.
    Sukumara, T.
    Sudarsan, S. D.
    Starck, Janne
    2017 70TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2017,
  • [28] A Security Architecture for Intranet Based on Security Area Division
    Gao Fuxiang
    Li Sha
    Wang Xiaolu
    Yao Lan
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 539 - 543
  • [29] Security Type Comparison In Service Oriented Architecture Security
    Yesiltepe, Mirsat
    Bozkurt, Omer Ozgur
    WORLD CONFERENCE ON TECHNOLOGY, INNOVATION AND ENTREPRENEURSHIP, 2015, : 1833 - 1839
  • [30] SDN Security Plane: An Architecture for Resilient Security Services
    Hussein, Ali
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING WORKSHOP (IC2EW), 2016, : 54 - 59