Incorporating Security into Software Development Process

被引:0
|
作者
Yoshioka, R. [1 ]
Watanobe, Y. [1 ]
Mirenkov, N. [1 ]
机构
[1] Univ Aizu, Aizu Wakamatsu, Fukushima, Japan
关键词
D O I
10.3233/978-1-58603-916-5-99
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A general scheme of software development process is considered and some aspects related to integrating security into this scheme are analyzed. In particular, semantic-based, defense-in-depth techniques embedded into system/component defense shields and data acquiring/monitoring kernels are considered. The defense shields are to semantically check data of every input before a software component may process them and also to check every output before sending it to other components. The kernels are to regularly perform semantic analysis of the internal status and local data of a component/system. Based on these two ideas, real-time discovery of Vulnerabilities and threats is possible even when various protective measures, such as, passwords, firewalls, intrusion detection systems, access control lists, etc. have been breached. Existing programming systems and possible new methods to realize the shields and kernels are also considered.
引用
收藏
页码:99 / 109
页数:11
相关论文
共 50 条
  • [1] INCORPORATING ETHICS THROUGHOUT THE SOFTWARE DEVELOPMENT PROCESS
    Gordon, D.
    Collins, M.
    Becevel, A.
    O'Mahony, W.
    14TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED2020), 2020, : 8109 - 8116
  • [2] Supply-Chain Risk Management: Incorporating Security into Software Development
    Ellison, Robert J.
    Woody, Carol
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 4433 - 4442
  • [3] Security in the Software Development Process: Role of Human Factors
    Singh, Tripti
    Johnston, Allen C.
    AMCIS 2020 PROCEEDINGS, 2020,
  • [4] Incorporating software security into an undergraduate software engineering course
    Lester, Cynthia Y.
    Jamerson, Frank
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 161 - 166
  • [5] Development system security process of ISO/IEC TR 15504 and security considerations for software process improvement
    Lee, ES
    Lee, M
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 363 - 372
  • [6] A Study on IT Security Control by Comparison of Secure Software Development Process
    Rijayanti, Rita
    Hendayun, Mokhamad
    Suharto, Toto
    Hwang, Mintae
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 551 - 560
  • [7] An Exploratory Study Gathering Security Requirements for the Software Development Process
    Andrade, Roberto
    Torres, Jenny
    Ortiz-Garces, Ivan
    Mino, Jorge
    Almeida, Luis
    ELECTRONICS, 2023, 12 (17)
  • [8] Software quality and application security base on the AGILISO software development process and the OWASP standard
    Blandon-Jaramillo, Carlos Arturo
    Jaramillo-Becerra, Jhon Steven
    TECNOLOGIA EN MARCHA, 2023, 36 (0-):
  • [9] Incorporating active learning activities to the design and development of an undergraduate software and web security course
    Srivatanakul, Thitima
    Annansingh, Fenio
    JOURNAL OF COMPUTERS IN EDUCATION, 2022, 9 (01) : 25 - 50
  • [10] Incorporating active learning activities to the design and development of an undergraduate software and web security course
    Thitima Srivatanakul
    Fenio Annansingh
    Journal of Computers in Education, 2022, 9 : 25 - 50