Systematic Mapping Study on Security Approaches in Secure Software Engineering
Author | Khan, Rafiq Ahmad |
Author | Khan, Siffat Ullah |
Author | Khan, Habib Ullah |
Author | Ilyas, Muhammad |
Available date | 2022-12-28T06:09:43Z |
Publication Date | 2021-01-18 |
Publication Name | IEEE Access |
Identifier | http://dx.doi.org/10.1109/ACCESS.2021.3052311 |
Citation | Khan, R. A., Khan, S. U., Khan, H. U., & Ilyas, M. (2021). Systematic mapping study on security approaches in secure software engineering. IEEE Access, 9, 19139-19160. |
ISSN | 2169-3536 |
Abstract | In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions. |
Sponsor | Qatar University [IRCC-2020-009]. |
Language | en |
Publisher | IEEE |
Subject | secure software development secure software engineering security approaches software development life cycle Software security systematic mapping study |
Type | Article |
Pagination | 19139-19160 |
Volume Number | 9 |
Files in this item
This item appears in the following Collection(s)
-
Accounting & Information Systems [520 items ]