• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Business and Economics
  • Accounting & Information Systems
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Systematic Mapping Study on Security Approaches in Secure Software Engineering

    Thumbnail
    View/Open
    Systematic_Mapping_Study_on_Security_Approaches_in_Secure_Software_Engineering.pdf (6.739Mb)
    Date
    2021-01-18
    Author
    Khan, Rafiq Ahmad
    Khan, Siffat Ullah
    Khan, Habib Ullah
    Ilyas, Muhammad
    Metadata
    Show full item record
    Abstract
    In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.
    URI
    https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85099733632&origin=inward
    DOI/handle
    http://dx.doi.org/10.1109/ACCESS.2021.3052311
    http://hdl.handle.net/10576/37695
    Collections
    • Accounting & Information Systems [‎555‎ items ]

    entitlement

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      Systematic Literature Review on Security Risks and its Practices in Secure Software Development 

      Khan, Rafiq Ahmad; Khan, Siffat Ullah; Khan, Habib Ullah; Ilyas, Muhammad ( IEEE , 2022 , Article)
      Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, ...
    • Thumbnail

      Software-defined networking security: Pros and cons 

      Dabbagh, Mehiar; Hamdaoui, Bechir; Guizani, Mohsen; Rayes, Ammar ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase ...
    • Thumbnail

      An Overview on the Identification of Software Birthmarks for Software Protection 

      Nazir, Shah; Khan, Habib Ullah ( Springer Science and Business Media Deutschland GmbH , 2022 , Conference)
      Software birthmarks were created in order to identify instances of software piracy. The perception of a software birthmark was established in response to the limitations of watermarks, fingerprints, and digital signatures, ...

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video