Show simple item record

AuthorKhan, Rafiq Ahmad
AuthorKhan, Siffat Ullah
AuthorKhan, Habib Ullah
AuthorIlyas, Muhammad
Available date2022-12-28T06:09:43Z
Publication Date2021-01-18
Publication NameIEEE Access
Identifierhttp://dx.doi.org/10.1109/ACCESS.2021.3052311
CitationKhan, R. A., Khan, S. U., Khan, H. U., & Ilyas, M. (2021). Systematic mapping study on security approaches in secure software engineering. IEEE Access, 9, 19139-19160.
ISSN2169-3536
URIhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85099733632&origin=inward
URIhttp://hdl.handle.net/10576/37695
AbstractIn the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.
SponsorQatar University [IRCC-2020-009].
Languageen
PublisherIEEE
Subjectsecure software development
secure software engineering
security approaches
software development life cycle
Software security
systematic mapping study
TitleSystematic Mapping Study on Security Approaches in Secure Software Engineering
TypeArticle
Pagination19139-19160
Volume Number9
dc.accessType Open Access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record