Security-aware software development life Cycle (SaSDLC) - Processes and tools

dc.contributor.authorTalukder, A.K.
dc.contributor.authorMaurya, V.K.
dc.contributor.authorBabu, G, S.
dc.contributor.authorEbenezer, J.
dc.contributor.authorSekhar, V, M.
dc.contributor.authorJevitha, K.P.
dc.contributor.authorSamanta, S.
dc.contributor.authorPais, A.R.
dc.date.accessioned2020-03-30T09:46:25Z
dc.date.available2020-03-30T09:46:25Z
dc.date.issued2009
dc.description.abstractToday an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in Software Development Life Cycle (SDLC). In Next Generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or on a fixed platform - need to be security-aware using Securityaware Software Development Life Cycle (SaSDLC), which is the focus of this paper. We also present a tool called Suraksha that comprises of Security Designers' Workbench and Security Testers' Workbench thathelps a developer to build Security-aware applications. �2009 IEEE.en_US
dc.identifier.citation2009 IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2009, 2009, Vol., , pp.-en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/6931
dc.titleSecurity-aware software development life Cycle (SaSDLC) - Processes and toolsen_US
dc.typeBook chapteren_US

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
6931.pdf
Size:
1.27 MB
Format:
Adobe Portable Document Format