Security-aware software development life Cycle (SaSDLC) - Processes and tools

dc.contributor.authorTalukder, A.K.
dc.contributor.authorMaurya, V.K.
dc.contributor.authorBabu G, S.
dc.contributor.authorJangam, J.
dc.contributor.authorMuni Sekhar, M.
dc.contributor.authorJevitha, K.P.
dc.contributor.authorSamanta, S.
dc.contributor.authorPais, A.R.
dc.date.accessioned2026-02-06T06:40:54Z
dc.date.issued2009
dc.description.abstractToday an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in Software Development Life Cycle (SDLC). In Next Generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or on a fixed platform - need to be security-aware using Securityaware Software Development Life Cycle (SaSDLC), which is the focus of this paper. We also present a tool called Suraksha that comprises of Security Designers' Workbench and Security Testers' Workbench thathelps a developer to build Security-aware applications. ©2009 IEEE.
dc.identifier.citation2009 IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2009, 2009, Vol., , p. -
dc.identifier.urihttps://doi.org/10.1109/WOCN.2009.5010550
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/33210
dc.subjectSaSDL
dc.subjectSecure software engineering
dc.subjectSecurity designers' Workbench
dc.subjectSecurity testers' Workbench
dc.subjectSecurity-aware software
dc.subjectSecurityaware software development life cycle
dc.titleSecurity-aware software development life Cycle (SaSDLC) - Processes and tools

Files