Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/6931
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTalukder, A.K.-
dc.contributor.authorMaurya, V.K.-
dc.contributor.authorBabu, G, S.-
dc.contributor.authorEbenezer, J.-
dc.contributor.authorSekhar, V, M.-
dc.contributor.authorJevitha, K.P.-
dc.contributor.authorSamanta, S.-
dc.contributor.authorPais, A.R.-
dc.date.accessioned2020-03-30T09:46:25Z-
dc.date.available2020-03-30T09:46:25Z-
dc.date.issued2009-
dc.identifier.citation2009 IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2009, 2009, Vol., , pp.-en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/6931-
dc.description.abstractToday an application is secured using invitro perimeter security. This is the reason for security being considered as nonfunctional requirement in Software Development Life Cycle (SDLC). In Next Generation Internet (NGI), where all applications will be networked, security needs to be in-vivo; security must be functions within the application. Applications running on any device, be it on a mobile or on a fixed platform - need to be security-aware using Securityaware Software Development Life Cycle (SaSDLC), which is the focus of this paper. We also present a tool called Suraksha that comprises of Security Designers' Workbench and Security Testers' Workbench thathelps a developer to build Security-aware applications. �2009 IEEE.en_US
dc.titleSecurity-aware software development life Cycle (SaSDLC) - Processes and toolsen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
6931.pdf1.3 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.