A Survey on Design Methods for Secure Software Development

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 7

Abstract

Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many security-specific concepts that should be determined as requirements during software development life cycle in order to deliver a strong and secure software. This paper first, survey a number of existing processes, life cycle and methodologies needed for developing secure software based on the related published works. It starts by presenting the most relevant Secure Software Development Lifecycles, a comparison between the main security features for each process is proposed. The results of the comparison will give the software developer with a guideline which will help on selecting the best secure process. Second, the paper list a set of the most widely used specification languages with the advantages and disadvantages for each.

Authors and Affiliations

Ola M. Surakhi, Amjad Hudaib, Mohammad AlShraideh

Keywords

Related Articles

Proof of Logic: Correctness of Next Generation Security Mechanisms

In this paper, three security mechanisms developed to form the UDT (UDP-Data Transfer protocol) Security Architecture are evaluated and analyzed. An approach is utilized to ascertain the applicability and secrecy propert...

E-Security Issues

With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organisations to di...

Expert system for Diagnosing Kidney diseases

The system mainly contains two modules one is Information System and the other is Expert Advisory system. The Information System contains the static information about different diseases in the field of Nephrology. This i...

A NOVEL APPROACH OF OPTIMIZING PERFORMANCE USING K-MEANS CLUSTERING IN CLOUD COMPUTING

Cloud computing is distributed computing, storing, sharing and accessing data over the Internet. It provides a pool of shared resources to the users available on the basis of pay as you go service that means users pay on...

POWER SAVING LOAD BALANCING STRATEGY USING DVFS IN CLOUD ENVIRONMENT

Cloud Computing is a technology that provides a platform for the sharing of resources such as software, infrastructure, application and other information. Cloud Computing is being used widely all over the world by many I...

Download PDF file
  • EP ID EP650961
  • DOI 10.24297/ijct.v16i7.6467
  • Views 96
  • Downloads 0

How To Cite

Ola M. Surakhi, Amjad Hudaib, Mohammad AlShraideh (2017). A Survey on Design Methods for Secure Software Development. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 16(7), 7047-7064. https://europub.co.uk/articles/-A-650961