A Survey on Design Methods for Secure Software Development

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2017, Vol 16, Issue 7

Abstract

Software provide services that may come with some vulnerabilities or risks. Attackers perform actions that break security of system through threats and cause a failure. To avoid security vulnerability, there are many security-specific concepts that should be determined as requirements during software development life cycle in order to deliver a strong and secure software. This paper first, survey a number of existing processes, life cycle and methodologies needed for developing secure software based on the related published works. It starts by presenting the most relevant Secure Software Development Lifecycles, a comparison between the main security features for each process is proposed. The results of the comparison will give the software developer with a guideline which will help on selecting the best secure process. Second, the paper list a set of the most widely used specification languages with the advantages and disadvantages for each.

Authors and Affiliations

Ola M. Surakhi, Amjad Hudaib, Mohammad AlShraideh

Keywords

Related Articles

Evaluation of a New Mobility Assistive Product for the Visually Impaired

In this study we present the results of evaluating the sonification protocol of a new assistive product aiming to help the visually impaired move more safely with the help of sounds organized in different cognitive profi...

Pairwise Fuzzy Ordered Weighted Average Algorithm-Gaussian Mixture Model for Feature Reduction

Feature Reduction is a kind of dimensionality reduction of feature space. There are a number of approaches are used to identify the significant features but they are not using the weighing approach. The weighing approach...

University Course Timetabling using Multi-population Genetic Algorithm Guided with Local Search and Fuzzy Logic

Problem of courses timetabling is a time consuming and demanding issues in any education environment that they are involved in every semester. The main aim of timetabling problem is the allocation of a number of courses...

Enhanced Feature-Based Automatic Text Summarization SystemUsingSupervised Technique

In this work, we propose an efficient text summarization methodby ranking sentences according to their scores that use a combination of existing and improved sentence features.  Many works in the literature proposed imp...

A FRAME WORK FOR WEB INFORMATION EXTRACTION AND ANALYSIS

Day by day the volume of information availability in the web is growing significantly. There are several data structures for information available in the web such as structured, semi-structured and unstructured. Majority...

Download PDF file
  • EP ID EP650961
  • DOI 10.24297/ijct.v16i7.6467
  • Views 101
  • Downloads 0

How To Cite

Ola M. Surakhi, Amjad Hudaib, Mohammad AlShraideh (2017). A Survey on Design Methods for Secure Software Development. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 16(7), 7047-7064. https://europub.co.uk/articles/-A-650961