Publication: Extending V-model practices to support SRE to build secure web application
dc.Conferencecode | 111716 | |
dc.Conferencedate | 18 October 2014 through 19 October 2014 | |
dc.Conferencename | 2014 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2014 | |
dc.citedby | 2 | |
dc.contributor.affiliations | Faculty of Science and Technology | |
dc.contributor.affiliations | Universiti Sains Islam Malaysia (USIM) | |
dc.contributor.author | Abdulrazeg A.A. | en_US |
dc.contributor.author | Norwawi N.M. | en_US |
dc.contributor.author | Basir N. | en_US |
dc.date.accessioned | 2024-05-29T01:55:56Z | |
dc.date.available | 2024-05-29T01:55:56Z | |
dc.date.issued | 2014 | |
dc.description.abstract | Technological advancements and rapid growth in the use of the Internet by the society have had a huge impact on information security. It has triggered the need for a major shift in the way web applications are developed. The high level security of these applications is crucial to their success. Therefore, information security has become a core requirement for producing trustworthy software driven by the need to guard critical assets. To develop a web application with adequate security features, it is highly recommended to capture security requirements early in the development lifecycle. In this paper, we propose a way of extending the V-Model requirements engineering phase to aid developers to engineer security requirements for a web application being developed, as well as, handling the security test planning. The aim is to support the proactive definition of security requirements by integrating security requirements engineering (SRE) activities with requirements engineering (RE) activities of the V-model. � 2014 IEEE. | |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 7065838 | |
dc.identifier.doi | 10.1109/ICACSIS.2014.7065838 | |
dc.identifier.epage | 218 | |
dc.identifier.isbn | 9781480000000 | |
dc.identifier.scopus | 2-s2.0-84946686157 | |
dc.identifier.spage | 213 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84946686157&doi=10.1109%2fICACSIS.2014.7065838&partnerID=40&md5=8bb91a5b95ae971d551131c88ff96aed | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/9776 | |
dc.language | English | |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | Proceedings - ICACSIS 2014: 2014 International Conference on Advanced Computer Science and Information Systems | |
dc.source | Scopus | |
dc.subject | Security requirements | en_US |
dc.subject | Security requirements engineering | en_US |
dc.subject | V-Model | en_US |
dc.subject | Web Application | en_US |
dc.subject | Mobile security | en_US |
dc.subject | Requirements engineering | en_US |
dc.subject | Social networking (online) | en_US |
dc.subject | World Wide Web | en_US |
dc.subject | Integrating security | en_US |
dc.subject | Security features | en_US |
dc.subject | Security requirements | en_US |
dc.subject | Security requirements engineering | en_US |
dc.subject | Technological advancement | en_US |
dc.subject | Trustworthy softwares | en_US |
dc.subject | V-model | en_US |
dc.subject | WEB application | en_US |
dc.subject | Security of data | en_US |
dc.title | Extending V-model practices to support SRE to build secure web application | |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |