Towards the integration of security practices in the software implementation process of ISO/IEC 29110: A mapping

4Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure software practices are gradually gaining relevance among software practitioners and researchers. This is happening because today more than ever software is becoming part of our lives and cybercrimes are constantly appearing. Despite its importance, its current practice in the software industry is still scarce. Indeed, software security problems are divided 50/50 between bugs and flaws. In particular, it remains a significant challenge for software practitioners in small software companies. Therefore, there is a need to support small companies in changing their existing ways of work to integrate these new and unfamiliar practices. The aim of this study is twofold. First, to help building an awareness of the software security process among practitioners in small companies. Second, to help the integration of these practices with software implementation process of ISO/IEC 29110 which results in an extension of the latter with additional activities identified from the industry best practices. Nevertheless, the extension proposal is to be performed selectively, based on the value of the software as an asset to the stakeholders and on stakeholders needs.

Cite

CITATION STYLE

APA

Sánchez-Gordón, M. L., Colomo-Palacios, R., Sánchez, A., de Amescua Seco, A., & Larrucea, X. (2017). Towards the integration of security practices in the software implementation process of ISO/IEC 29110: A mapping. In Communications in Computer and Information Science (Vol. 748, pp. 3–14). Springer Verlag. https://doi.org/10.1007/978-3-319-64218-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free