IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Evolution of Security Engineering Artifacts: A State of the Art Survey

Evolution of Security Engineering Artifacts: A State of the Art Survey
View Sample PDF
Author(s): Michael Felderer (University of Innsbruck, Austria), Basel Katt (University of Innsbruck, Austria), Philipp Kalb (University of Innsbruck, Austria), Jan Jürjens (Technical University of Dortmund, Germany), Martín Ochoa (Technical University of Munich, Germany), Federica Paci (University of Trento, Italy), Le Minh Sang Tran (University of Trento, Italy), Thein Than Tun (The Open University, UK), Koen Yskout (iMinds-DistriNet, KU Leuven, Belgium), Riccardo Scandariato (iMinds-DistriNet, KU Leuven, Belgium), Frank Piessens (iMinds-DistriNet, KU Leuven, Belgium), Dries Vanoverberghe (iMinds-DistriNet, KU Leuven, Belgium), Elizabeta Fourneret (SnT Centre, University of Luxembourg, Luxembourg), Matthias Gander (University of Innsbruck, Austria), Bjørnar Solhaug (SINTEF, Norway)and Ruth Breu (University of Innsbruck, Austria)
Copyright: 2015
Pages: 55
Source title: Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8473-7.ch074

Purchase

View Evolution of Security Engineering Artifacts: A State of the Art Survey on the publisher's website for pricing and purchasing information.

Abstract

Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution. Security evolution can only be managed adequately if it is considered for all artifacts throughout the software development lifecycle. This article provides state of the art on the evolution of security engineering artifacts. The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring. For each of these artifacts the authors give an overview of evolution and security aspects and discuss the state of the art on its security evolution in detail. Based on this comprehensive survey, they summarize key issues and discuss directions of future research.

Related Content

Fani Antoniou, Marina Marinelli, Kleopatra Petroutsatou. © 2024. 31 pages.
Konstantinos Kirytopoulos, Vasileios Sarlis, Dimitris Marinakis, Theodoros Kalogeropoulos. © 2024. 26 pages.
Konstantina Ragazou, Ioannis Passas, Alexandros Garefalakis, Constantin Zopounidis. © 2024. 24 pages.
Vannie Naidoo, Rajen Chetty. © 2024. 19 pages.
Alexandros E. Grigoras, Georgios N. Aretoulis, Fani Antoniou, Stylianos Karatzas. © 2024. 30 pages.
Kleopatra Petroutsatou, Theodora Vagdatli, Marina Chronaki, Panagiota Samouilidou. © 2024. 24 pages.
Dimitra Korakaki, Stratos Kartsonakis, Evangelos Grigoroudis, Constantin Zopounidis. © 2024. 34 pages.
Body Bottom