Systematic Mapping Study on Security Approaches in Secure Software Engineering
<p>In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software syste...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , |
| Published: |
2021
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513560452792320 |
|---|---|
| author | Rafiq Ahmad Khan (5066180) |
| author2 | Siffat Ullah Khan (12024576) Habib Ullah Khan (12024579) Muhammad Ilyas (150134) |
| author2_role | author author author |
| author_facet | Rafiq Ahmad Khan (5066180) Siffat Ullah Khan (12024576) Habib Ullah Khan (12024579) Muhammad Ilyas (150134) |
| author_role | author |
| dc.creator.none.fl_str_mv | Rafiq Ahmad Khan (5066180) Siffat Ullah Khan (12024576) Habib Ullah Khan (12024579) Muhammad Ilyas (150134) |
| dc.date.none.fl_str_mv | 2021-01-18T00:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1109/access.2021.3052311 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Systematic_Mapping_Study_on_Security_Approaches_in_Secure_Software_Engineering/24049347 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Software engineering Software Security Buildings Software systems Software measurement Systematics Software engineering Software security Secure software development Secure software engineering Software development life cycle Security approaches Systematic mapping study |
| dc.title.none.fl_str_mv | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p>In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3052311" target="_blank">https://dx.doi.org/10.1109/access.2021.3052311</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_71646872cac93cc83b37e2e8feca83be |
| identifier_str_mv | 10.1109/access.2021.3052311 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/24049347 |
| publishDate | 2021 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Systematic Mapping Study on Security Approaches in Secure Software EngineeringRafiq Ahmad Khan (5066180)Siffat Ullah Khan (12024576)Habib Ullah Khan (12024579)Muhammad Ilyas (150134)Information and computing sciencesCybersecurity and privacySoftware engineeringSoftwareSecurityBuildingsSoftware systemsSoftware measurementSystematicsSoftware engineeringSoftware securitySecure software developmentSecure software engineeringSoftware development life cycleSecurity approachesSystematic mapping study<p>In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3052311" target="_blank">https://dx.doi.org/10.1109/access.2021.3052311</a></p>2021-01-18T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2021.3052311https://figshare.com/articles/journal_contribution/Systematic_Mapping_Study_on_Security_Approaches_in_Secure_Software_Engineering/24049347CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240493472021-01-18T00:00:00Z |
| spellingShingle | Systematic Mapping Study on Security Approaches in Secure Software Engineering Rafiq Ahmad Khan (5066180) Information and computing sciences Cybersecurity and privacy Software engineering Software Security Buildings Software systems Software measurement Systematics Software engineering Software security Secure software development Secure software engineering Software development life cycle Security approaches Systematic mapping study |
| status_str | publishedVersion |
| title | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| title_full | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| title_fullStr | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| title_full_unstemmed | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| title_short | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| title_sort | Systematic Mapping Study on Security Approaches in Secure Software Engineering |
| topic | Information and computing sciences Cybersecurity and privacy Software engineering Software Security Buildings Software systems Software measurement Systematics Software engineering Software security Secure software development Secure software engineering Software development life cycle Security approaches Systematic mapping study |