Systematic Mapping Study on Security Approaches in Secure Software Engineering

<p>In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software syste...

Full description

Saved in:
Bibliographic Details
Main Author: Rafiq Ahmad Khan (5066180) (author)
Other Authors: Siffat Ullah Khan (12024576) (author), Habib Ullah Khan (12024579) (author), Muhammad Ilyas (150134) (author)
Published: 2021
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513560452792320
author Rafiq Ahmad Khan (5066180)
author2 Siffat Ullah Khan (12024576)
Habib Ullah Khan (12024579)
Muhammad Ilyas (150134)
author2_role author
author
author
author_facet Rafiq Ahmad Khan (5066180)
Siffat Ullah Khan (12024576)
Habib Ullah Khan (12024579)
Muhammad Ilyas (150134)
author_role author
dc.creator.none.fl_str_mv Rafiq Ahmad Khan (5066180)
Siffat Ullah Khan (12024576)
Habib Ullah Khan (12024579)
Muhammad Ilyas (150134)
dc.date.none.fl_str_mv 2021-01-18T00:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2021.3052311
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Systematic_Mapping_Study_on_Security_Approaches_in_Secure_Software_Engineering/24049347
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Software engineering
Software
Security
Buildings
Software systems
Software measurement
Systematics
Software engineering
Software security
Secure software development
Secure software engineering
Software development life cycle
Security approaches
Systematic mapping study
dc.title.none.fl_str_mv Systematic Mapping Study on Security Approaches in Secure Software Engineering
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3052311" target="_blank">https://dx.doi.org/10.1109/access.2021.3052311</a></p>
eu_rights_str_mv openAccess
id Manara2_71646872cac93cc83b37e2e8feca83be
identifier_str_mv 10.1109/access.2021.3052311
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24049347
publishDate 2021
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Systematic Mapping Study on Security Approaches in Secure Software EngineeringRafiq Ahmad Khan (5066180)Siffat Ullah Khan (12024576)Habib Ullah Khan (12024579)Muhammad Ilyas (150134)Information and computing sciencesCybersecurity and privacySoftware engineeringSoftwareSecurityBuildingsSoftware systemsSoftware measurementSystematicsSoftware engineeringSoftware securitySecure software developmentSecure software engineeringSoftware development life cycleSecurity approachesSystematic mapping study<p>In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs to be secured. It is imperative to make sure that these software systems not only satisfy the users' needs or functional requirements, but it is equally important to make sure the security of these software systems. However, recent research shows that many software development methods do not explicitly include software security measures during software development as they move from demand engineering to their final losses. Integrating software security at each stage of the software development life cycle (SDLC) has become an urgent need. Tackling software security, various methods, techniques, and models have been suggested and developed, however, only a few of them provide strong evidence for building secure software applications. The main purpose of this research is to study security measures in the context of the development of secure software (SSD) during the study of systematic mapping (SMS). Based on the inclusion and exclusion criteria, 116 studies were selected. After the data extraction from the selected 116 papers, these were classified based on the quality assessment, software security method, SDLC phases, publication venue, and SWOT analysis. The results indicate that this domain is still immature and sufficient research work needs to be carried out particularly on empirically evaluated solutions.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3052311" target="_blank">https://dx.doi.org/10.1109/access.2021.3052311</a></p>2021-01-18T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2021.3052311https://figshare.com/articles/journal_contribution/Systematic_Mapping_Study_on_Security_Approaches_in_Secure_Software_Engineering/24049347CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240493472021-01-18T00:00:00Z
spellingShingle Systematic Mapping Study on Security Approaches in Secure Software Engineering
Rafiq Ahmad Khan (5066180)
Information and computing sciences
Cybersecurity and privacy
Software engineering
Software
Security
Buildings
Software systems
Software measurement
Systematics
Software engineering
Software security
Secure software development
Secure software engineering
Software development life cycle
Security approaches
Systematic mapping study
status_str publishedVersion
title Systematic Mapping Study on Security Approaches in Secure Software Engineering
title_full Systematic Mapping Study on Security Approaches in Secure Software Engineering
title_fullStr Systematic Mapping Study on Security Approaches in Secure Software Engineering
title_full_unstemmed Systematic Mapping Study on Security Approaches in Secure Software Engineering
title_short Systematic Mapping Study on Security Approaches in Secure Software Engineering
title_sort Systematic Mapping Study on Security Approaches in Secure Software Engineering
topic Information and computing sciences
Cybersecurity and privacy
Software engineering
Software
Security
Buildings
Software systems
Software measurement
Systematics
Software engineering
Software security
Secure software development
Secure software engineering
Software development life cycle
Security approaches
Systematic mapping study