Extreme Programming Security Practices

Research output: Contribution to conferencePaperpeer-review

Abstract

Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.
Original languageEnglish
Pages226-230
Number of pages4
DOIs
Publication statusPublished - 2007

Cite this