Extreme Programming Security Practices

Research output: Contribution to conferencePaperpeer-review


Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.
Original languageEnglish
Number of pages4
Publication statusPublished - 2007

Cite this