By the same authors

Extreme Programming Security Practices

Research output: Contribution to conferencePaper

Author(s)

Department/unit(s)

Publication details

DatePublished - 2007
Number of pages4
Original languageEnglish

Abstract

Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations