Abstract
Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.
Original language | English |
---|---|
Title of host publication | Agile Processes in Software Engineering and Extreme Programming, Proceedings |
Editors | G Concas, E Damiani, M Scotto, G Succi |
Place of Publication | BERLIN |
Publisher | Springer |
Pages | 226-230 |
Number of pages | 5 |
ISBN (Print) | 978-3-540-73100-9 |
Publication status | Published - 2007 |
Event | 8th International Conference on Agile Processes in Software Engineering and Extreme Programming - Como Duration: 18 Jun 2007 → 22 Jun 2007 |
Conference
Conference | 8th International Conference on Agile Processes in Software Engineering and Extreme Programming |
---|---|
City | Como |
Period | 18/06/07 → 22/06/07 |