Extreme programming security practices

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.

Original languageEnglish
Title of host publicationAgile Processes in Software Engineering and Extreme Programming, Proceedings
EditorsG Concas, E Damiani, M Scotto, G Succi
Place of PublicationBERLIN
PublisherSpringer
Pages226-230
Number of pages5
ISBN (Print)978-3-540-73100-9
Publication statusPublished - 2007
Event8th International Conference on Agile Processes in Software Engineering and Extreme Programming - Como
Duration: 18 Jun 200722 Jun 2007

Conference

Conference8th International Conference on Agile Processes in Software Engineering and Extreme Programming
CityComo
Period18/06/0722/06/07

Cite this