Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices

MMA Khan, EN Ehabe… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The use of software to support the information infrastructure that governments, critical
infrastructure providers and businesses worldwide rely on for their daily operations and …

Reducing software assurance risks for security-critical and safety-critical systems

CW Axelrod - IEEE Long Island Systems, Applications and …, 2014 - ieeexplore.ieee.org
According to the Office of the Assistant Secretary of Defense for Research and Engineering
(ASD (R&E)), the US Department of Defense (DoD) recognizes that there is a “persistent …

Interventions for software security: creating a lightweight program of assurance techniques for developers

C Weir, I Becker, J Noble, L Blair… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Though some software development teams are highly effective at delivering security, others
either do not care or do not have access to security experts to teach them how …

Protecting against what? The achilles heel of information assurance

J Voas - IEEE Software, 1999 - ieeexplore.ieee.org
Many have long regarded software assessment as a way to determine the correctness of
software. Formal methods attempt to build in correct behavior. Techniques such as formal …

Software security specifications and design: How software engineers and practitioners are mixing things up

M Zarour, M Alenezi, K Alsarayrah - Proceedings of the 24th International …, 2020 - dl.acm.org
Huge numbers of worldwide-deployed software suffer from poor quality and possess
vulnerabilities with serious impact. Meanwhile, people are using such software to save and …

Security considerations for the development of secure software systems

M Ruggieri, TT Hsu, ML Ali - 2019 IEEE 10th Annual Ubiquitous …, 2019 - ieeexplore.ieee.org
Security is an important factor when it comes to the development of software systems. In
each of the developing steps of the software system we have to think of what security …

Bridging the gap between software development and information security

KR Van Wyk, G McGraw - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Traditionally, software development efforts in large corporations have been about as far
removed from information security as they were from human resources or any other …

Security assurance model of software development for global software development vendors

RA Khan, SU Khan, M Alzahrani, M Ilyas - Ieee Access, 2022 - ieeexplore.ieee.org
The number of security attacks and the impact has grown considerably in the recent several
years. As a result, new emerging software development models are required that assist in …

[PDF][PDF] Software assurance curriculum project volume I: Master of software assurance reference curriculum

NR Mead, JH Allen, M Ardis, TB Hilburn, AJ Kornecki… - 2010 - kilthub.cmu.edu
Modern society is deeply and irreversibly dependent on software systems of remarkable
scope and complexity in areas including defense, government, energy, communication …

A light-weight tool for the self-assessment of security compliance in software development–an industry case

F Moyón, C Bayr, D Mendez, S Dännart… - … conference on current …, 2020 - Springer
Companies are often challenged to modify and improve their software development
processes in order to make them compliant with security standards. The complexity of these …