{"title":"Special issue: The future of software engineering for security and privacy","authors":"S. Honiden, B. Nuseibeh","doi":"10.2201/NIIPI.2008.5.2","DOIUrl":null,"url":null,"abstract":"The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"1 1","pages":"5-6"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2201/NIIPI.2008.5.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The scale of misuse of mission-critical assets manipulated by computer-based systems has increased, because of their worldwide accessibility through the Internet and the automation of systems. Security is concerned with the prevention of such misuse. The systematic development of software that considers security risks and threats explicitly is increasingly recognized as critical to improving overall systems security. This special issue provides a forum for discussing research directions in software engineering for developing secure systems more effectively. It comprises seven papers that underwent one or more cycles of anonymous peer review and revision. The first paper on “PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application”, by Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri, presents an automated tool to support users and providers of information systems, to help them understand the threats and the requirements of these systems. The paper focuses on Java mobile code applications. The second paper on “Curriculum Design and Methodologies for Security Requirements Analysis”, by Kenji Taguchi and Yasuyuki Tahara, describes the authors’ Security Requirements Analysis educational course, part of the Top SE project, to teach the students how to find and fix security defects in software, as early as possible in the systems development life cycle. The third paper on “A Survey on Security Patterns”, by Nobukazu Yoshioka, Hironori Washizaki, and Katsuhisa Maruyama, surveys existing approaches to establishing security patterns, which are reusable solutions to security problems, and illustrates a direction for the integration of patterns into the development life cycle. The fourth paper on “Software Security Engineer-
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
特刊:安全与隐私的软件工程的未来
基于计算机的系统操纵的关键任务资产的滥用规模增加了,因为它们可以通过因特网和系统自动化在全世界范围内使用。安全就是要防止这种滥用。明确考虑安全风险和威胁的软件系统开发日益被认为是提高整体系统安全性的关键。为更有效地开发安全系统提供了一个讨论软件工程研究方向的论坛。它由七篇论文组成,这些论文经历了一个或多个匿名同行评审和修订周期。由Haruhiko Kaiya、Kouta Sasaki和Kenji Kaijiri撰写的关于“PORTAM:移动代码应用程序的策略、需求和威胁分析器”的第一篇论文提出了一个自动化工具来支持信息系统的用户和提供者,帮助他们理解这些系统的威胁和需求。本文重点研究了Java手机代码的应用。Kenji Taguchi和Yasuyuki Tahara撰写的关于“安全需求分析的课程设计和方法”的第二篇论文描述了作者的安全需求分析教育课程,该课程是Top SE项目的一部分,旨在教学生如何在系统开发生命周期中尽早发现和修复软件中的安全缺陷。由Nobukazu Yoshioka、Hironori Washizaki和Katsuhisa Maruyama撰写的关于“安全模式综述”的第三篇论文调查了建立安全模式的现有方法,这些模式是安全问题的可重用解决方案,并说明了将模式集成到开发生命周期中的方向。第四篇论文关于“软件安全工程师”
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A convolutional neural network based approach towards real-time hard hat detection Report on the analyses and the applications of a large-scale news video archive: NII TV-RECS Large-scale cross-media analysis and mining from socially curated contents Scalable Approaches for Content -based Video Retrieval 湘南会議 The future of multimedia analysis and mining
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1