Mostrar el registro sencillo del ítem
Systematic mapping of the literature on Secure Software Development
dc.contributor.author | Nina Hanco, Hernán | |
dc.contributor.author | Pow Sang, Jose Antonio | |
dc.contributor.author | Villavicencio, Monica | |
dc.contributor.other | Nina Hanco, Hernán | |
dc.date.accessioned | 2021-03-15T20:14:01Z | |
dc.date.available | 2021-03-15T20:14:01Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Nina, H., Pow-Sang, J.A. & Villavicencio, M. (20021). Systematic mapping of the literature on Secure Software Development. IEEE Access, 9, 36852 - 36867. https://doi.org/10.110910.1109/ACCESS.2021.3062388 | es_PE |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12724/12711 | |
dc.description.abstract | The accelerated growth in exploiting vulnerabilities due to errors or failures in the software development process is a latent concern in the Software Industry. In this sense, this study aims to provide an overview of the Secure Software Development trends to help identify topics that have been extensively studied and those that still need to be. Therefore, in this paper, a systematic mapping review with PICo search strategies was conducted. A total of 867 papers were identified, of which only 528 papers were selected for this review. The main findings correspond to the Software Requirements Security, where the Elicitation and Misuse Cases reported more frequently. In Software Design Security, recurring themes are security in component-based software development, threat model, and security patterns. In the Software Construction Security, the most frequent topics are static code analysis and vulnerability detection. Finally, in Software Testing Security, the most frequent topics are vulnerability scanning and penetration testing. In conclusion, there is a diversity of methodologies, models, and tools with specific objectives in each secure software development stage. | en_EN |
dc.format | application/html | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.relation.ispartof | urn:issn:2169-3536 | |
dc.rights | info:eu-repo/semantics/openAccess | * |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | * |
dc.source | Repositorio Institucional Ulima | |
dc.source | Universidad de Lima | |
dc.subject | Software development | en_EN |
dc.subject | Computer security | en_EN |
dc.subject | Desarrollo de software | es_PE |
dc.subject | Seguridad informática | es_PE |
dc.subject.classification | Pendiente | es_PE |
dc.title | Systematic mapping of the literature on Secure Software Development | en_EN |
dc.type | info:eu-repo/semantics/article | |
dc.type.other | Artículo en Scopus y Web of Science | |
ulima.areas.lineasdeinvestigacion | Productividad y empleo / Innovación: tecnologías y productos | es_PE |
dc.identifier.journal | IEEE Access | |
dc.publisher.country | US | |
dc.subject.ocde | https://purl.org/pe-repo/ocde/ford#2.02.04 | |
dc.identifier.doi | https://doi.org/10.1109/ACCESS.2021.3062388 | |
ulima.cat | OI | |
ulima.autor.afiliacion | Carrera Profesional de Ingeniería de Sistemas, Universidad de Lima | |
ulima.autor.carrera | Ingeniería de Sistemas | |
dc.identifier.isni | 0000000121541816 | |
dc.identifier.scopusid | 2-s2.0-85101857461 | |
dc.identifier.wosid | WOS:000628903500001 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |