Trustworthy Software Development - practical view of security processes through MVP methodology.
Shiang-Jiun ChenYu-Chun PanYi-Wei MaCheng-Mou ChiangChi-Chin TsaiPublished in: ICACT (2022)
Keyphrases
- software development
- development life cycle
- software development process
- software process
- information security
- security requirements
- software engineering
- process model
- real world
- software projects
- case study
- multiple views
- intrusion detection
- trust management
- statistical databases
- security issues
- software testing
- software development processes
- development processes
- information systems
- security mechanisms
- software design
- software reuse
- security policies
- software development projects
- risk management
- software systems
- access control
- data model