Quantifying Security in Secure Software Development Phases.
Muhammad Umair Ahmed KhanMohammad ZulkerninePublished in: COMPSAC (2008)
Keyphrases
- software development
- security requirements
- security issues
- security level
- security measures
- security mechanisms
- security management
- key management
- data encryption
- security analysis
- early phase
- security protocols
- security properties
- stream cipher
- authentication mechanism
- software architecture
- security patterns
- development lifecycle
- security services
- security model
- information security
- security policies
- cryptographic protocols
- access control
- security architecture
- data security
- public key encryption
- software engineering
- integrity verification
- user authentication
- electronic voting
- key exchange
- digital rights management
- software development projects
- identity management
- key agreement
- encryption scheme
- private key
- sensitive data
- key exchange protocol
- authentication protocol
- diffie hellman
- software systems
- intrusion detection
- secure multiparty computation
- high security
- digital signature scheme
- authentication scheme
- public key cryptosystem
- key distribution
- public key cryptography
- requirements engineering
- key agreement protocol
- resource constrained
- electronic payment
- development process
- previously mentioned
- software developers
- trusted computing
- smart card
- elliptic curve
- ad hoc networks
- secret key
- software projects
- effort estimation
- key establishment
- factor authentication
- network security