Extreme Programming Security Practices

Xiaocheng Ge, Richard F. Paige, Fiona Polack, Phil Brooke

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Citations (Scopus)

Abstract

Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.

Original languageEnglish
Title of host publicationAgile Processes in Software Engineering and Extreme Programming
Subtitle of host publication8th International Conference, XP 2007, Como, Italy, June 18-22, 2007, Proceedings
EditorsGiulio Concas, Ernesto Damiani, Marco Scotto, Giancarlo Succi
PublisherSpringer-Verlag Berlin Heidelberg
Pages226-230
Number of pages5
VolumeLNCS 4536
Edition1
ISBN (Electronic)9783540731016
ISBN (Print)9783540731009
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event8th International Conference on Agile Processes in Software Engineering and eXtreme Programming - Como, Italy
Duration: 18 Jun 200722 Jun 2007
Conference number: 8
https://www.springer.com/gp/book/9783540731009

Publication series

NameLecture Notes in Computer Science (Programming and Software Engineering)
PublisherSpringer
Volume4536
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Agile Processes in Software Engineering and eXtreme Programming
Abbreviated titleXP 2007
Country/TerritoryItaly
CityComo
Period18/06/0722/06/07
Internet address

Fingerprint

Dive into the research topics of 'Extreme Programming Security Practices'. Together they form a unique fingerprint.

Cite this