Abstract
Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.
| Original language | English |
|---|---|
| Title of host publication | Agile Processes in Software Engineering and Extreme Programming |
| Subtitle of host publication | 8th International Conference, XP 2007, Como, Italy, June 18-22, 2007, Proceedings |
| Editors | Giulio Concas, Ernesto Damiani, Marco Scotto, Giancarlo Succi |
| Publisher | Springer-Verlag Berlin Heidelberg |
| Pages | 226-230 |
| Number of pages | 5 |
| Volume | LNCS 4536 |
| Edition | 1 |
| ISBN (Electronic) | 9783540731016 |
| ISBN (Print) | 9783540731009 |
| DOIs | |
| Publication status | Published - 2007 |
| Externally published | Yes |
| Event | 8th International Conference on Agile Processes in Software Engineering and eXtreme Programming - Como, Italy Duration: 18 Jun 2007 → 22 Jun 2007 Conference number: 8 https://www.springer.com/gp/book/9783540731009 |
Publication series
| Name | Lecture Notes in Computer Science (Programming and Software Engineering) |
|---|---|
| Publisher | Springer |
| Volume | 4536 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 8th International Conference on Agile Processes in Software Engineering and eXtreme Programming |
|---|---|
| Abbreviated title | XP 2007 |
| Country/Territory | Italy |
| City | Como |
| Period | 18/06/07 → 22/06/07 |
| Internet address |