Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle
Authors: Mir Shahriar Emami
Abstract:
Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.
Keywords: Systems and circuits security, software security, software process engineering, SDLC, SSDLC.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1126407
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1736References:
[1] M. S. Emami, N. B. Ithnin, O. Ibrahim, Software Process Engineering: Strength, Weaknesses, Opportunities and Threads, 6th International Conference on Networked Computing, IEEE Seoul Section, pp.148-152, 2010.
[2] W. W. Royce, "Managing The Development of Large Software Systems", Proceedings, IEEE Wescon, 1970.
[3] H. V. Vliet, Software Engineering Principles and Practices, Book, John Wiley & Sons, ISBN 978-0-470-03146-9, 2008.
[4] V. R. Basili and A. J. Turner, " Interactive Enhancement: A Practical Technique for Software Development ", Journal, IEEE Transaction on Software Engineering, IEEE Computer Society, 1975.
[5] H.D. Mills, M. Dyer, R.C. Linger, "Cleanroom Software Engineering", Journal, IEEE Software, IEEE Computer Society, 1987.
[6] R. S. Oshana and R. C. Linger, "Capability Maturity Model Software Development Using Cleanroom Software Engineering Principles - Results of an Industry Project", Proceedings, 32nd Hawaii International Conference on System Sciences, IEEE Computer Society, 1999.
[7] R. C. Linger, "Clean room Software Engineering for Zero- Defect Software", Proceedings, 15th International Conference on Software Engineering, IEEE Computer Society, 1993.
[8] B. W. Boehm, "A Spiral Model of Software Development and Enhancement", Journal, Computer, IEEE Computer Society, 1998.
[9] D. Wells, "Extreme Programming: A gentle introduction", www.extremeprogramming.org
[10] "Design Patterns and Refactoring", Lecture, University of Pennsylvania, http://www.cis.upenn.edu, USA, 2003.
[11] "Rational Unified Process Best Practices for Software Development Teams", Rational Software Corporation, www.ibm.com/developerworks/rational
[12] S. R. Schach, Object-Oriented Classical Software Engineering, Book, Mc Graw Hill, ISBN: 0-07-319126-4, 2007.
[13] "The Top Cyber Security Risks", SANS, www.sans.org, Sep 2009.
[14] P. A. Strassmann, “Cyber Security for the Department of Defence”, June 2009.