TY - GEN
T1 - Case base for secure software development using software security knowledge base
AU - Hazeyama, Atsuo
AU - Saito, Masahito
AU - Yoshioka, Nobukazu
AU - Kumagai, Azusa
AU - Kobashi, Takanori
AU - Washizaki, Hironori
AU - Kaiya, Haruhiko
AU - Okubo, Takao
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/9/21
Y1 - 2015/9/21
N2 - The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe knowledge regarding software security is not integrated, therefore, we have been developing a knowledge base for secure software development. We previously proposed a learning model that associates artifacts created in secure software development with knowledge in the knowledge base as design rationale. However, only a few case studies that addressed a full life cycle for secure software development have been reported. To mitigate this lack in reported case studies, Okubo et al. Created a common task regarding software security. In this study, we developed a case base of secure software development whose artifacts are associated with the knowledge base using this common task as a case.
AB - The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe knowledge regarding software security is not integrated, therefore, we have been developing a knowledge base for secure software development. We previously proposed a learning model that associates artifacts created in secure software development with knowledge in the knowledge base as design rationale. However, only a few case studies that addressed a full life cycle for secure software development have been reported. To mitigate this lack in reported case studies, Okubo et al. Created a common task regarding software security. In this study, we developed a case base of secure software development whose artifacts are associated with the knowledge base using this common task as a case.
KW - Case base
KW - Knowledge base for secure software development
KW - Secure software development process
UR - http://www.scopus.com/inward/record.url?scp=84962086863&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962086863&partnerID=8YFLogxK
U2 - 10.1109/COMPSAC.2015.86
DO - 10.1109/COMPSAC.2015.86
M3 - Conference contribution
AN - SCOPUS:84962086863
T3 - Proceedings - International Computer Software and Applications Conference
SP - 97
EP - 103
BT - Proceedings - 2015 IEEE 39th Annual Computer Software and Applications Conference Workshops, COMPSACW 2015
A2 - Ahamed, Sheikh Iqbal
A2 - Chang, Carl K.
A2 - Crnkovic, Ivica
A2 - Hsiung, Pao-Ann
A2 - Yang, Jingwei
A2 - Huang, Gang
A2 - Chu, William
PB - IEEE Computer Society
T2 - 39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015
Y2 - 1 July 2015 through 5 July 2015
ER -