Projects per year
This method is complemented by an implementation of a change detection analysis for model-based security requirements. This system facilitates the agile security evaluation process to a high degree. However, the application of the proposed evaluation method is limited by several constraints. The authors discuss these constraints and show how traditional certification schemes could be extended to better support modern industrial software development processes.
|Number of pages||29|
|Journal||International Journal of Secure Software Engineering|
|Publication status||Published - 2015|
Steger, C., Zilli, M. & Raschke, W.
1/01/12 → 28/02/15
Project: Research project