Busting a myth: Review of agile security engineering methods

dc.contributor.authorRindell K.
dc.contributor.authorHyrynsalmi S.
dc.contributor.authorLeppänen V.
dc.contributor.organizationfi=ohjelmistotekniikka|en=Software Engineering|
dc.contributor.organizationfi=tietojenkäsittelytiede|en=Computer Science|
dc.contributor.organization-code1.2.246.10.2458963.20.71310837563
dc.contributor.organization-code2606803
dc.converis.publication-id27591674
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/27591674
dc.date.accessioned2025-08-27T20:41:56Z
dc.date.available2025-08-27T20:41:56Z
dc.description.abstract<p>Engineering methods are essential in software development, and form a crucial element in the design and implementation of software security. Security engineering processes and activities have a long and well-standardized history of integration with software development methods. The inception of iterative and incremental software development methods raised suspicions of an inherent incompatibility between the traditional non-agile security processes and the new agile methods. This suspicion still affects the attitude towards agile security. To examine and explore this myth, this study presents a literature review of a selected set of agile secure software development methods. A systematic literature method was used to find the definitive set of secure agile software development methods, of which a core set of 11 papers was selected for analysis, and the security activities documented in the methods were extracted. The results show a wide and well-documented adaptation of security activities in agile software development, with the observed activities covering the whole security development life cycle. Based on the analysis, the inherent insecurity of the agile software development methods can be declared to be a mere myth.<br /></p>
dc.format.pagerangeNo. 74
dc.identifier.isbn978-1-4503-5257-4
dc.identifier.olddbid200059
dc.identifier.oldhandle10024/183086
dc.identifier.urihttps://www.utupub.fi/handle/11111/45554
dc.identifier.urnURN:NBN:fi-fe2021042717530
dc.language.isoen
dc.okm.affiliatedauthorRindell, Kalle
dc.okm.affiliatedauthorLeppänen, Ville
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationnot an international co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA4 Conference Article
dc.publisher.countryUnited Statesen_GB
dc.publisher.countryYhdysvallat (USA)fi_FI
dc.publisher.country-codeUS
dc.relation.conferenceInternational Conference on Availability, Reliability and Security
dc.relation.doi10.1145/3098954.3103170
dc.relation.ispartofseriesACM International Conference Proceeding Series
dc.source.identifierhttps://www.utupub.fi/handle/10024/183086
dc.titleBusting a myth: Review of agile security engineering methods
dc.title.bookARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
dc.year.issued2017

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
ASSD_2016__A_Review_new.pdf
Size:
419.8 KB
Format:
Adobe Portable Document Format
Description:
Final draft