Reference Hub11
Evolution of Security Engineering Artifacts: A State of the Art Survey

Evolution of Security Engineering Artifacts: A State of the Art Survey

Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu
Copyright: © 2014 |Volume: 5 |Issue: 4 |Pages: 51
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466656871|DOI: 10.4018/ijsse.2014100103
Cite Article Cite Article

MLA

Felderer, Michael, et al. "Evolution of Security Engineering Artifacts: A State of the Art Survey." IJSSE vol.5, no.4 2014: pp.48-98. http://doi.org/10.4018/ijsse.2014100103

APA

Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., Tran, L. M., Tun, T. T., Yskout, K., Scandariato, R., Piessens, F., Vanoverberghe, D., Fourneret, E., Gander, M., Solhaug, B., & Breu, R. (2014). Evolution of Security Engineering Artifacts: A State of the Art Survey. International Journal of Secure Software Engineering (IJSSE), 5(4), 48-98. http://doi.org/10.4018/ijsse.2014100103

Chicago

Felderer, Michael, et al. "Evolution of Security Engineering Artifacts: A State of the Art Survey," International Journal of Secure Software Engineering (IJSSE) 5, no.4: 48-98. http://doi.org/10.4018/ijsse.2014100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution. Security evolution can only be managed adequately if it is considered for all artifacts throughout the software development lifecycle. This article provides state of the art on the evolution of security engineering artifacts. The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring. For each of these artifacts the authors give an overview of evolution and security aspects and discuss the state of the art on its security evolution in detail. Based on this comprehensive survey, they summarize key issues and discuss directions of future research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.