MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "cce608b1-af96-4b4b-84f5-f5d9aac6047f"}, "_deposit": {"created_by": 45, "id": "6274", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "6274"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/6274", "sets": ["1605779935331", "user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Defining a Software Engineering Process with Cost-effective Security Requirements Implementation", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Today, security problems involving computers and software are frequent, widespread, and serious. The number and variety of attacks by persons and malicious software from outside organizations, particularly via the Internet, are increasing rapidly, and the amount and consequences of insider attacks remains serious. Security is not just a question of security functionality; the properties desired must be shown to hold wherever required throughout the secure system. Because security properties are systems properties, security is an omnipresent issue throughout the software lifecycle. This paper describes the existing software development lifecycle with the integration of security engineering process. After that, we will adopt the Information System Environment in the case of the University of Information Technology (UIT). Moreover, this paper describes an Information Security Software Engineering (ISSE) process for discovering and addressing users’ information protection needs based on the case study of UIT’s information System Environment. Finally, the proposed system performs the quantitative risk analysis on the study of UIT Information System Environment."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Information Security Software Engineering"}, {"interim": "Security Engineering Process"}, {"interim": "Quantitative risk analysis"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-11-19"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Defining a Software Engineering Process with Cost-effective Security Requirements Implementation.pdf", "filesize": [{"value": "1.4 Mb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "© 2017 ICAIT", "licensetype": "license_free", "mimetype": "application/pdf", "size": 1400000.0, "url": {"url": "https://meral.edu.mm/record/6274/files/Defining a Software Engineering Process with Cost-effective Security Requirements Implementation.pdf"}, "version_id": "25497eb2-5f9c-4c88-aa1e-7f10b60d626f"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICAIT-2017", "subitem_c_date": "1-2 November, 2017", "subitem_conference_title": "1st International Conference on Advanced Information Technologies", "subitem_place": "Yangon, Myanmar", "subitem_session": "Software Engineering and Web Mining", "subitem_website": "https://www.uit.edu.mm/icait-2017/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Swe Zin Hlaing"}, {"subitem_authors_fullname": "Koichiro Ochimizu"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-11-02"}, "item_title": "Defining a Software Engineering Process with Cost-effective Security Requirements Implementation", "item_type_id": "21", "owner": "45", "path": ["1605779935331"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000006274", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-11-19"}, "publish_date": "2020-11-19", "publish_status": "0", "recid": "6274", "relation": {}, "relation_version_is_last": true, "title": ["Defining a Software Engineering Process with Cost-effective Security Requirements Implementation"], "weko_shared_id": -1}
Defining a Software Engineering Process with Cost-effective Security Requirements Implementation
http://hdl.handle.net/20.500.12678/0000006274
http://hdl.handle.net/20.500.12678/00000062745dced3c3-0f43-4567-9436-7ea594e8ccd1
cce608b1-af96-4b4b-84f5-f5d9aac6047f
Name / File | License | Actions |
---|---|---|
Defining a Software Engineering Process with Cost-effective Security Requirements Implementation.pdf (1.4 Mb)
|
© 2017 ICAIT
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Defining a Software Engineering Process with Cost-effective Security Requirements Implementation | |||||
Language | en | |||||
Publication date | 2017-11-02 | |||||
Authors | ||||||
Swe Zin Hlaing | ||||||
Koichiro Ochimizu | ||||||
Description | ||||||
Today, security problems involving computers and software are frequent, widespread, and serious. The number and variety of attacks by persons and malicious software from outside organizations, particularly via the Internet, are increasing rapidly, and the amount and consequences of insider attacks remains serious. Security is not just a question of security functionality; the properties desired must be shown to hold wherever required throughout the secure system. Because security properties are systems properties, security is an omnipresent issue throughout the software lifecycle. This paper describes the existing software development lifecycle with the integration of security engineering process. After that, we will adopt the Information System Environment in the case of the University of Information Technology (UIT). Moreover, this paper describes an Information Security Software Engineering (ISSE) process for discovering and addressing users’ information protection needs based on the case study of UIT’s information System Environment. Finally, the proposed system performs the quantitative risk analysis on the study of UIT Information System Environment. | ||||||
Keywords | ||||||
Information Security Software Engineering, Security Engineering Process, Quantitative risk analysis | ||||||
Conference papers | ||||||
ICAIT-2017 | ||||||
1-2 November, 2017 | ||||||
1st International Conference on Advanced Information Technologies | ||||||
Yangon, Myanmar | ||||||
Software Engineering and Web Mining | ||||||
https://www.uit.edu.mm/icait-2017/ |