We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Comprehensive Approach for Embodiment of Security Activities with Agile Methodologies

by Ajay Kumar Rangra, Manik Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 75 - Number 12
Year of Publication: 2013
Authors: Ajay Kumar Rangra, Manik Gupta
10.5120/13164-0851

Ajay Kumar Rangra, Manik Gupta . A Comprehensive Approach for Embodiment of Security Activities with Agile Methodologies. International Journal of Computer Applications. 75, 12 ( August 2013), 23-28. DOI=10.5120/13164-0851

@article{ 10.5120/13164-0851,
author = { Ajay Kumar Rangra, Manik Gupta },
title = { A Comprehensive Approach for Embodiment of Security Activities with Agile Methodologies },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 75 },
number = { 12 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume75/number12/13164-0851/ },
doi = { 10.5120/13164-0851 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:44:06.210439+05:30
%A Ajay Kumar Rangra
%A Manik Gupta
%T A Comprehensive Approach for Embodiment of Security Activities with Agile Methodologies
%J International Journal of Computer Applications
%@ 0975-8887
%V 75
%N 12
%P 23-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Agility among the software is seeking importance during the development phase, as it promotes adaptive planning, incremental and evolutionary development with many other features that are lightweight in nature. Security is one of the major issues in today's highly agile software development industry. More emphasize is on to produce a secure software, so as to minimize the amount of risk and damage caused by the software. Developing secure software with high agile characteristics is always a hard task to do because of heavy weight nature of security activities. This paper proposes a novel approach by which security activities can be integrated with agile activities by calculating the mean agility value of both activities i. e. agile as well as security keeping in mind the factors such as cost, time, recurrence, benefits affecting the agility of the activity. By using fuzzy value compatibility table (FVCT), extend of compatibility of embodiment of both the activities is done with fuzzy values.

References
  1. Granville G. Miller, "The Characteristics of Agile Software Processes", Proceedings of the 39th Int'l Conf. and Exhibition on Technology of Object-Oriented Languages and Systems (TOOLS'01)"s 1530-2067/01, IEEE 2001.
  2. Lipner, Steve & Howard, Michael," The Trustworthy Computing Security Development Lifecycle" Microsoft Corporation, March 2005.
  3. Howard, M. , Lipner, S. , "The Security Development Lifecycle – SDL: A Process for Developing Demonstrably More Secure Software", Microsoft Press, 2006.
  4. "Manifesto for Agile Software Development," http://www. agilemanifesto. org
  5. Beznosov and Kruchten," Towards agile security assurance'' NSPW '04 Proceedings of the 2004 workshop on New security paradigms, Pages 47-54, 2004.
  6. Siponen, M. , Baskerville, R. , Kuivalainen,T, "Integrating security into agile development methods" in proceedings of the 38th Annual Hawaii International, 2005.
  7. Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi, "Integrating software development security activities with agile methodologies", IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2008.
  8. Ching-Torng Lin, Hero Chiu, Yi-Hong Tseng, "Agility evaluation using fuzzy logic", International Journal of Production Economics, Volume 101, , Pages 353–368, Issue 2, June 2006.
  9. Comprehensive, lightweight application security process. http://www. owasp. org, 2006.
  10. L. A Zadeh,"Fuzzy Sets" Information and Control Volume 8, Issue 3, June 1965, Pages 338–353
  11. L. A Zadeh,"The Concept of a Linguistic Variable and its Application to Approximate Reasoning-I" Information Sciences Volume 8, Issue 3, 1975, Pages 199–249
  12. Steven Goldman, Roger Nagel, and Kenneth Preiss, "Agile Competitors and Virtual Organizations", Chapter 3, Van Nostrand Reinhold, 1995.
Index Terms

Computer Science
Information Sciences

Keywords

Mean Agility Values Security Activities Fuzzy Logics