Case base for secure software development using software security knowledge base

Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe knowledge regarding software security is not integrated, therefore, we have been developing a knowledge base for secure software development. We previously proposed a learning model that associates artifacts created in secure software development with knowledge in the knowledge base as design rationale. However, only a few case studies that addressed a full life cycle for secure software development have been reported. To mitigate this lack in reported case studies, Okubo et al. Created a common task regarding software security. In this study, we developed a case base of secure software development whose artifacts are associated with the knowledge base using this common task as a case.

    Original languageEnglish
    Title of host publicationProceedings - International Computer Software and Applications Conference
    PublisherIEEE Computer Society
    Pages97-103
    Number of pages7
    Volume3
    ISBN (Print)9781467365635
    DOIs
    Publication statusPublished - 2015 Sep 21
    Event39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015 - Taichung, Taiwan, Province of China
    Duration: 2015 Jul 12015 Jul 5

    Other

    Other39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015
    CountryTaiwan, Province of China
    CityTaichung
    Period15/7/115/7/5

    Fingerprint

    Software engineering
    Life cycle
    Internet

    Keywords

    • Case base
    • Knowledge base for secure software development
    • Secure software development process

    ASJC Scopus subject areas

    • Computer Science Applications
    • Software

    Cite this

    Hazeyama, A., Saito, M., Yoshioka, N., Kumagai, A., Kobashi, T., Washizaki, H., ... Okubo, T. (2015). Case base for secure software development using software security knowledge base. In Proceedings - International Computer Software and Applications Conference (Vol. 3, pp. 97-103). [7273334] IEEE Computer Society. https://doi.org/10.1109/COMPSAC.2015.86

    Case base for secure software development using software security knowledge base. / Hazeyama, Atsuo; Saito, Masahito; Yoshioka, Nobukazu; Kumagai, Azusa; Kobashi, Takanori; Washizaki, Hironori; Kaiya, Haruhiko; Okubo, Takao.

    Proceedings - International Computer Software and Applications Conference. Vol. 3 IEEE Computer Society, 2015. p. 97-103 7273334.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hazeyama, A, Saito, M, Yoshioka, N, Kumagai, A, Kobashi, T, Washizaki, H, Kaiya, H & Okubo, T 2015, Case base for secure software development using software security knowledge base. in Proceedings - International Computer Software and Applications Conference. vol. 3, 7273334, IEEE Computer Society, pp. 97-103, 39th IEEE Annual Computer Software and Applications Conference Workshops, COMPSACW 2015, Taichung, Taiwan, Province of China, 15/7/1. https://doi.org/10.1109/COMPSAC.2015.86
    Hazeyama A, Saito M, Yoshioka N, Kumagai A, Kobashi T, Washizaki H et al. Case base for secure software development using software security knowledge base. In Proceedings - International Computer Software and Applications Conference. Vol. 3. IEEE Computer Society. 2015. p. 97-103. 7273334 https://doi.org/10.1109/COMPSAC.2015.86
    Hazeyama, Atsuo ; Saito, Masahito ; Yoshioka, Nobukazu ; Kumagai, Azusa ; Kobashi, Takanori ; Washizaki, Hironori ; Kaiya, Haruhiko ; Okubo, Takao. / Case base for secure software development using software security knowledge base. Proceedings - International Computer Software and Applications Conference. Vol. 3 IEEE Computer Society, 2015. pp. 97-103
    @inproceedings{03553dcd595540569cc117af0dcb45e9,
    title = "Case base for secure software development using software security knowledge base",
    abstract = "The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe knowledge regarding software security is not integrated, therefore, we have been developing a knowledge base for secure software development. We previously proposed a learning model that associates artifacts created in secure software development with knowledge in the knowledge base as design rationale. However, only a few case studies that addressed a full life cycle for secure software development have been reported. To mitigate this lack in reported case studies, Okubo et al. Created a common task regarding software security. In this study, we developed a case base of secure software development whose artifacts are associated with the knowledge base using this common task as a case.",
    keywords = "Case base, Knowledge base for secure software development, Secure software development process",
    author = "Atsuo Hazeyama and Masahito Saito and Nobukazu Yoshioka and Azusa Kumagai and Takanori Kobashi and Hironori Washizaki and Haruhiko Kaiya and Takao Okubo",
    year = "2015",
    month = "9",
    day = "21",
    doi = "10.1109/COMPSAC.2015.86",
    language = "English",
    isbn = "9781467365635",
    volume = "3",
    pages = "97--103",
    booktitle = "Proceedings - International Computer Software and Applications Conference",
    publisher = "IEEE Computer Society",

    }

    TY - GEN

    T1 - Case base for secure software development using software security knowledge base

    AU - Hazeyama, Atsuo

    AU - Saito, Masahito

    AU - Yoshioka, Nobukazu

    AU - Kumagai, Azusa

    AU - Kobashi, Takanori

    AU - Washizaki, Hironori

    AU - Kaiya, Haruhiko

    AU - Okubo, Takao

    PY - 2015/9/21

    Y1 - 2015/9/21

    N2 - The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe knowledge regarding software security is not integrated, therefore, we have been developing a knowledge base for secure software development. We previously proposed a learning model that associates artifacts created in secure software development with knowledge in the knowledge base as design rationale. However, only a few case studies that addressed a full life cycle for secure software development have been reported. To mitigate this lack in reported case studies, Okubo et al. Created a common task regarding software security. In this study, we developed a case base of secure software development whose artifacts are associated with the knowledge base using this common task as a case.

    AB - The importance of software security technologies has been gaining attention due to the increase in services on the Internet. Various technologies regarding software security have been developed. However, we believe knowledge regarding software security is not integrated, therefore, we have been developing a knowledge base for secure software development. We previously proposed a learning model that associates artifacts created in secure software development with knowledge in the knowledge base as design rationale. However, only a few case studies that addressed a full life cycle for secure software development have been reported. To mitigate this lack in reported case studies, Okubo et al. Created a common task regarding software security. In this study, we developed a case base of secure software development whose artifacts are associated with the knowledge base using this common task as a case.

    KW - Case base

    KW - Knowledge base for secure software development

    KW - Secure software development process

    UR - http://www.scopus.com/inward/record.url?scp=84962086863&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84962086863&partnerID=8YFLogxK

    U2 - 10.1109/COMPSAC.2015.86

    DO - 10.1109/COMPSAC.2015.86

    M3 - Conference contribution

    AN - SCOPUS:84962086863

    SN - 9781467365635

    VL - 3

    SP - 97

    EP - 103

    BT - Proceedings - International Computer Software and Applications Conference

    PB - IEEE Computer Society

    ER -