Security and privacy behavior definition for behavior driven development

Takao Okubo, Yoshio Kakizaki, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka

    Research output: Contribution to journalArticle

    1 Citation (Scopus)

    Abstract

    There is an issue when security measures are implemented and tested while using agile software development techniques such as Behavior Driven Development (BDD). We need to define the necessary levels of security and the privacy behaviors and acceptance criteria for the BDD. A method for defining the acceptance criteria (BehaveSafe) by creating a threat and countermeasure graph called theT&C graph is proposed in this paper. We have estimated the efficiency of our method with a web based system.

    Original languageEnglish
    Pages (from-to)306-309
    Number of pages4
    JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume8892
    Publication statusPublished - 2014

    Fingerprint

    Privacy
    Software engineering
    Web-based System
    Countermeasures
    Graph in graph theory
    Software Development
    Necessary

    ASJC Scopus subject areas

    • Computer Science(all)
    • Theoretical Computer Science

    Cite this

    Security and privacy behavior definition for behavior driven development. / Okubo, Takao; Kakizaki, Yoshio; Kobashi, Takanori; Washizaki, Hironori; Ogata, Shinpei; Kaiya, Haruhiko; Yoshioka, Nobukazu.

    In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8892, 2014, p. 306-309.

    Research output: Contribution to journalArticle

    @article{dbe26f7bc5054bd4ad47b0506a159644,
    title = "Security and privacy behavior definition for behavior driven development",
    abstract = "There is an issue when security measures are implemented and tested while using agile software development techniques such as Behavior Driven Development (BDD). We need to define the necessary levels of security and the privacy behaviors and acceptance criteria for the BDD. A method for defining the acceptance criteria (BehaveSafe) by creating a threat and countermeasure graph called theT&C graph is proposed in this paper. We have estimated the efficiency of our method with a web based system.",
    author = "Takao Okubo and Yoshio Kakizaki and Takanori Kobashi and Hironori Washizaki and Shinpei Ogata and Haruhiko Kaiya and Nobukazu Yoshioka",
    year = "2014",
    language = "English",
    volume = "8892",
    pages = "306--309",
    journal = "Lecture Notes in Computer Science",
    issn = "0302-9743",
    publisher = "Springer Verlag",

    }

    TY - JOUR

    T1 - Security and privacy behavior definition for behavior driven development

    AU - Okubo, Takao

    AU - Kakizaki, Yoshio

    AU - Kobashi, Takanori

    AU - Washizaki, Hironori

    AU - Ogata, Shinpei

    AU - Kaiya, Haruhiko

    AU - Yoshioka, Nobukazu

    PY - 2014

    Y1 - 2014

    N2 - There is an issue when security measures are implemented and tested while using agile software development techniques such as Behavior Driven Development (BDD). We need to define the necessary levels of security and the privacy behaviors and acceptance criteria for the BDD. A method for defining the acceptance criteria (BehaveSafe) by creating a threat and countermeasure graph called theT&C graph is proposed in this paper. We have estimated the efficiency of our method with a web based system.

    AB - There is an issue when security measures are implemented and tested while using agile software development techniques such as Behavior Driven Development (BDD). We need to define the necessary levels of security and the privacy behaviors and acceptance criteria for the BDD. A method for defining the acceptance criteria (BehaveSafe) by creating a threat and countermeasure graph called theT&C graph is proposed in this paper. We have estimated the efficiency of our method with a web based system.

    UR - http://www.scopus.com/inward/record.url?scp=84911896868&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84911896868&partnerID=8YFLogxK

    M3 - Article

    AN - SCOPUS:84911896868

    VL - 8892

    SP - 306

    EP - 309

    JO - Lecture Notes in Computer Science

    JF - Lecture Notes in Computer Science

    SN - 0302-9743

    ER -