Extreme programming security practices

  • Authors:
  • Xiaocheng Ge;Richard F. Paige;Fiona Polack;Phil Brooke

  • Affiliations:
  • Department of Computer Science, University of York, UK;Department of Computer Science, University of York, UK;Department of Computer Science, University of York, UK;School of Computing, University of Teesside, UK

  • Venue:
  • XP'07 Proceedings of the 8th international conference on Agile processes in software engineering and extreme programming
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Current practice suggests that security is considered through all stages of the software development life cycle, and that a risk-based and plan-driven approach is best suited to establish security criteria. Based on experience in applying security practices, this paper proposes two new security practices, security training and a fundamental security architecture, for applying Extreme Programming.