Survey on Security Software Engineering
As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to...
Gespeichert in:
Veröffentlicht in: | Computer Software 2011/07/26, Vol.28(3), pp.3_43-3_60 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng ; jpn |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3_60 |
---|---|
container_issue | 3 |
container_start_page | 3_43 |
container_title | Computer Software |
container_volume | 28 |
creator | YOSHIOKA, Nobukazu OKUBO, Takao MUNETOH, Seiji |
description | As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction. |
doi_str_mv | 10.11309/jssst.28.3_43 |
format | Article |
fullrecord | <record><control><sourceid>proquest_jstag</sourceid><recordid>TN_cdi_proquest_journals_1476285088</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3177701271</sourcerecordid><originalsourceid>FETCH-LOGICAL-j1738-9272f9c846e48f91963d97746558027fb8a55218df429e61a6912ca6fb36fe4f3</originalsourceid><addsrcrecordid>eNo9kD1PwzAYhD2ARFW6MkdiYErw98cIVaFIlRgCs-Wkr4OjkhQ7AeXfUwhiuRvu0Z10CF0RXBDCsLltU0pDQXXBLGdnaIGpNrkUHF-gVUqhwhgbSQSXC3RTjvETpqzvshLqMYZhysreD18uQrbpmtABxNA1l-jcu0OC1Z8v0evD5mW9zXfPj0_ru13eEsV0bqii3tSaS-DaG2Ik2xuluBRCY6p8pZ0QlOi959SAJE4aQmsnfcWkB-7ZEl3PvcfYf4yQBtv2Y-xOk5ZwJakWWOsTdT9TbRpcA_YYw7uLk3VxCPUB7O8BlmrLZvn54T-s31y00LFvwwdZKg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1476285088</pqid></control><display><type>article</type><title>Survey on Security Software Engineering</title><source>J-STAGE Free</source><creator>YOSHIOKA, Nobukazu ; OKUBO, Takao ; MUNETOH, Seiji</creator><creatorcontrib>YOSHIOKA, Nobukazu ; OKUBO, Takao ; MUNETOH, Seiji</creatorcontrib><description>As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.</description><identifier>ISSN: 0289-6540</identifier><identifier>DOI: 10.11309/jssst.28.3_43</identifier><language>eng ; jpn</language><publisher>Tokyo: Japan Society for Software Science and Technology</publisher><ispartof>Computer Software, 2011/07/26, Vol.28(3), pp.3_43-3_60</ispartof><rights>Japan Society for Software Science and Technology 2011</rights><rights>Copyright Japan Science and Technology Agency 2011</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>YOSHIOKA, Nobukazu</creatorcontrib><creatorcontrib>OKUBO, Takao</creatorcontrib><creatorcontrib>MUNETOH, Seiji</creatorcontrib><title>Survey on Security Software Engineering</title><title>Computer Software</title><addtitle>Computer Software</addtitle><description>As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.</description><issn>0289-6540</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNo9kD1PwzAYhD2ARFW6MkdiYErw98cIVaFIlRgCs-Wkr4OjkhQ7AeXfUwhiuRvu0Z10CF0RXBDCsLltU0pDQXXBLGdnaIGpNrkUHF-gVUqhwhgbSQSXC3RTjvETpqzvshLqMYZhysreD18uQrbpmtABxNA1l-jcu0OC1Z8v0evD5mW9zXfPj0_ru13eEsV0bqii3tSaS-DaG2Ik2xuluBRCY6p8pZ0QlOi959SAJE4aQmsnfcWkB-7ZEl3PvcfYf4yQBtv2Y-xOk5ZwJakWWOsTdT9TbRpcA_YYw7uLk3VxCPUB7O8BlmrLZvn54T-s31y00LFvwwdZKg</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>YOSHIOKA, Nobukazu</creator><creator>OKUBO, Takao</creator><creator>MUNETOH, Seiji</creator><general>Japan Society for Software Science and Technology</general><general>Japan Science and Technology Agency</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2011</creationdate><title>Survey on Security Software Engineering</title><author>YOSHIOKA, Nobukazu ; OKUBO, Takao ; MUNETOH, Seiji</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j1738-9272f9c846e48f91963d97746558027fb8a55218df429e61a6912ca6fb36fe4f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng ; jpn</language><creationdate>2011</creationdate><toplevel>online_resources</toplevel><creatorcontrib>YOSHIOKA, Nobukazu</creatorcontrib><creatorcontrib>OKUBO, Takao</creatorcontrib><creatorcontrib>MUNETOH, Seiji</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer Software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>YOSHIOKA, Nobukazu</au><au>OKUBO, Takao</au><au>MUNETOH, Seiji</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survey on Security Software Engineering</atitle><jtitle>Computer Software</jtitle><addtitle>Computer Software</addtitle><date>2011</date><risdate>2011</risdate><volume>28</volume><issue>3</issue><spage>3_43</spage><epage>3_60</epage><pages>3_43-3_60</pages><issn>0289-6540</issn><abstract>As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.</abstract><cop>Tokyo</cop><pub>Japan Society for Software Science and Technology</pub><doi>10.11309/jssst.28.3_43</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0289-6540 |
ispartof | Computer Software, 2011/07/26, Vol.28(3), pp.3_43-3_60 |
issn | 0289-6540 |
language | eng ; jpn |
recordid | cdi_proquest_journals_1476285088 |
source | J-STAGE Free |
title | Survey on Security Software Engineering |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T23%3A22%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_jstag&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survey%20on%20Security%20Software%20Engineering&rft.jtitle=Computer%20Software&rft.au=YOSHIOKA,%20Nobukazu&rft.date=2011&rft.volume=28&rft.issue=3&rft.spage=3_43&rft.epage=3_60&rft.pages=3_43-3_60&rft.issn=0289-6540&rft_id=info:doi/10.11309/jssst.28.3_43&rft_dat=%3Cproquest_jstag%3E3177701271%3C/proquest_jstag%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1476285088&rft_id=info:pmid/&rfr_iscdi=true |