Survey on Security Software Engineering

As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer Software 2011/07/26, Vol.28(3), pp.3_43-3_60
Hauptverfasser: YOSHIOKA, Nobukazu, OKUBO, Takao, MUNETOH, Seiji
Format: Artikel
Sprache:eng ; jpn
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3_60
container_issue 3
container_start_page 3_43
container_title Computer Software
container_volume 28
creator YOSHIOKA, Nobukazu
OKUBO, Takao
MUNETOH, Seiji
description As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.
doi_str_mv 10.11309/jssst.28.3_43
format Article
fullrecord <record><control><sourceid>proquest_jstag</sourceid><recordid>TN_cdi_proquest_journals_1476285088</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3177701271</sourcerecordid><originalsourceid>FETCH-LOGICAL-j1738-9272f9c846e48f91963d97746558027fb8a55218df429e61a6912ca6fb36fe4f3</originalsourceid><addsrcrecordid>eNo9kD1PwzAYhD2ARFW6MkdiYErw98cIVaFIlRgCs-Wkr4OjkhQ7AeXfUwhiuRvu0Z10CF0RXBDCsLltU0pDQXXBLGdnaIGpNrkUHF-gVUqhwhgbSQSXC3RTjvETpqzvshLqMYZhysreD18uQrbpmtABxNA1l-jcu0OC1Z8v0evD5mW9zXfPj0_ru13eEsV0bqii3tSaS-DaG2Ik2xuluBRCY6p8pZ0QlOi959SAJE4aQmsnfcWkB-7ZEl3PvcfYf4yQBtv2Y-xOk5ZwJakWWOsTdT9TbRpcA_YYw7uLk3VxCPUB7O8BlmrLZvn54T-s31y00LFvwwdZKg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1476285088</pqid></control><display><type>article</type><title>Survey on Security Software Engineering</title><source>J-STAGE Free</source><creator>YOSHIOKA, Nobukazu ; OKUBO, Takao ; MUNETOH, Seiji</creator><creatorcontrib>YOSHIOKA, Nobukazu ; OKUBO, Takao ; MUNETOH, Seiji</creatorcontrib><description>As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.</description><identifier>ISSN: 0289-6540</identifier><identifier>DOI: 10.11309/jssst.28.3_43</identifier><language>eng ; jpn</language><publisher>Tokyo: Japan Society for Software Science and Technology</publisher><ispartof>Computer Software, 2011/07/26, Vol.28(3), pp.3_43-3_60</ispartof><rights>Japan Society for Software Science and Technology 2011</rights><rights>Copyright Japan Science and Technology Agency 2011</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>YOSHIOKA, Nobukazu</creatorcontrib><creatorcontrib>OKUBO, Takao</creatorcontrib><creatorcontrib>MUNETOH, Seiji</creatorcontrib><title>Survey on Security Software Engineering</title><title>Computer Software</title><addtitle>Computer Software</addtitle><description>As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.</description><issn>0289-6540</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNo9kD1PwzAYhD2ARFW6MkdiYErw98cIVaFIlRgCs-Wkr4OjkhQ7AeXfUwhiuRvu0Z10CF0RXBDCsLltU0pDQXXBLGdnaIGpNrkUHF-gVUqhwhgbSQSXC3RTjvETpqzvshLqMYZhysreD18uQrbpmtABxNA1l-jcu0OC1Z8v0evD5mW9zXfPj0_ru13eEsV0bqii3tSaS-DaG2Ik2xuluBRCY6p8pZ0QlOi959SAJE4aQmsnfcWkB-7ZEl3PvcfYf4yQBtv2Y-xOk5ZwJakWWOsTdT9TbRpcA_YYw7uLk3VxCPUB7O8BlmrLZvn54T-s31y00LFvwwdZKg</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>YOSHIOKA, Nobukazu</creator><creator>OKUBO, Takao</creator><creator>MUNETOH, Seiji</creator><general>Japan Society for Software Science and Technology</general><general>Japan Science and Technology Agency</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2011</creationdate><title>Survey on Security Software Engineering</title><author>YOSHIOKA, Nobukazu ; OKUBO, Takao ; MUNETOH, Seiji</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j1738-9272f9c846e48f91963d97746558027fb8a55218df429e61a6912ca6fb36fe4f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng ; jpn</language><creationdate>2011</creationdate><toplevel>online_resources</toplevel><creatorcontrib>YOSHIOKA, Nobukazu</creatorcontrib><creatorcontrib>OKUBO, Takao</creatorcontrib><creatorcontrib>MUNETOH, Seiji</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer Software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>YOSHIOKA, Nobukazu</au><au>OKUBO, Takao</au><au>MUNETOH, Seiji</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Survey on Security Software Engineering</atitle><jtitle>Computer Software</jtitle><addtitle>Computer Software</addtitle><date>2011</date><risdate>2011</risdate><volume>28</volume><issue>3</issue><spage>3_43</spage><epage>3_60</epage><pages>3_43-3_60</pages><issn>0289-6540</issn><abstract>As growth of the Internet, services on it have been playing important roles in both industries and personal activities. While such services lead us to a useful society, we cannot disregard security harm to the services by attacks through the network. We need, therefore, to produce secure services to provide the useful functionality. However, it is not so easy to make services secure, because we need to consider many concerns on security. We describe software security technologies from the difficulty point of view of secure software development in this paper. After that, we discuss how many difficulties we can solve with the technologies to make unsolved difficulties clear, that we need to tackle for future research direction.</abstract><cop>Tokyo</cop><pub>Japan Society for Software Science and Technology</pub><doi>10.11309/jssst.28.3_43</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0289-6540
ispartof Computer Software, 2011/07/26, Vol.28(3), pp.3_43-3_60
issn 0289-6540
language eng ; jpn
recordid cdi_proquest_journals_1476285088
source J-STAGE Free
title Survey on Security Software Engineering
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T23%3A22%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_jstag&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Survey%20on%20Security%20Software%20Engineering&rft.jtitle=Computer%20Software&rft.au=YOSHIOKA,%20Nobukazu&rft.date=2011&rft.volume=28&rft.issue=3&rft.spage=3_43&rft.epage=3_60&rft.pages=3_43-3_60&rft.issn=0289-6540&rft_id=info:doi/10.11309/jssst.28.3_43&rft_dat=%3Cproquest_jstag%3E3177701271%3C/proquest_jstag%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1476285088&rft_id=info:pmid/&rfr_iscdi=true