Developer-oriented Web Security by Integrating Secure SDLC into IDEs
Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient data etc. are leaked and critical services like online banking become unavailable for long period of ti...
| Published in: | Sakarya University Journal of Computer and Information Sciences |
|---|---|
| Main Author: | Emin İslam Tatlı |
| Format: | Article |
| Language: | English |
| Published: |
Sakarya University
2018-04-01
|
| Subjects: | |
| Online Access: | https://dergipark.org.tr/tr/download/article-file/479218 |
Similar Items
A Novel Framework for Information Security During the SDLC Implementation Stage: A Systematic Literature Review
by: Mikael Octavinus Chan, et al.
Published: (2024-02-01)
by: Mikael Octavinus Chan, et al.
Published: (2024-02-01)
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
by: Rafiq Ahmad Khan, et al.
Published: (2022-01-01)
by: Rafiq Ahmad Khan, et al.
Published: (2022-01-01)
Design and Evaluation of AgileBPM SDLC–An Agile SDLC for Business Process Management Systems
by: Roberto Davila-Campos, et al.
Published: (2025-01-01)
by: Roberto Davila-Campos, et al.
Published: (2025-01-01)
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
by: JAEKWAN PARK, et al.
Published: (2014-02-01)
by: JAEKWAN PARK, et al.
Published: (2014-02-01)
Methodological and implementation aspects of introducing secure software development processes
by: Sas S. Arustamyan, et al.
Published: (2023-05-01)
by: Sas S. Arustamyan, et al.
Published: (2023-05-01)
Systematic Mapping Study on Security Approaches in Secure Software Engineering
by: Rafiq Ahmad Khan, et al.
Published: (2021-01-01)
by: Rafiq Ahmad Khan, et al.
Published: (2021-01-01)
A Review of Non-Functional Requirements Analysis Throughout the SDLC
by: Cyrille Dongmo
Published: (2024-11-01)
by: Cyrille Dongmo
Published: (2024-11-01)
Towards the Integration of Security Practices in Agile Software Development: A Systematic Mapping Review
by: Yolanda Valdés-Rodríguez, et al.
Published: (2023-04-01)
by: Yolanda Valdés-Rodríguez, et al.
Published: (2023-04-01)
Secure software development training course
by: Victor S. Gorbatov, et al.
Published: (2017-06-01)
by: Victor S. Gorbatov, et al.
Published: (2017-06-01)
How Can Secure Software be Trusted?
by: Lynn Futcher, et al.
Published: (2011-11-01)
by: Lynn Futcher, et al.
Published: (2011-11-01)
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
by: Rasheed Gbenga Jimoh, et al.
Published: (2022-10-01)
by: Rasheed Gbenga Jimoh, et al.
Published: (2022-10-01)
АНАЛІЗ МЕТОДОЛОГІЇ DEVSECOPS В ПРОЦЕСАХ РОЗРОБКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ
by: Andrii Oleksandrovich Hapon, et al.
Published: (2020-07-01)
by: Andrii Oleksandrovich Hapon, et al.
Published: (2020-07-01)
Delegation-Based Agile Secure Software Development Approach for Small and Medium-Sized Businesses
by: Anze Mihelic, et al.
Published: (2024-01-01)
by: Anze Mihelic, et al.
Published: (2024-01-01)
Secure software development: leveraging application call graphs to detect security vulnerabilities
by: Lei Yan, et al.
Published: (2025-01-01)
by: Lei Yan, et al.
Published: (2025-01-01)
Combining SDLC Method And ITIL Framework by Involving Auditors
by: Hani Fitria Rahmani, et al.
Published: (2020-05-01)
by: Hani Fitria Rahmani, et al.
Published: (2020-05-01)
STORE: Security Threat Oriented Requirements Engineering Methodology
by: Md Tarique Jamal Ansari, et al.
Published: (2022-02-01)
by: Md Tarique Jamal Ansari, et al.
Published: (2022-02-01)
E-SCORE: A web-based tool for security requirements engineering
by: Hiba Hnaini, et al.
Published: (2024-05-01)
by: Hiba Hnaini, et al.
Published: (2024-05-01)
Multi-level Fuzzy system for usable-security assessment
by: Alka Agrawal, et al.
Published: (2022-03-01)
by: Alka Agrawal, et al.
Published: (2022-03-01)
Implementation of System Development Life Cycle (SDLC) on IoT-Based Lending Locker Application
by: Melinda Melinda, et al.
Published: (2023-08-01)
by: Melinda Melinda, et al.
Published: (2023-08-01)
Analysis and Design of Student Guidance Information System through Software Development Life Cycle (SDLC) dan Waterfall Model
by: Henoch Juli Christanto, et al.
Published: (2023-03-01)
by: Henoch Juli Christanto, et al.
Published: (2023-03-01)
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
by: M. O. Shudrak, et al.
Published: (2012-12-01)
by: M. O. Shudrak, et al.
Published: (2012-12-01)
Adaptive security architecture defense platform based on software defined security
by: Mengyao LU, et al.
Published: (2020-12-01)
by: Mengyao LU, et al.
Published: (2020-12-01)
Adaptive security architecture defense platform based on software defined security
by: Mengyao LU, et al.
Published: (2020-12-01)
by: Mengyao LU, et al.
Published: (2020-12-01)
Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
by: Paulina Silva, et al.
Published: (2016-12-01)
by: Paulina Silva, et al.
Published: (2016-12-01)
Adaption of a Secure Software Development Methodology for Secure Engineering Design
by: Sune Von Solms, et al.
Published: (2020-01-01)
by: Sune Von Solms, et al.
Published: (2020-01-01)
Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering
by: Anže Mihelič, et al.
Published: (2023-04-01)
by: Anže Mihelič, et al.
Published: (2023-04-01)
A Web-Based System for Managing Student Attendance and Assessment Submissions: An SDLC Waterfall Model Approach
by: Siti Balqis Mahlan, et al.
Published: (2025-09-01)
by: Siti Balqis Mahlan, et al.
Published: (2025-09-01)
Multiple Linear-Combination Security Network Coding
by: Yang Bai, et al.
Published: (2023-07-01)
by: Yang Bai, et al.
Published: (2023-07-01)
Security vulnerabilities in C++ programs
by: Piotr Michał Adamczyk, et al.
Published: (2025-06-01)
by: Piotr Michał Adamczyk, et al.
Published: (2025-06-01)
Exploring How to Apply Secure Software Design Principles
by: Shouki A. Ebad
Published: (2022-01-01)
by: Shouki A. Ebad
Published: (2022-01-01)
Automated Intel SGX Integration for Enhanced Application Security
by: Leonardo Regano, et al.
Published: (2024-01-01)
by: Leonardo Regano, et al.
Published: (2024-01-01)
A Comprehensive Review of the Main Heavyweight and Lightweight SDLC for Big Data Analytics Systems (BDAS)
by: David Alejandro Montoya-Murillo, et al.
Published: (2025-01-01)
by: David Alejandro Montoya-Murillo, et al.
Published: (2025-01-01)
Analysis of information security technologies for use in the enterprise infrastructure
by: A. D. Popov, et al.
Published: (2023-02-01)
by: A. D. Popov, et al.
Published: (2023-02-01)
Integrating Formal Methods for Security in Software Security Education
by: Paolo MODESTI
Published: (2020-09-01)
by: Paolo MODESTI
Published: (2020-09-01)
Secure Global Software Development: A Practitioners’ Perspective
by: Mamoona Humayun, et al.
Published: (2023-02-01)
by: Mamoona Humayun, et al.
Published: (2023-02-01)
Design of LAPAN-A2 Satellite Telemetry Data Information System Using SDLC
by: Agus Herawan, et al.
Published: (2022-02-01)
by: Agus Herawan, et al.
Published: (2022-02-01)
Management of nontraditional security for Vietnam’s sustainable development: an integrated approach
by: Phi Dinh Hoang, et al.
Published: (2022-12-01)
by: Phi Dinh Hoang, et al.
Published: (2022-12-01)
Standardized Software Development Model For SME Software Houses In Pakistan
by: Asif Mansoori, et al.
Published: (2014-07-01)
by: Asif Mansoori, et al.
Published: (2014-07-01)
Security Monitoring during Software Development: An Industrial Case Study
by: Miltiadis Siavvas, et al.
Published: (2023-06-01)
by: Miltiadis Siavvas, et al.
Published: (2023-06-01)
End-to-End Database Software Security
by: Denis Ulybyshev, et al.
Published: (2023-03-01)
by: Denis Ulybyshev, et al.
Published: (2023-03-01)
Similar Items
-
A Novel Framework for Information Security During the SDLC Implementation Stage: A Systematic Literature Review
by: Mikael Octavinus Chan, et al.
Published: (2024-02-01) -
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
by: Rafiq Ahmad Khan, et al.
Published: (2022-01-01) -
Design and Evaluation of AgileBPM SDLC–An Agile SDLC for Business Process Management Systems
by: Roberto Davila-Campos, et al.
Published: (2025-01-01) -
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
by: JAEKWAN PARK, et al.
Published: (2014-02-01) -
Methodological and implementation aspects of introducing secure software development processes
by: Sas S. Arustamyan, et al.
Published: (2023-05-01)
