Loading [a11y]/accessibility-menu.js
The Use of Security Tactics in Open Source Software Projects | IEEE Journals & Magazine | IEEE Xplore

The Use of Security Tactics in Open Source Software Projects


Abstract:

Despite the best intentions of software architects, it is often the case that individual developers do not faithfully implement the original security design decisions. Su...Show More

Abstract:

Despite the best intentions of software architects, it is often the case that individual developers do not faithfully implement the original security design decisions. Such a scenario sometimes leads to a situation in which while an architect claims the use of a secure architecture in the form of some tactic, the corresponding source code does not support the claim. To bridge this gap, the first critical step is to verify whether the source code reflects at least some of the structural or behavioral features required for a tactic. In this study, we examine the extent of this discrepancy between an architect's vision of what security tactics need to be adopted in the software and the actual implementation. We accomplish this research goal by 1) exploring an architect's intention to use security tactics, 2) checking whether the tactic is manifested in the design, and finally 3) recovering the evidence of efforts to implement the design in the source code. To avoid limitations to accessing documentation and source code, we use open source projects to conduct our research.
Published in: IEEE Transactions on Reliability ( Volume: 65, Issue: 3, September 2016)
Page(s): 1195 - 1204
Date of Publication: 22 December 2015

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.