skip to main content
10.1145/2857218.2857225acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
short-paper

ScrumS: a model for safe agile development

Authors Info & Claims
Published:25 October 2015Publication History

ABSTRACT

The utilization of the Scrum method for software development offers major benefits to its users, such as the process acceleration and resources to deal with the instability of technological environments. Fast customer feedback and support for volatile requirement results in a higher product value, however it hinders the team in dealing appropriately with a critical aspect of every system, which is the information security. Whereas attacks have become more sophisticated that even simpler systems can be potential targets, so it is essential to treat software security within the agile method itself, in order to make it part of the process. Aiming to improve system's quality, reliability, and security, this work proposes an accessory to the Scrum agile method named ScrumS, which adds specific security techniques for a risk analysis project.

References

  1. Version One. State of Agile Survey: The State of Agile Development. Version One, 2010.Google ScholarGoogle Scholar
  2. Schwaber, K. Agile Project Management with SCRUM. Microsoft Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Azham, Z., Ghani, I., and Ithnin, N. Security Backlog in Scrum Security Practices. Software Engineering (MySEC), Johor Bahru, 2011. DOI=10.1109/MySEC.2011.6140708Google ScholarGoogle ScholarCross RefCross Ref
  4. Schneier, B. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, New York, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Pinto, N. A. A Process Model for Security Tests Using a Risk Oriented Approach. Brazilian Aeronautics Institute of Technology, Sao Jose dos Campos, Brazil, 2008.Google ScholarGoogle Scholar
  6. Viega, J., and McGraw, G. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley Professional, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Stoneburner G., Goguen A., and Feringa, A. Risk Management Guide for Information Technology Systems. National Institute of Standards & Technology, Gaithersburg, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mougouei, D. et. al. S-Scrum: a Secure Methodology for Agile Development of Web Services. World of Computer Science and Information Technology Journal (WCSIT), 3 (1), 2013, 15--19.Google ScholarGoogle Scholar
  9. McGraw, G. Software Security. Security & Privacy, IEEE, 2 (2), 2004, 80--83. DOI=10.1109/MSECP.2004.1281254 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Highsmith, J. Agile Project Management: Creating Innovative Products. Addison-Wesley Professional, 2009, 432. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Pfleeger, C., and Pfleeger S. Security in Computing. Prentice Hall Professional Technical Reference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Phan, A. and Phan, P. Scrum in Action: Agile Software Project Management and Development. Novatec, 2011, 287. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Levin, T. et al. Design Principles and Guidelines for Security. Secure Core, 2007.Google ScholarGoogle Scholar
  14. Brazilian Ministry of Education. Instrumento de Avaliacao de Cursos de Graduacao Presencial e a Distancia. Inped.gov.br, 2012. http://download.inep.gov.br/educacao_superior/avaliacao_cursos_graduacao/instrumentos/2012/instrumento_com_alteracoes_maio_12.pdf.Google ScholarGoogle Scholar
  15. Firesmith, D. Security Use Cases. Journal of Objetct Technology, 2 (3), 2003, 53--6Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    MEDES '15: Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems
    October 2015
    271 pages

    Copyright © 2015 ACM

    © 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 October 2015

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    MEDES '15 Paper Acceptance Rate13of64submissions,20%Overall Acceptance Rate267of682submissions,39%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader