skip to main content
10.1145/3530019.3531337acmotherconferencesArticle/Chapter ViewAbstractPublication PageseaseConference Proceedingsconference-collections
research-article

Challenges of Secure Software Deployment: An Empirical Study

Published: 13 June 2022 Publication History
First page of PDF

References

[1]
Mano Paul.Official (ISC) 2 guide to the CSSLP CBK. CRC Press, 2013.
[2]
Alan Dearle. "Software deployment, past, present and future". In: Future of Software Engineering (FOSE'07). IEEE. 2007, pp. 269–284.
[3]
Pierre Parrend and Stéphane Frénot. "Supporting the secure deployment of osgi bundles". In:2007 IEEE International Symposium on a World of Wireless, Mobile and Multi-media Networks. IEEE. 2007, pp. 1–6.
[4]
Mojtaba Shahin, Muhammad Ali Babar, and Liming Zhu. "Continuous integration, delivery and deployment: a systematic review on approaches, tools, challenges and practices". In: IEEE Access5 (2017), pp. 3909–3943.
[5]
Gerry Gerard Claps, Richard Berntsson Svensson, and Aybüke Aurum. "On the journeyto continuous deployment: Technical and social challenges along the way". In: Information and Software technology57 (2015), pp. 21–31.
[6]
Anthony Bellissimo, John Burgess, and Kevin Fu. "Secure Software Updates: Disappointments and New Challenges." In: HotSec. 2006.
[7]
Juhani Iivari and Netta Iivari. "The relationship between organizational culture and the deployment of agile methods". In: Information and software technology53.5 (2011),pp. 509–520.
[8]
Sheila Frankel et al. "Guidelines for the secure deployment of IPv6". In: NIST SpecialPublication800 (2010), p. 119.
[9]
John R Vacca.Computer and information security handbook. Newnes, 2012.
[10]
Paulo Verıssimo and Luıs Rodrigues. "Fundamental security concepts". In: Distributed Systems for System Architects. Springer, 2001, pp. 377–393.
[11]
Shahin, M., Babar, M. A. & Zhu, L. Continuous integration, delivery and deployment: a systematic review on approaches, tools, challenges and practices. IEEE Access5, 3909–3943 (2017).
[12]
Fitzgerald, B. & Stol, K.-J. Continuous software engineering and beyond: trends and challenges. InProceedings of the 1st International Workshop on Rapid Continuous Software Engineering, 1–9(2014).
[13]
Bellissimo, A., Burgess, J. & Fu, K. Secure software updates: Disappointments and new challenges. InHotSec(2006).
[14]
Meng, N., Nagy, S., Yao, D., Zhuang, W. & Argoty, G. A. Secure coding practices in Java: Challenges and vulnerabilities. InProceedings of the 40th International Conference on Software Engineering,372–383 (ACM/IEEE, 2018).5/6
[15]
Ahmad, I., Liyanage, M., Ylianttila, M. & Gurtov, A. Analysis of deployment challenges of host identity protocol. In2017 European Conference on Networks and Communications (EuCNC), 1–6(IEEE, 2017).
[16]
Alsa'deh, A. & Meinel, C. Secure neighbor discovery: Review, challenges, perspectives, and recommendations. IEEE Secur. & Priv.10, 26–34 (2012).
[17]
Frankel, S., Graveman, R., Pearce, J. & Rooks, M. Guidelines for the secure deployment of ipv6.NIST Special Publ.800, 119 (2010).
[18]
Grechanik, M. & Perry, D. E. Secure deployment of components. In International Working Conference on Component Deployment, 175–189 (Springer, 2004).
[19]
Pressman, R. S.Software engineering: a practitioner's approach (Palgrave macmillan, 2005).
[20]
Dearle, A. Software deployment, past, present and future. In Future of Software Engineering (FOSE'07), 269–284 (IEEE, 2007).
[21]
Forrest Shull, Janice Singer, and Dag I.K. Sjøberg. Guide to advanced empirical software engineering. 2008.I S BN: 9781848000438.D O I:10.1007/978-1-84800-044-5.9
[22]
GARDEY, Juan Cruz, UX-Painter: An Approach to Explore Interaction Fixes in the Browser. Proceedings of the ACM on Human-Computer Interaction, 2020, 4.EICS: 1-21.‏
[23]
"CYBERSECURITY FRAMEWORK," NIST. https://www.nist.gov/cyberframework (accessed Sep. 11 2020).
[24]
"Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF)," NIST. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04232020.pdf (accessed Sep. 11 2020).
[25]
"Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF)," NIST. https://csrc.nist.gov/News/2020/mitigating-risk-of-software-vulns-ssdf (accessed Sep. 11 2020).
[26]
"legislation," NCA. https://nca.gov.sa/pages/legislation.html (accessed Sep. 11 2020).
[27]
“WebApplicationChecklist, SANS. https://www.sans.org/media/score/checklists/WebApplicationChecklist.pdf (accessed Sep. 11 2020).

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
EASE '22: Proceedings of the 26th International Conference on Evaluation and Assessment in Software Engineering
June 2022
466 pages
ISBN:9781450396134
DOI:10.1145/3530019
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 June 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cybersecurity
  2. IT organizations
  3. Software deployment
  4. challenges

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

EASE 2022

Acceptance Rates

Overall Acceptance Rate 71 of 232 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)61
  • Downloads (Last 6 weeks)7
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media