Reference Hub8
Evaluation of the Challenges of Developing Secure Software Using the Agile Approach

Evaluation of the Challenges of Developing Secure Software Using the Agile Approach

Hela Oueslati, Mohammad Masudur Rahman, Lotfi ben Othmane, Imran Ghani, Adila Firdaus Bt Arbain
Copyright: © 2016 |Volume: 7 |Issue: 1 |Pages: 21
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466691940|DOI: 10.4018/IJSSE.2016010102
Cite Article Cite Article

MLA

Oueslati, Hela, et al. "Evaluation of the Challenges of Developing Secure Software Using the Agile Approach." IJSSE vol.7, no.1 2016: pp.17-37. http://doi.org/10.4018/IJSSE.2016010102

APA

Oueslati, H., Rahman, M. M., ben Othmane, L., Ghani, I., & Arbain, A. F. (2016). Evaluation of the Challenges of Developing Secure Software Using the Agile Approach. International Journal of Secure Software Engineering (IJSSE), 7(1), 17-37. http://doi.org/10.4018/IJSSE.2016010102

Chicago

Oueslati, Hela, et al. "Evaluation of the Challenges of Developing Secure Software Using the Agile Approach," International Journal of Secure Software Engineering (IJSSE) 7, no.1: 17-37. http://doi.org/10.4018/IJSSE.2016010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A set of challenges of developing secure software using the agile development approach and methods are reported in the literature. This paper reports about a systematic literature review to identify these challenges and evaluate the causes of each of these challenges, with respect to the agile values, the agile principles, and the security assurance practices. The authors identified in this study 20 challenges, which are reported in 28 publications. They found that 14 of these challenges are valid and 6 are neither caused by agile values and principles, nor by the security assurance practices. The authors also found that 2 of the valid challenges are related to the software development life-cycle, 4 are related to incremental development, 4 are related to security assurance, 2 are related to awareness and collaboration, and 2 are related to security management. These results justify the need for research to make developing secure software smooth.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.