skip to main content
10.1145/1176617.1176727acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
Article

Towards agile security in web applications

Published:22 October 2006Publication History

ABSTRACT

In this paper, we present an approach that we have used to address security when running projects according to agile principles. Misuse stories have been added to user stories to capture malicious use of the application. Furthermore, misuse stories have been implemented as automated tests (unit tests, acceptance tests) in order to perform security regression testing. Penetration testing, system hardening and securing deployment have been started in early iterations of the project.

References

  1. Agile Alliance, "Manifesto for Agile Software Development, 2001. http://www.agilemanifesto.org/Google ScholarGoogle Scholar
  2. Standish Group, The Chaos Report, West Yarmonth, MA: The Standish Group, 1995.Google ScholarGoogle Scholar
  3. Viega, J., McGraw, G., Building Secure Software. How to Avoid Security Problems the Right Way, Addison-Wesley, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Beck, K., Extreme Programming Explainted - Embracing Change, Addison-Wesley, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. McGraw, G., Software Security - Building Security In, Addison-Wesley, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sindre, G., Opdahl, A. Templates for Misuse Case Description, Seventh International Workshop on Requirements Engineering, Interlaken, Switzerland, 2001.Google ScholarGoogle Scholar
  7. Alexander, I., Initial Industrial Experience of Misuse Cases in Trade-Off Analysis, Proceedings of IEEE Joint International Requirements Engineering Conference, 9-13 September 2002, Essen, pp 61--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Firesmith, D., OPEN Process Framework, http://www.donald-firesmith.com/Google ScholarGoogle Scholar
  9. Open Web Application Project (OWASP), "OWASP Top Ten Project", http://www.owasp.org/index.php/Category:OWASP_Top_Ten_ProjectGoogle ScholarGoogle Scholar
  10. Swiderski, F., Snyder, W., Threat Modeling, Microsoft Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Amoroso, E., Fundamentals of Computer Security Technology, Prentice Hall, Englewood Cliffs, 1994 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Schwaber, K., Beedle, M., Agile Software Development with SCRUM, Prentice Hall, 2001 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards agile security in web applications

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              OOPSLA '06: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
              October 2006
              530 pages
              ISBN:159593491X
              DOI:10.1145/1176617
              • General Chair:
              • Peri Tarr,
              • Program Chair:
              • William R. Cook

              Copyright © 2006 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 22 October 2006

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Upcoming Conference

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader