Improved extreme programming methodology with inbuilt security

Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as...

Full description

Bibliographic Details
Main Authors: Shuaibu, Bala Musa, Md. Norwawi, Norita, Selamat, Mohd Hasan, Sharif, Khaironi Yatim
Format: Conference or Workshop Item
Language:English
Published: IEEE 2011
Online Access:http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf
_version_ 1825931430765527040
author Shuaibu, Bala Musa
Md. Norwawi, Norita
Selamat, Mohd Hasan
Sharif, Khaironi Yatim
author_facet Shuaibu, Bala Musa
Md. Norwawi, Norita
Selamat, Mohd Hasan
Sharif, Khaironi Yatim
author_sort Shuaibu, Bala Musa
collection UPM
description Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as a candidate, Improve Extreme Programming Methodology by tightening security controls across the development stages without necessarily extending the process.
first_indexed 2024-03-06T09:26:38Z
format Conference or Workshop Item
id upm.eprints-56514
institution Universiti Putra Malaysia
language English
last_indexed 2024-03-06T09:26:38Z
publishDate 2011
publisher IEEE
record_format dspace
spelling upm.eprints-565142017-08-01T08:48:18Z http://psasir.upm.edu.my/id/eprint/56514/ Improved extreme programming methodology with inbuilt security Shuaibu, Bala Musa Md. Norwawi, Norita Selamat, Mohd Hasan Sharif, Khaironi Yatim Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as a candidate, Improve Extreme Programming Methodology by tightening security controls across the development stages without necessarily extending the process. IEEE 2011 Conference or Workshop Item PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf Shuaibu, Bala Musa and Md. Norwawi, Norita and Selamat, Mohd Hasan and Sharif, Khaironi Yatim (2011) Improved extreme programming methodology with inbuilt security. In: 2011 IEEE Symposium on Computers & Informatics (ISCI 2011), 20-22 Mar. 2011, Kuala Lumpur, Malaysia. (pp. 674-679). 10.1109/ISCI.2011.5958997
spellingShingle Shuaibu, Bala Musa
Md. Norwawi, Norita
Selamat, Mohd Hasan
Sharif, Khaironi Yatim
Improved extreme programming methodology with inbuilt security
title Improved extreme programming methodology with inbuilt security
title_full Improved extreme programming methodology with inbuilt security
title_fullStr Improved extreme programming methodology with inbuilt security
title_full_unstemmed Improved extreme programming methodology with inbuilt security
title_short Improved extreme programming methodology with inbuilt security
title_sort improved extreme programming methodology with inbuilt security
url http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf
work_keys_str_mv AT shuaibubalamusa improvedextremeprogrammingmethodologywithinbuiltsecurity
AT mdnorwawinorita improvedextremeprogrammingmethodologywithinbuiltsecurity
AT selamatmohdhasan improvedextremeprogrammingmethodologywithinbuiltsecurity
AT sharifkhaironiyatim improvedextremeprogrammingmethodologywithinbuiltsecurity