Improved extreme programming methodology with inbuilt security
Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2011
|
Online Access: | http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf |
_version_ | 1825931430765527040 |
---|---|
author | Shuaibu, Bala Musa Md. Norwawi, Norita Selamat, Mohd Hasan Sharif, Khaironi Yatim |
author_facet | Shuaibu, Bala Musa Md. Norwawi, Norita Selamat, Mohd Hasan Sharif, Khaironi Yatim |
author_sort | Shuaibu, Bala Musa |
collection | UPM |
description | Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as a candidate, Improve Extreme Programming Methodology by tightening security controls across the development stages without necessarily extending the process. |
first_indexed | 2024-03-06T09:26:38Z |
format | Conference or Workshop Item |
id | upm.eprints-56514 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T09:26:38Z |
publishDate | 2011 |
publisher | IEEE |
record_format | dspace |
spelling | upm.eprints-565142017-08-01T08:48:18Z http://psasir.upm.edu.my/id/eprint/56514/ Improved extreme programming methodology with inbuilt security Shuaibu, Bala Musa Md. Norwawi, Norita Selamat, Mohd Hasan Sharif, Khaironi Yatim Security in e-commerce is becoming an important issue to deal with as several cases of attacks to users' data are increasing exponentially. Therefore, there is absolute need for proper checks and balances to mitigate the lapses using the appropriate development framework. This paper provides as a candidate, Improve Extreme Programming Methodology by tightening security controls across the development stages without necessarily extending the process. IEEE 2011 Conference or Workshop Item PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf Shuaibu, Bala Musa and Md. Norwawi, Norita and Selamat, Mohd Hasan and Sharif, Khaironi Yatim (2011) Improved extreme programming methodology with inbuilt security. In: 2011 IEEE Symposium on Computers & Informatics (ISCI 2011), 20-22 Mar. 2011, Kuala Lumpur, Malaysia. (pp. 674-679). 10.1109/ISCI.2011.5958997 |
spellingShingle | Shuaibu, Bala Musa Md. Norwawi, Norita Selamat, Mohd Hasan Sharif, Khaironi Yatim Improved extreme programming methodology with inbuilt security |
title | Improved extreme programming methodology with inbuilt security |
title_full | Improved extreme programming methodology with inbuilt security |
title_fullStr | Improved extreme programming methodology with inbuilt security |
title_full_unstemmed | Improved extreme programming methodology with inbuilt security |
title_short | Improved extreme programming methodology with inbuilt security |
title_sort | improved extreme programming methodology with inbuilt security |
url | http://psasir.upm.edu.my/id/eprint/56514/1/Improved%20extreme%20programming%20methodology%20with%20inbuilt%20security.pdf |
work_keys_str_mv | AT shuaibubalamusa improvedextremeprogrammingmethodologywithinbuiltsecurity AT mdnorwawinorita improvedextremeprogrammingmethodologywithinbuiltsecurity AT selamatmohdhasan improvedextremeprogrammingmethodologywithinbuiltsecurity AT sharifkhaironiyatim improvedextremeprogrammingmethodologywithinbuiltsecurity |