Asian Journal of Information Technology
Year:
2017
Volume:
16
Issue:
1
Page No.
7 - 13
References
Epstein, J., 2009. A survey of vendor software assurance practices. Proceedings of the Conference on 2009 Computer Security Applications Annual, December 7-11, 2009, IEEE, Virginia, USA., ISBN:978-1-4244-5327-6, pp: 528-537.
Fonseca, J., M. Vieira, K. Buragga and N. Zaman, 2013. A Survey on Secure Software Development Lifecycles. In: Software Development Techniques for Constructive Information Systems Design, Khalid, A.B and Z. Noor (Eds.). Idea Group Inc, Calgary, Alberta, pp: 57-73.
Kaur, D., P. Kaur and H. Singh, 2012. Secure spiral: A secure software development model. J. Software Eng., 6: 10-15.
CrossRef | Kothari, C.R., 2004. Research Methodology Methods and Techniques. New Age International Publishers, New Delhi, India, ISBN: 9788122415223, Pages: 401.
Martin, D., 2011. Development and implementation of secure web application. Center for the Protection of National Infrastructure, UK.
Munassar, N.M.A. and A. Govardhan, 2010. A comparison between five models of software engineering. IJCSI, 5: 95-101.
Direct Link | Siddiqui, M.S. and S.J. Hussain, 2006. Comprehensive software development model. Proceedings of the IEEE International Conference on Computer Systems and Applications, March 8-8, 2006, IEEE, Virginia, USA., ISBN:1-4244-0211-5, pp: 353-360.