How is security testing done in agile teams? A cross-case analysis of four software teams
dc.contributor.author | Cruzes, Daniela S. | |
dc.contributor.author | Felderer, Michael | |
dc.contributor.author | Oyetoyan, Tosin Daniel | |
dc.contributor.author | Gander, Matthias | |
dc.contributor.author | Pekaric, Irdin | |
dc.contributor.editor | Becker, Steffen | |
dc.contributor.editor | Bogicevic, Ivan | |
dc.contributor.editor | Herzwurm, Georg | |
dc.contributor.editor | Wagner, Stefan | |
dc.date.accessioned | 2019-03-14T11:49:20Z | |
dc.date.available | 2019-03-14T11:49:20Z | |
dc.date.issued | 2019 | |
dc.description.abstract | This summary refers to the paper ’How is security testing done in agile teams? A cross-case analysis of four software teams’ [Cr17]. The paper was published as a full research paper in the proceedings of the 18th International Conference on Agile Software Development (XP 2017). It presents a multiple case study on how security testing is done in agile teams. | en |
dc.identifier.doi | 10.18420/se2019-40 | |
dc.identifier.isbn | 978-3-88579-686-2 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/20901 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Software Engineering and Software Management 2019 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-292 | |
dc.subject | Security testing | |
dc.subject | agile processes | |
dc.subject | agile testing | |
dc.subject | case study research | |
dc.subject | software testing | |
dc.subject | software processes | |
dc.subject | software security | |
dc.title | How is security testing done in agile teams? A cross-case analysis of four software teams | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 134 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 133 | |
gi.conference.date | 18.-22. Februar 2019 | |
gi.conference.location | Stuttgart, Germany | |
gi.conference.sessiontitle | Session 12: Software Management II, Security und Technologietransfer |
Dateien
Originalbündel
1 - 1 von 1