dc.contributor.author | Ribeiro, Victor Vidigal | |
dc.contributor.author | Cruzes, Daniela Soares | |
dc.contributor.author | Travassos, Guilherme Horta | |
dc.date.accessioned | 2020-03-03T09:41:30Z | |
dc.date.available | 2020-03-03T09:41:30Z | |
dc.date.created | 2019-06-26T12:01:30Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | 2018 25th Australasian Software Engineering Conference (ASWEC). 2018, . | nb_NO |
dc.identifier.issn | 2377-5408 | |
dc.identifier.uri | http://hdl.handle.net/11250/2644840 | |
dc.description.abstract | Security and performance are critical nonfunctional requirements for software systems. Thus, it is crucial to include verification activities during software development to identify defects related to such requirements, avoiding their occurrence after release. Software verification, including testing and reviews, encompasses a set of activities that have a purpose of analyzing the software searching for defects. Security and performance verification are activities that look at defects related to these specific quality attributes. Few empirical studies have been focused on how is the state of the practice in security and performance verification. This paper presents the results of a case study performed in the context of Brazilian organizations aiming to characterize security and performance verification practices. Additionally, it provides a set of conjectures indicating recommendations to improve security and performance verification activities. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | IEEE | nb_NO |
dc.subject | Security verification | nb_NO |
dc.subject | Performance verification | nb_NO |
dc.subject | Security testing | nb_NO |
dc.subject | Performance testing | nb_NO |
dc.title | A Perception of the Practice of Software Security and Performance Verification | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.rights.holder | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
dc.source.pagenumber | 10 | nb_NO |
dc.source.journal | 2018 25th Australasian Software Engineering Conference (ASWEC) | nb_NO |
dc.identifier.doi | 10.1109/ASWEC.2018.00018 | |
dc.identifier.cristin | 1707964 | |
cristin.unitcode | 7401,90,13,0 | |
cristin.unitname | Software Engineering, Safety and Security | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |