Author of the publication

Case Study of Agile Security Engineering: Building Identity Management for a Government Agency.

, , and . Int. J. Secur. Softw. Eng., 8 (1): 43-57 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case Study of Agile Security Engineering: Building Identity Management for a Government Agency., , and . Int. J. Secur. Softw. Eng., 8 (1): 43-57 (2017)Security Risk Assessment and Management as Technical Debt., and . Cyber Security, page 1-8. IEEE, (2019)Security in agile software development: A practitioner survey., , , , and . Inf. Softw. Technol., (2021)Empirical Notes on the Interaction Between Continuous Kernel Fuzzing and Development., and . ISSRE Workshops, page 276-281. IEEE, (2019)Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency., , and . ARES, page 556-563. IEEE Computer Society, (2016)A comparison of security assurance support of agile software development methods., , and . CompSysTech, page 61-68. ACM, (2015)The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects., , , and . ARES, page 59:1-59:8. ACM, (2019)Surveying Secure Software Development Practices in Finland., , and . ARES, page 6:1-6:7. ACM, (2018)Aligning security objectives with agile software development., , and . XP Companion, page 3:1-3:9. ACM, (2018)Busting a Myth: Review of Agile Security Engineering Methods., , and . ARES, page 74:1-74:10. ACM, (2017)