Journal Navigation
Volume 8
Editorial Preface Editorial Preface
Editorial Preface
Khaled M. Khan
Published: Jan 1, 2017
DOI: 10.4018/IJSSE.2017010101
Volume 8
Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela Soares Cruzes
Although most organizations understand the need for application security at an abstract level, achieving adequate software security at the sharp end requires taking bold steps to address security... Show More
Download Sample (PDF): Article
Cite Article

MLA

Oyetoyan, Tosin Daniel, et al. "A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams." IJSSE vol.8, no.1 2017: pp.1-27. http://doi.org/10.4018/IJSSE.2017010101

APA

Oyetoyan, T. D., Jaatun, M. G., & Cruzes, D. S. (2017). A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams. International Journal of Secure Software Engineering (IJSSE), 8(1), 1-27. http://doi.org/10.4018/IJSSE.2017010101

Chicago

Oyetoyan, Tosin Daniel, Martin Gilje Jaatun, and Daniela Soares Cruzes. "A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams," International Journal of Secure Software Engineering (IJSSE) 8, no.1: 1-27. http://doi.org/10.4018/IJSSE.2017010101

Export Reference

Mendeley
Published: Jan 1, 2017
DOI: 10.4018/IJSSE.2017010102
Volume 8
Lina M. Jimenez, Martin Ochoa, Sandra J. Rueda
Android stores and users need mechanisms to evaluate whether their applications are secure or not. Although various previous works use data and control flow techniques to evaluate security features... Show More
Download Sample (PDF): Article
Cite Article

MLA

Jimenez, Lina M., et al. "Jif-Based Verification of Information Flow Policies for Android Apps." IJSSE vol.8, no.1 2017: pp.28-42. http://doi.org/10.4018/IJSSE.2017010102

APA

Jimenez, L. M., Ochoa, M., & Rueda, S. J. (2017). Jif-Based Verification of Information Flow Policies for Android Apps. International Journal of Secure Software Engineering (IJSSE), 8(1), 28-42. http://doi.org/10.4018/IJSSE.2017010102

Chicago

Jimenez, Lina M., Martin Ochoa, and Sandra J. Rueda. "Jif-Based Verification of Information Flow Policies for Android Apps," International Journal of Secure Software Engineering (IJSSE) 8, no.1: 28-42. http://doi.org/10.4018/IJSSE.2017010102

Export Reference

Mendeley
Published: Jan 1, 2017
DOI: 10.4018/IJSSE.2017010103
Volume 8
Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen
Security concerns are increasingly guiding both the design and processes of software-intensive product development. In certain environments, the development of the product requires special security... Show More
Download Sample (PDF): Article
Cite Article

MLA

Rindell, Kalle, et al. "Case Study of Agile Security Engineering: Building Identity Management for a Government Agency." IJSSE vol.8, no.1 2017: pp.43-57. http://doi.org/10.4018/IJSSE.2017010103

APA

Rindell, K., Hyrynsalmi, S., & Leppänen, V. (2017). Case Study of Agile Security Engineering: Building Identity Management for a Government Agency. International Journal of Secure Software Engineering (IJSSE), 8(1), 43-57. http://doi.org/10.4018/IJSSE.2017010103

Chicago

Rindell, Kalle, Sami Hyrynsalmi, and Ville Leppänen. "Case Study of Agile Security Engineering: Building Identity Management for a Government Agency," International Journal of Secure Software Engineering (IJSSE) 8, no.1: 43-57. http://doi.org/10.4018/IJSSE.2017010103

Export Reference

Mendeley
Volume 8
Editorial Preface
Martin Gilje Jaatun
Published: Apr 1, 2017
DOI: 10.4018/IJSSE.2017040101
Volume 8
Christos Kalloniatis, Argyri Pattakou, Evangelia Kavakli, Stefanos Gritzalis
Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Kalloniatis, Christos, et al. "Designing Secure and Privacy-Aware Information Systems." IJSSE vol.8, no.2 2017: pp.1-25. http://doi.org/10.4018/IJSSE.2017040101

APA

Kalloniatis, C., Pattakou, A., Kavakli, E., & Gritzalis, S. (2017). Designing Secure and Privacy-Aware Information Systems. International Journal of Secure Software Engineering (IJSSE), 8(2), 1-25. http://doi.org/10.4018/IJSSE.2017040101

Chicago

Kalloniatis, Christos, et al. "Designing Secure and Privacy-Aware Information Systems," International Journal of Secure Software Engineering (IJSSE) 8, no.2: 1-25. http://doi.org/10.4018/IJSSE.2017040101

Export Reference

Mendeley
Published: Apr 1, 2017
DOI: 10.4018/IJSSE.2017040102
Volume 8
Martin Boldt, Andreas Jacobsson, Dejan Baca, Bengt Carlsson
In this paper, a novel security-enhanced agile software development process, SEAP, is introduced. It has been designed, tested, and implemented at Ericsson AB, specifically in the development of a... Show More
Download Sample (PDF): Article
Cite Article

MLA

Boldt, Martin, et al. "Introducing a Novel Security-Enhanced Agile Software Development Process." IJSSE vol.8, no.2 2017: pp.26-52. http://doi.org/10.4018/IJSSE.2017040102

APA

Boldt, M., Jacobsson, A., Baca, D., & Carlsson, B. (2017). Introducing a Novel Security-Enhanced Agile Software Development Process. International Journal of Secure Software Engineering (IJSSE), 8(2), 26-52. http://doi.org/10.4018/IJSSE.2017040102

Chicago

Boldt, Martin, et al. "Introducing a Novel Security-Enhanced Agile Software Development Process," International Journal of Secure Software Engineering (IJSSE) 8, no.2: 26-52. http://doi.org/10.4018/IJSSE.2017040102

Export Reference

Mendeley
Published: Apr 1, 2017
DOI: 10.4018/IJSSE.2017040103
Volume 8
Liguo Yu, Yingmei Li, Srini Ramaswamy
Design patterns are reusable software design solutions to object-oriented programs. Since the initial introduction of the 23 well-known design patterns in 1995, more and more patterns have been... Show More
Download Sample (PDF): Article
Cite Article

MLA

Yu, Liguo, et al. "Design Patterns and Design Quality: Theoretical Analysis, Empirical Study, and User Experience." IJSSE vol.8, no.2 2017: pp.53-81. http://doi.org/10.4018/IJSSE.2017040103

APA

Yu, L., Li, Y., & Ramaswamy, S. (2017). Design Patterns and Design Quality: Theoretical Analysis, Empirical Study, and User Experience. International Journal of Secure Software Engineering (IJSSE), 8(2), 53-81. http://doi.org/10.4018/IJSSE.2017040103

Chicago

Yu, Liguo, Yingmei Li, and Srini Ramaswamy. "Design Patterns and Design Quality: Theoretical Analysis, Empirical Study, and User Experience," International Journal of Secure Software Engineering (IJSSE) 8, no.2: 53-81. http://doi.org/10.4018/IJSSE.2017040103

Export Reference

Mendeley
Volume 8
Editorial Preface
Martin Gilje Jaatun
Published: Jul 1, 2017
DOI: 10.4018/IJSSE.2017070101
Volume 8
Sofia Rei, Rui Abreu
From holding worldwide companies' information hostage to keeping several distributed systems down for hours, the last years were marked by several security attacks which are the result of complex... Show More
Download Sample (PDF): Article
Cite Article

MLA

Rei, Sofia, and Rui Abreu. "A Database of Existing Vulnerabilities to Enable Controlled Testing Studies." IJSSE vol.8, no.3 2017: pp.1-23. http://doi.org/10.4018/IJSSE.2017070101

APA

Rei, S. & Abreu, R. (2017). A Database of Existing Vulnerabilities to Enable Controlled Testing Studies. International Journal of Secure Software Engineering (IJSSE), 8(3), 1-23. http://doi.org/10.4018/IJSSE.2017070101

Chicago

Rei, Sofia, and Rui Abreu. "A Database of Existing Vulnerabilities to Enable Controlled Testing Studies," International Journal of Secure Software Engineering (IJSSE) 8, no.3: 1-23. http://doi.org/10.4018/IJSSE.2017070101

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSSE.2017070102
Volume 8
Chandan Kumar Behera, D. Lalitha Bhaskari
This article describes how code obfuscation techniques aim to conceal the functionality of a program by mystifying the code so that it is unreadable or in an incomprehensible format. Since the... Show More
Download Sample (PDF): Article
Cite Article

MLA

Behera, Chandan Kumar, and D. Lalitha Bhaskari. "Self-Modifying Code: A Provable Technique for Enhancing Program Obfuscation." IJSSE vol.8, no.3 2017: pp.24-41. http://doi.org/10.4018/IJSSE.2017070102

APA

Behera, C. K. & Bhaskari, D. L. (2017). Self-Modifying Code: A Provable Technique for Enhancing Program Obfuscation. International Journal of Secure Software Engineering (IJSSE), 8(3), 24-41. http://doi.org/10.4018/IJSSE.2017070102

Chicago

Behera, Chandan Kumar, and D. Lalitha Bhaskari. "Self-Modifying Code: A Provable Technique for Enhancing Program Obfuscation," International Journal of Secure Software Engineering (IJSSE) 8, no.3: 24-41. http://doi.org/10.4018/IJSSE.2017070102

Export Reference

Mendeley
Published: Jul 1, 2017
DOI: 10.4018/IJSSE.2017070103
Volume 8
Yijun Yu, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian-Far
This article describes how earlier detection of security problems and the implementation of solutions would be a cost-effective approach for developing secure software systems. Developing, gathering... Show More
Download Sample (PDF): Article
Cite Article

MLA

Yu, Yijun, et al. "Goal Modelling for Security Problem Matching and Pattern Enforcement." IJSSE vol.8, no.3 2017: pp.42-57. http://doi.org/10.4018/IJSSE.2017070103

APA

Yu, Y., Kaiya, H., Yoshioka, N., Hu, Z., Washizaki, H., Xiong, Y., & Hosseinian-Far, A. (2017). Goal Modelling for Security Problem Matching and Pattern Enforcement. International Journal of Secure Software Engineering (IJSSE), 8(3), 42-57. http://doi.org/10.4018/IJSSE.2017070103

Chicago

Yu, Yijun, et al. "Goal Modelling for Security Problem Matching and Pattern Enforcement," International Journal of Secure Software Engineering (IJSSE) 8, no.3: 42-57. http://doi.org/10.4018/IJSSE.2017070103

Export Reference

Mendeley
Volume 8
Editorial Preface
Martin Gilje Jaatun
Published: Oct 1, 2017
DOI: 10.4018/IJSSE.2017100101
Volume 8
Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Nils Brede Moe
When working with software security in a risk-centric way, development projects become equipped to make decisions on how much security to include and what type of security pays off. This article... Show More
Download Sample (PDF): Article
Cite Article

MLA

Tøndel, Inger Anne, et al. "Risk Centric Activities in Secure Software Development in Public Organisations." IJSSE vol.8, no.4 2017: pp.1-30. http://doi.org/10.4018/IJSSE.2017100101

APA

Tøndel, I. A., Jaatun, M. G., Cruzes, D. S., & Moe, N. B. (2017). Risk Centric Activities in Secure Software Development in Public Organisations. International Journal of Secure Software Engineering (IJSSE), 8(4), 1-30. http://doi.org/10.4018/IJSSE.2017100101

Chicago

Tøndel, Inger Anne, et al. "Risk Centric Activities in Secure Software Development in Public Organisations," International Journal of Secure Software Engineering (IJSSE) 8, no.4: 1-30. http://doi.org/10.4018/IJSSE.2017100101

Export Reference

Mendeley
Published: Oct 1, 2017
DOI: 10.4018/IJSSE.2017100102
Volume 8
Hossain Shahriar, Hisham Haddad, Pranahita Bulusu
Lightweight Directory Access Protocol (LDAP) is commonly used in web applications to provide lookup information and enforcing authentication. Web applications may suffer from LDAP injection... Show More
Download Sample (PDF): Article
Cite Article

MLA

Shahriar, Hossain, et al. "LDAP Vulnerability Detection in Web Applications." IJSSE vol.8, no.4 2017: pp.31-50. http://doi.org/10.4018/IJSSE.2017100102

APA

Shahriar, H., Haddad, H., & Bulusu, P. (2017). LDAP Vulnerability Detection in Web Applications. International Journal of Secure Software Engineering (IJSSE), 8(4), 31-50. http://doi.org/10.4018/IJSSE.2017100102

Chicago

Shahriar, Hossain, Hisham Haddad, and Pranahita Bulusu. "LDAP Vulnerability Detection in Web Applications," International Journal of Secure Software Engineering (IJSSE) 8, no.4: 31-50. http://doi.org/10.4018/IJSSE.2017100102

Export Reference

Mendeley
Published: Oct 1, 2017
DOI: 10.4018/IJSSE.2017100103
Volume 8
Sanjay Misra, Adewole Adewumi, Robertas Damasevicius, Rytis Maskeliunas
In order to maintain the quality of software, it is important to measure it complexity. This provides an insight into the degree of comprehensibility and maintainability of the software. Measurement... Show More
Download Sample (PDF): Article
Cite Article

MLA

Misra, Sanjay, et al. "Analysis of Existing Software Cognitive Complexity Measures." IJSSE vol.8, no.4 2017: pp.51-71. http://doi.org/10.4018/IJSSE.2017100103

APA

Misra, S., Adewumi, A., Damasevicius, R., & Maskeliunas, R. (2017). Analysis of Existing Software Cognitive Complexity Measures. International Journal of Secure Software Engineering (IJSSE), 8(4), 51-71. http://doi.org/10.4018/IJSSE.2017100103

Chicago

Misra, Sanjay, et al. "Analysis of Existing Software Cognitive Complexity Measures," International Journal of Secure Software Engineering (IJSSE) 8, no.4: 51-71. http://doi.org/10.4018/IJSSE.2017100103

Export Reference

Mendeley
IGI Global Open Access Collection

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface that can easily searched or integrated into library discovery systems. Browse IGI Global Open
Access Collection

Contact
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100