Security patterns: A systematic map** study

AJ Jafari, A Rasoolzadegan - Journal of Computer Languages, 2020 - Elsevier
Security patterns are a well-established means to encapsulate and communicate proven
security solutions and introduce security into the development process. Our objective is to …

Systematic literature review of security pattern research

H Washizaki, T **a, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Securing a deployment pipeline

L Bass, R Holz, P Rimba, AB Tran… - 2015 IEEE/ACM 3rd …, 2015 - ieeexplore.ieee.org
At the RELENG 2014 Q&A, the question was asked,“What is your greatest concern?” and the
response was “someone subverting our deployment pipeline”. That is the motivation for this …

Vulnerabilities in continuous delivery pipelines? a case study

C Paule, TF Düllmann… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
More and more companies are in the process of adopting modern continuous software
development practices and approaches like continuous integration (CI), continuous delivery …

[HTML][HTML] P2ISE: preserving project integrity in CI/CD based on secure elements

A Muñoz, A Farao, JRC Correia, C Xenakis - Information, 2021 - mdpi.com
During the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …

Building deployment pipelines for a production computing service using live pipeline templates

MR Frank, IA Mosher, FWB Jodoin… - US Patent …, 2019 - Google Patents
Techniques are presented for managing a deployment pipe line using an inheritable and
extensible source code tem plate generally referred to as a live pipeline template (LPT). As …

Security support in continuous deployment pipeline

F Ullah, AJ Raft, M Shahin, M Zahedi… - arxiv preprint arxiv …, 2017 - arxiv.org
Continuous Deployment (CD) has emerged as a new practice in the software industry to
continuously and automatically deploy software changes into production. Continuous …

Matching and enforcing deployment pipeline configurations with live pipeline templates

MR Frank, IA Mosher, FWB Jodoin… - US Patent …, 2019 - Google Patents
Techniques are presented for managing a deployment pipe line using an inheritable and
extensible source code tem plate—generally referred to as a live pipeline template (LPT). As …

[PDF][PDF] Security for Devops deployment processes: Defenses, risks, research directions

N Wilde, B Eddy, K Patel, N Cooper… - International Journal of …, 2016 - academia.edu
DevOps is an emerging collection of software management practices intended to shorten
time to market for new software features and to reduce the risk of costly deployment errors. In …

ICITPM: integrity validation of software in iterative continuous integration through the use of Trusted Platform Module (TPM)

A Muñoz, A Farao, JRC Correia, C Xenakis - … Security: ESORICS 2020 …, 2020 - Springer
Software development has passed from being rigid and not very flexible, to be automated
with constant changes. This happens due to the creation of continuous integration and …