Human-centred cyber secure software engineering

K Renaud - Zeitschrift für Arbeitswissenschaft, 2023 - Springer
Software runs our modern day lives: our shopping, our transport and our medical devices.
Hence, no citizen can escape the consequences of poor software engineering. A closely …

S2D-Prom: A strategy oriented process model for secure software development

M Essafi, L Labed, HB Ghezala - International Conference on …, 2007 - ieeexplore.ieee.org
Building secure software is about taking security into account during all phases of software
development. This practice is missing in, widely used, traditional developments due to …

Did you remember to test your tokens?

D Gonzalez, M Rath, M Mirakhorli - Proceedings of the 17th International …, 2020 - dl.acm.org
Authentication is a critical security feature for confirming the identity of a system's users,
typically implemented with help from frameworks like Spring Security. It is a complex feature …

ASASI: An environment for addressing software application security issues

M Essafi, L Labed, HB Ghezala - … International Conference on …, 2006 - ieeexplore.ieee.org
Security is an emergent property of a software system. Several efforts are undertaken, to
improve software security. However, developers still miss or misuse acquired knowledge …

[PDF][PDF] Embedding Security Monitors in Software Components

M Khan - 2014 - qspace.library.queensu.ca
Software can be made more secure by stipulating and integrating security specifications in
the development process. However, guaranteeing the correct implementation of these …

Innovative Strategies for Secure Software Development

P Bedi, V Gandotra, A Singhal - Designing, Engineering, and …, 2013 - igi-global.com
This chapter discusses adoption of some proactive strategies in threat management for
security of software systems. Security requirements play an important role for secure …