Human-centred cyber secure software engineering
K Renaud - Zeitschrift für Arbeitswissenschaft, 2023 - Springer
Software runs our modern day lives: our shopping, our transport and our medical devices.
Hence, no citizen can escape the consequences of poor software engineering. A closely …
Hence, no citizen can escape the consequences of poor software engineering. A closely …
S2D-Prom: A strategy oriented process model for secure software development
Building secure software is about taking security into account during all phases of software
development. This practice is missing in, widely used, traditional developments due to …
development. This practice is missing in, widely used, traditional developments due to …
Did you remember to test your tokens?
D Gonzalez, M Rath, M Mirakhorli - Proceedings of the 17th International …, 2020 - dl.acm.org
Authentication is a critical security feature for confirming the identity of a system's users,
typically implemented with help from frameworks like Spring Security. It is a complex feature …
typically implemented with help from frameworks like Spring Security. It is a complex feature …
ASASI: An environment for addressing software application security issues
Security is an emergent property of a software system. Several efforts are undertaken, to
improve software security. However, developers still miss or misuse acquired knowledge …
improve software security. However, developers still miss or misuse acquired knowledge …
[PDF][PDF] Embedding Security Monitors in Software Components
M Khan - 2014 - qspace.library.queensu.ca
Software can be made more secure by stipulating and integrating security specifications in
the development process. However, guaranteeing the correct implementation of these …
the development process. However, guaranteeing the correct implementation of these …
Innovative Strategies for Secure Software Development
This chapter discusses adoption of some proactive strategies in threat management for
security of software systems. Security requirements play an important role for secure …
security of software systems. Security requirements play an important role for secure …