A review of information security issues and respective research contributions
MT Siponen, H Oinas-Kukkonen - ACM SIGMIS Database: the …, 2007 - dl.acm.org
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …
communication, security management, development of secure Information Systems), and …
[图书][B] Information Security Policies, Procedures, and Standards: guidelines for effective information security management
TR Peltier - 2016 - books.google.com
Providing the mechanics for policy, procedure, and standards development, Information
Security Policies, Procedures, and Standards: Guidelines for Effective Information Security …
Security Policies, Procedures, and Standards: Guidelines for Effective Information Security …
[PDF][PDF] Software engineering for secure software-state of the art: A survey
KR Jayaram, AP Mathur - Department of Computer Science …, 2005 - cerias.purdue.edu
This report contains a survey of the state of the art in software engineering for secure
software. Secure software is defined and techniques used in each phase of the software …
software. Secure software is defined and techniques used in each phase of the software …
Integrity self-check of secure code within a VM environment using native VM code
PA Robinson, S Pingel, J Brown, GP Sandhu - US Patent 8,707,050, 2014 - Google Patents
BACKGROUND In order to qualify for certain government standards, cryp tographic Software
must satisfy certain conditions. One Such condition, such as imposed by FIPS 140-2 (which …
must satisfy certain conditions. One Such condition, such as imposed by FIPS 140-2 (which …
Fuzzy game theory for web security
AQ Ansari, K Datta Gupta - Applications of Soft Computing for the Web, 2017 - Springer
Web security threat is an intricate and challenging problem. Researchers have been
working on the area of web security. However, the security threats related to web …
working on the area of web security. However, the security threats related to web …
Modeling the Non-functional Requirements in the Context of Usability, Performance, Safety and Security
M Sadiq - 2007 - diva-portal.org
Requirement engineering is the most significant part of the software development life cycle.
Until now great emphasis has been put on the maturity of the functional requirements. But …
Until now great emphasis has been put on the maturity of the functional requirements. But …
ACE: Anomalous Code Elimination Through Automatic Detection Within Source Code
M Stange - IEEE SoutheastCon, 2004. Proceedings., 2004 - ieeexplore.ieee.org
The ACE approach combines prior research techniques with new ones to eliminate
anomalous code from source code. The idea is as follows:(1) identify characteristics/patterns …
anomalous code from source code. The idea is as follows:(1) identify characteristics/patterns …
[图书][B] CORBA-based test architecture for e-commerce application.
W Li - 2000 - ruor.uottawa.ca
E-Commerce systems are specialized instances of distributed processing systems that
involve critical financial transactions. The Common Object Request Broker Architecture …
involve critical financial transactions. The Common Object Request Broker Architecture …
Semantics of authentication in workflow security
W Tang - HKU Theses Online (HKUTO), 2001 - hub.hku.hk
This thesis proposes a method to assure correctness of authentication in workflow. Workflow
is the enactment of procedures to achieve organizational goals. It is described in terms of …
is the enactment of procedures to achieve organizational goals. It is described in terms of …