A review of information security issues and respective research contributions

MT Siponen, H Oinas-Kukkonen - ACM SIGMIS Database: the …, 2007 - dl.acm.org
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …

[图书][B] Information Security Policies, Procedures, and Standards: guidelines for effective information security management

TR Peltier - 2016 - books.google.com
Providing the mechanics for policy, procedure, and standards development, Information
Security Policies, Procedures, and Standards: Guidelines for Effective Information Security …

[PDF][PDF] Software engineering for secure software-state of the art: A survey

KR Jayaram, AP Mathur - Department of Computer Science …, 2005 - cerias.purdue.edu
This report contains a survey of the state of the art in software engineering for secure
software. Secure software is defined and techniques used in each phase of the software …

Integrity self-check of secure code within a VM environment using native VM code

PA Robinson, S Pingel, J Brown, GP Sandhu - US Patent 8,707,050, 2014 - Google Patents
BACKGROUND In order to qualify for certain government standards, cryp tographic Software
must satisfy certain conditions. One Such condition, such as imposed by FIPS 140-2 (which …

Fuzzy game theory for web security

AQ Ansari, K Datta Gupta - Applications of Soft Computing for the Web, 2017 - Springer
Web security threat is an intricate and challenging problem. Researchers have been
working on the area of web security. However, the security threats related to web …

Modeling the Non-functional Requirements in the Context of Usability, Performance, Safety and Security

M Sadiq - 2007 - diva-portal.org
Requirement engineering is the most significant part of the software development life cycle.
Until now great emphasis has been put on the maturity of the functional requirements. But …

ACE: Anomalous Code Elimination Through Automatic Detection Within Source Code

M Stange - IEEE SoutheastCon, 2004. Proceedings., 2004 - ieeexplore.ieee.org
The ACE approach combines prior research techniques with new ones to eliminate
anomalous code from source code. The idea is as follows:(1) identify characteristics/patterns …

[图书][B] CORBA-based test architecture for e-commerce application.

W Li - 2000 - ruor.uottawa.ca
E-Commerce systems are specialized instances of distributed processing systems that
involve critical financial transactions. The Common Object Request Broker Architecture …

Semantics of authentication in workflow security

W Tang - HKU Theses Online (HKUTO), 2001 - hub.hku.hk
This thesis proposes a method to assure correctness of authentication in workflow. Workflow
is the enactment of procedures to achieve organizational goals. It is described in terms of …

[引用][C] An architectural approach to achieving higher-level security for component (service) based software systems

A Vorobiev - 2008 - Swinburne University of Technology …