Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
: The industrialization of software development induces several changes to the development process as software development becomes distributed over company borders. They cooperativ...
Christoph Rathfelder, Henning Groenda, Ralf Reussn...
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...