Sciweavers

3003 search results - page 11 / 601
» Software Security: Building Security In
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Abuse-Case-Based Assurance Arguments
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...
John P. McDermott
IEEEARES
2010
IEEE
14 years 2 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
COMPSAC
2010
IEEE
13 years 5 months ago
Challenges and Future Directions of Software Technology: Secure Software Development
Developing large scale software systems has major security challenges. This paper describes the issues involved and then addresses two topics: formal methods for emerging secure sy...
Bhavani M. Thuraisingham, Kevin W. Hamlen
CCS
2008
ACM
13 years 8 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
CCS
2007
ACM
14 years 1 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola