Sciweavers

3003 search results - page 19 / 601
» Software Security: Building Security In
Sort
View
IEEEARES
2007
IEEE
14 years 1 months ago
Secure Software Development through Coding Conventions and Frameworks
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Takao Okubo, Hidehiko Tanaka
IEEEARES
2009
IEEE
14 years 2 months ago
An Architectural Foundation for Security Model Sharing and Reuse
Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. Th...
Per Håkon Meland, Shanai Ardi, Jostein Jense...
CAINE
2003
13 years 9 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 22 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
14 years 1 months ago
Security Conscious Web Service Composition with Semantic Web Support
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web ...
Barbara Carminati, Elena Ferrari, Ryan Bishop, Pat...