Sciweavers

3003 search results - page 98 / 601
» Software Security: Building Security In
Sort
View
ESSOS
2011
Springer
13 years 1 months ago
The Security Twin Peaks
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of thi...
Thomas Heyman, Koen Yskout, Riccardo Scandariato, ...
KBSE
2003
IEEE
14 years 3 months ago
Automation for Exception Freedom Proofs
Run-time errors are typically seen as unacceptable within safety and security critical software. The SPARK approach to the development of high integrity software addresses the pro...
Bill J. Ellis, Andrew Ireland
COMPSAC
2009
IEEE
14 years 4 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data fulï¬...
Rafael Accorsi
COMPSAC
2006
IEEE
14 years 1 months ago
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
This paper proposes an improved free-roaming mobile agent security protocol. The scheme uses "one hop backwards and two hops forwards" chain relation as the protocol cor...
Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Lu...
ESSOS
2009
Springer
14 years 4 months ago
Report: Measuring the Attack Surfaces of Enterprise Software
Abstract. Software vendors are increasingly concerned about mitigating the security risk of their software. Code quality improvement is a traditional approach to mitigate security ...
Pratyusa K. Manadhata, Yücel Karabulut, Jeann...