Sciweavers

276 search results - page 4 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
COMPUTER
2000
55views more  COMPUTER 2000»
13 years 7 months ago
A Staged Model for the Software Life Cycle
Václav Rajlich, Keith H. Bennett
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
13 years 9 months ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
14 years 1 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen