Sciweavers

8623 search results - page 34 / 1725
» Software engineering for secure systems
Sort
View
ICSE
2012
IEEE-ACM
11 years 11 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
CSSE
2008
IEEE
14 years 3 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
ICSE
2008
IEEE-ACM
14 years 9 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
CISIS
2009
IEEE
14 years 3 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
AMAST
2008
Springer
13 years 11 months ago
Evolving Specification Engineering
Abstract. The motivation for this work is to support a natural separation of concerns during formal system development. In a developmentby-refinement context, we would like to be a...
Dusko Pavlovic, Peter Pepper, Douglas R. Smith