Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

10 11 12 13
hits: 122
111.
  • Automated threat identification for UML
    Yee, George; Xie, Xingli; Majumdar, Shikharesh 2010 International Conference on Security and Cryptography (SECRYPT), 2010-July
    Conference Proceeding

    In tandem with the growing important roles of software in modern society is the increasing number of threats to software. Building software systems that are resistant to these threats is one of the ...
Full text
Available for: IJS, NUK, UL, UM
112.
  • SecSDM: A Model for Integra... SecSDM: A Model for Integrating Security into the Software Development Life Cycle
    Futcher, Lynn; von Solms, Rossouw Fifth World Conference on Information Security Education
    Book Chapter
    Open access

    Most traditional software development methodologies do not explicitly include a standardised method for incorporating information security into their life cycles. It is argued that security ...
Full text

PDF
113.
  • Guidelines for secure softw... Guidelines for secure software development
    Futcher, Lynn; von Solms, Rossouw Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, 10/2008
    Conference Proceeding

    It is within highly integrated technology environments that information security is becoming a focal point for designing, developing and deploying software applications. Ensuring a high level of ...
Full text
Available for: NUK, UL
114.
Full text

PDF
115.
  • S2D-ProM: A Strategy Orient... S2D-ProM: A Strategy Oriented Process Model for Secure Software Development
    Essafi, M.; Labed, L.; Ben Ghezala, H. International Conference on Software Engineering Advances (ICSEA 2007), 2007-Aug.
    Conference Proceeding

    Building secure software is about taking security into account during all phases of software development. This practice is missing in, widely used, traditional developments due to domain immaturity, ...
Full text
Available for: IJS, NUK, UL, UM
116.
  • The Road to Hell is Paved w... The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development
    Sasson, R.; Jaatun, M.G.; Jensen, J. 2010 International Conference on Availability, Reliability and Security, 2010-Feb.
    Conference Proceeding
    Open access

    In this paper, we present the results of a security assessment performed on a home care system based on SOA, realized as web services. The security design concepts of this platform were specifically ...
Full text
Available for: IJS, NUK, UL, UM

PDF
117.
  • Contracting over the qualit... Contracting over the quality aspect of security in software product markets
    Raman, Jari Conference on Computer and Communications Security: Proceedings of the 2nd ACM workshop on Quality of protection; 30-30 Oct. 2006, 10/2006
    Conference Proceeding

    Secure software development has gained momentum during the past couple of years and improvements have been made. Buyers have started to demand secure software and contractual practices for taking ...
Full text
Available for: NUK, UL
118.
  • Incorporating Software Secu... Incorporating Software Security into an Undergraduate Software Engineering Course
    Lester, Cynthia Y.; Jamerson, Frank 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009-June
    Conference Proceeding

    Secure software development has become a topic of increasing importance, as a general fear rises due to security holes, vulnerabilities, and attacks. To ensure the security of information in a ...
Full text
Available for: IJS, NUK, UL, UM
119.
  • Securing analysis patterns Securing analysis patterns
    Fernandez, Eduardo B.; Yuan, Xiaohong ACM Southeast Regional Conference: Proceedings of the 45th annual southeast regional conference; 23-24 Mar. 2007, 03/2007
    Conference Proceeding

    One of the latest ways to improve software security is based on the use of security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build ...
Full text
Available for: NUK, UL
120.
  • Driving Secure Software Dev... Driving Secure Software Development Experience in a Diverse Product Environment
    Fichtinger, Barbara; Paulisch, Frances; Panholzer, Peter IEEE security & privacy, 2012-March-April, 2012-03-00, Volume: 10, Issue: 2
    Magazine Article

    Siemens' central security team drives secure software development across a diverse product portfolio. From factory automation to wind turbines, Siemens builds security in by activities including ...
Full text
Available for: IJS, NUK, UL
10 11 12 13
hits: 122

Load filters