UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 104
21.
  • An Ontology for Security Patterns
    Vale, Anelis Pereira; Fernandez, Eduardo B. 2019 38th International Conference of the Chilean Computer Science Society (SCCC), 2019-Nov.
    Conference Proceeding

    Security is a fundamental requirement that we must keep in mind when developing a system. We approach the secure construction of software through the use of security patterns, as a way to mitigate ...
Full text
22.
  • An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective
    Aljedaani, Bakheet; Ahmad, Aakash; Zahedi, Mansooreh ... 2020 27th Asia-Pacific Software Engineering Conference (APSEC), 2020-Dec.
    Conference Proceeding
    Open access

    Mobile apps exploit embedded sensors and wireless connectivity of a device to empower users with portable computations, context-aware communication, and enhanced interaction. Specifically, mobile ...
Full text

PDF
23.
Full text

PDF
24.
  • CIA-level driven secure SDL... CIA-level driven secure SDLC framework for integrating security into SDLC process
    Kang, Sooyoung; Kim, Seungjoo Journal of ambient intelligence and humanized computing, 10/2022, Volume: 13, Issue: 10
    Journal Article
    Peer reviewed

    From the early 1970s, the U.S. government began to recognize that simple penetration testing could not assure the security quality of products. The results of penetration testing such as identified ...
Full text
25.
  • Software Development Initia... Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies
    Silva, Paulina; Noël, René; Matalonga, Santiago ... CLEI electronic journal, 12/2016, Volume: 19, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most ...
Full text

PDF
26.
  • Abstract security patterns ... Abstract security patterns and the design of secure systems
    Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori ... Cybersecurity (Singapore), 04/2022, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software realizations. Security constraints should be introduced ...
Full text
27.
  • Security Thinking in Online Freelance Software Development
    Rauf, Irum; Petre, Marian; Tun, Thein ... 2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)
    Conference Proceeding
    Open access

    Online freelance software development (OFSD) is a significant part of the software industry and is a thriving online economy; a recent survey by Stack Overflow reported that nearly 15% of developers ...
Full text
28.
Full text
29.
  • ABET Cybersecurity Continual Course Improvements for Secure Software Development
    Schmeelk, Suzanna E.; Dragos, Denise M.; DeBello, Joan E. 2021 IEEE Frontiers in Education Conference (FIE), 2021-Oct.-13
    Conference Proceeding

    This is an innovative practice full paper. The need to develop software securely cannot be over-emphasized. The changing legal and regulatory international and local landscape for software ...
Full text
30.
  • Applying Software Assurance... Applying Software Assurance and Cybersecurity NICE Job Tasks through Secure Software Engineering Labs
    Dawson, Maurice; Taveras, Pedro; Taylor, Danielle Procedia computer science, 2019, 2019-00-00, Volume: 164
    Journal Article
    Peer reviewed
    Open access

    To meet growing demands in the United States market for cybersecurity professionals, the National Security Agency and Department of Homeland Security have jointly established the National Center for ...
Full text

PDF
1 2 3 4 5
hits: 104

Load filters