UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

8 9 10 11
hits: 104
91.
  • Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial services
    Masood, Adnan 2013 IEEE International Conference on Technologies for Homeland Security (HST), 2013-Nov.
    Conference Proceeding

    Service oriented architecture is fast becoming ubiquitous enterprise software architecture standard in public and private sector alike. Study of literature and current attacks suggests that with the ...
Full text
92.
  • Extrapolating security requ... Extrapolating security requirements to an established software process: Version 1.0
    Haron, G. R.; Ng Kang Siong 2011 International Conference for Internet Technology and Secured Transactions, 2011-Dec.
    Conference Proceeding

    This paper presents the mechanisms on integrating security related activities to an established software process in an organization. The main challenge is to attain a security model that is fit to ...
Full text
93.
  • Improving prioritization of software weaknesses using security models with AVUS
    Renatus, Stephan; Bartelheimer, Corrie; Eichler, Jorn 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), 09/2015
    Conference Proceeding

    Testing tools for application security have become an integral part of secure development life-cycles. Despite their ability to spot important software weaknesses, the high number of findings require ...
Full text
94.
  • Chapter 8 - Conduct Securit... Chapter 8 - Conduct Security Awareness and Training
    Jason Andress; Mark Leary Building a Practical Information Security Program, 2017
    Book Chapter

    When conducting security awareness and training for our organization, it is very important that we partner well with all of the stakeholders involved. We need to target training for the intended ...
Full text
95.
  • Software Security
    Sametinger, Johannes 2013 20th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS), 2013-April
    Conference Proceeding

    The importance of IT security is out of doubt. Data, computer and network security are essential for any business or organization. Software security often remains out of focus, from an ...
Full text
96.
  • An Application Security Fra... An Application Security Framework for SOA-Based Mission Data Systems
    Fischer, D.; Sarkarati, M.; Spada, M. ... 2011 IEEE Fourth International Conference on Space Mission Challenges for Information Technology, 2011-Aug.
    Conference Proceeding

    ESA is developing, deploying, and operating a wide variety of mission data systems. These are mainly used for the command & control of spacecraft and the exploitation and dissemination of space-based ...
Full text
97.
  • Automated threat identification for UML
    Yee, George; Xie, Xingli; Majumdar, Shikharesh 2010 International Conference on Security and Cryptography (SECRYPT), 2010-July
    Conference Proceeding

    In tandem with the growing important roles of software in modern society is the increasing number of threats to software. Building software systems that are resistant to these threats is one of the ...
Full text
98.
Full text

PDF
99.
  • S2D-ProM: A Strategy Orient... S2D-ProM: A Strategy Oriented Process Model for Secure Software Development
    Essafi, M.; Labed, L.; Ben Ghezala, H. International Conference on Software Engineering Advances (ICSEA 2007), 2007-Aug.
    Conference Proceeding

    Building secure software is about taking security into account during all phases of software development. This practice is missing in, widely used, traditional developments due to domain immaturity, ...
Full text
100.
  • The Road to Hell is Paved w... The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development
    Sasson, R.; Jaatun, M.G.; Jensen, J. 2010 International Conference on Availability, Reliability and Security, 2010-Feb.
    Conference Proceeding
    Open access

    In this paper, we present the results of a security assessment performed on a home care system based on SOA, realized as web services. The security design concepts of this platform were specifically ...
Full text

PDF
8 9 10 11
hits: 104

Load filters