메뉴 건너뛰기




Volumn 21, Issue 3, 2002, Pages 229-238

On bricks and walls: Why building secure software is hard

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER NETWORKS; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; DATA PRIVACY; ELECTRONIC COMMERCE; INTERFACES (COMPUTER); INTERNET; PERSONAL COMPUTERS; RISK ASSESSMENT; RISK MANAGEMENT;

EID: 0036273351     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(02)00305-X     Document Type: Note
Times cited : (10)

References (13)
  • 7
    • 0003416497 scopus 로고    scopus 로고
    • Securing Java: Getting down to business with mobile code
    • John Wiley & Sons. New York, NY, 1999
    • (1999)
    • McGraw, G.1    Felten, E.2
  • 9
    • 0003714340 scopus 로고    scopus 로고
    • Schneider, F. (ed.); National Academy Press. Washington, DC
    • (1998) Trust in Cyberspace
  • 13
    • 84963808166 scopus 로고    scopus 로고
    • A case study in detecting security vulnerabilities using constraint optimization
    • Venice, Italy
    • (2001) SCAM
    • Weber, M.1    Shah, V.2    Ren, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.