-
1
-
-
47849118281
-
-
Common Criteria for Information Technology Security Evaluation ISO 15408, Part 3: Security assurance requirements, version 2.1D
-
"Common Criteria for Information Technology Security Evaluation (ISO 15408) - Part 3: Security assurance requirements - version 2.1D."
-
-
-
-
2
-
-
22944433043
-
Improving Security Across The Software Development Life Cycle
-
Task Force Report, April 1
-
"Improving Security Across The Software Development Life Cycle," Task Force Report, April 1, 2004.
-
(2004)
-
-
-
5
-
-
40249101754
-
The Security of Applications: Not AU Are Created Equal,
-
©Stake, February 2002, pp
-
A. Jaquith, "The Security of Applications: Not AU Are Created Equal," Research Report, ©Stake, February 2002, pp. 1-12.
-
Research Report
, pp. 1-12
-
-
Jaquith, A.1
-
6
-
-
1542292544
-
Why Software Is so Bad
-
July/August
-
C. Mann, "Why Software Is so Bad," Technology Review, July/August 2002.
-
(2002)
Technology Review
-
-
Mann, C.1
-
8
-
-
84954446528
-
Addressing Software Security and Mitigations in the Life Cycle
-
IEEE Computer Society
-
D. Gilliam, J. Powell, E. Haugh, M. Bishop, "Addressing Software Security and Mitigations in the Life Cycle," Proceedings of the 28th Annual NASA Goddard Software Engineering Workshop (SEW'03), IEEE Computer Society, 2003.
-
(2003)
Proceedings of the 28th Annual NASA Goddard Software Engineering Workshop (SEW'03)
-
-
Gilliam, D.1
Powell, J.2
Haugh, E.3
Bishop, M.4
-
9
-
-
84944391018
-
Software Security Checklist for the Software Life Cycle
-
D. P. Gilliam, T. L. Wolfe, J. S. Sherif, M. Bishop, "Software Security Checklist for the Software Life Cycle," Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'03), 2003.
-
(2003)
Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'03)
-
-
Gilliam, D.P.1
Wolfe, T.L.2
Sherif, J.S.3
Bishop, M.4
-
10
-
-
3042647673
-
Misuse and Abuse Cases: Getting Past the Positive
-
published by The, May/June
-
G. McGraw, "Misuse and Abuse Cases: Getting Past the Positive," published by The IEEE Computer Society, IEEE Security & Privacy, May/June 2004.
-
(2004)
IEEE Computer Society, IEEE Security & Privacy
-
-
McGraw, G.1
-
12
-
-
0032051310
-
Testing for Security During Development: Why We Should Scrap Penetrate-and-Patch
-
G., McGraw, "Testing for Security During Development: Why We Should Scrap Penetrate-and-Patch," IEEE Aerospace and Electronic Systems, vol. 13, no. 4, 1998, pp.13-15.
-
(1998)
IEEE Aerospace and Electronic Systems
, vol.13
, Issue.4
, pp. 13-15
-
-
McGraw, G.1
-
13
-
-
33748046212
-
Integrating a Security Requirement Language with UML
-
In the Proc. of the Seventh International Conference on UML Modeling Languages and Applications, Lisbon, Portugal, October
-
H. Abie, D. Aredo, T. Kristoffersen, S. Mazaher, T. Raguin, "Integrating a Security Requirement Language with UML," In the Proc. of the Seventh International Conference on UML Modeling Languages and Applications, LNCS 3273, Lisbon, Portugal, October 2004, pp. 350-364.
-
(2004)
LNCS
, vol.3273
, pp. 350-364
-
-
Abie, H.1
Aredo, D.2
Kristoffersen, T.3
Mazaher, S.4
Raguin, T.5
-
14
-
-
33747027872
-
Formalization of Navigation Strategies in a Map
-
Orlando
-
H. Ben Ghezala, I. Bayoudh, Y. Jamoussi, "Formalization of Navigation Strategies in a Map," 5th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, 2001.
-
(2001)
5th World Multiconference on Systemics, Cybernetics and Informatics
-
-
Ben Ghezala, H.1
Bayoudh, I.2
Jamoussi, Y.3
-
15
-
-
0038349200
-
MOPS: An Infrastructure for Examining Security Properties of Software
-
ACM, USA, November
-
H. Chen, D. Wagner, "MOPS: An Infrastructure for Examining Security Properties of Software," CCS'02, ACM, USA, November 2002.
-
(2002)
CCS'02
-
-
Chen, H.1
Wagner, D.2
-
16
-
-
2342577744
-
-
Addison Wesley, February 17
-
Hoglund, G., McGraw, G., "Exploiting Software How to Break Code," Addison Wesley, February 17, 2004.
-
(2004)
Exploiting Software How to Break Code
-
-
Hoglund, G.1
McGraw, G.2
-
20
-
-
84906976187
-
Secure Software Engineering Processes
-
July 24-27, Austin, Texas, USA
-
M. Essafi, H. Ben Ghezala, "Secure Software Engineering Processes," 3rd International Conference on Computing, Communications and Control Technologies (CCCT '05), July 24-27, 2005 - Austin, Texas, USA.
-
(2005)
3rd International Conference on Computing, Communications and Control Technologies (CCCT '05)
-
-
Essafi, M.1
Ben Ghezala, H.2
-
21
-
-
40249103357
-
Addressing Software Application Security Issues
-
Athens, Greece
-
M. Essafi, L. Labed, H. Ben Ghezala, "Addressing Software Application Security Issues," 10th WSEAS International Conference on COMPUTERS (CSCC'06), July 13-15, 2006 - Vouliagmeni, Athens, Greece.
-
10th WSEAS International Conference on COMPUTERS (CSCC'06), July 13-15, 2006 - Vouliagmeni
-
-
Essafi, M.1
Labed, L.2
Ben Ghezala, H.3
-
22
-
-
2342565140
-
-
O'Reilly, June
-
Mark, G., K., Graff, R., van Wyk, "Secure Coding: Principles & Practices," O'Reilly, June 2003.
-
(2003)
Secure Coding: Principles & Practices
-
-
Mark, G.K.1
Graff, R.2
van Wyk3
-
23
-
-
40249115056
-
Processes for Producing Secure Software
-
Published By The, May/June
-
N. Davis, W. Humpphery, T. Samuel, JR. Redwine, G. Zibulski, G. McGraw, "Processes for Producing Secure Software," Published By The IEEE Computer Society, IEEE Security & Privacy, May/June 2004.
-
(2004)
IEEE Computer Society, IEEE Security & Privacy
-
-
Davis, N.1
Humpphery, W.2
Samuel, T.3
Redwine, J.R.4
Zibulski, G.5
McGraw, G.6
-
26
-
-
33845877565
-
Identifying Attack Models for Secure Recommendation
-
January 9, San Diego, California, USA
-
R. Burke, B. Mobasher, R. Zabicki, R. Bhaumik, "Identifying Attack Models for Secure Recommendation," Workshop: Beyond Personalization, IUI'05, January 9, 2005, San Diego, California, USA.
-
(2005)
Workshop: Beyond Personalization, IUI'05
-
-
Burke, R.1
Mobasher, B.2
Zabicki, R.3
Bhaumik, R.4
-
28
-
-
33746974440
-
The verified software challenge: A call for a holistic approach to reliability
-
October
-
T. Ball, "The verified software challenge: A call for a holistic approach to reliability," In Verified Software: Theories, Tools, Experiments, October 2005.
-
(2005)
Verified Software: Theories, Tools, Experiments
-
-
Ball, T.1
-
30
-
-
47849083057
-
Penetration Testing in Information Security Essays
-
M. D. Abrams, S. Jajodia and H. Podell, Editors
-
Weissman, C, "Penetration Testing in Information Security Essays", M. D. Abrams, S. Jajodia and H. Podell, Editors, IEEE Computer Society Press. 1994.
-
(1994)
IEEE Computer Society Press
-
-
Weissman, C.1
-
31
-
-
17444368337
-
-
Barnum, S., McGraw, G., Knowledge for software security, Security & Privacy Magazine, IEEE, 3, Issue 2, pages 74-78, ISSN 1540-7993, March-April 2005.
-
Barnum, S., McGraw, G., "Knowledge for software security, Security & Privacy Magazine", IEEE, Volume 3, Issue 2, pages 74-78, ISSN 1540-7993, March-April 2005.
-
-
-
-
32
-
-
47849098100
-
-
Schneider, T., Secure Software Engineering Processes: Improving the Software Development Life Cycle to Combat Vulnerability, SQP 9, NO. 1, 2006, http://www.asq.org
-
Schneider, T., "Secure Software Engineering Processes: Improving the Software Development Life Cycle to Combat Vulnerability", SQP VOL. 9, NO. 1, 2006, http://www.asq.org
-
-
-
-
33
-
-
47849115981
-
-
M. Essafi, H. Ben Ghezala, Towards a Comprehensive View of Secure Software Engineering, submitted to the First International Workshop on Requirements, Intentions and Goals in Conceptual Modeling (RIGiM), Auckland, New Zealand, 5-7 November 2007, unpublished.
-
M. Essafi, H. Ben Ghezala, "Towards a Comprehensive View of Secure Software Engineering," submitted to the First International Workshop on Requirements, Intentions and Goals in Conceptual Modeling (RIGiM), Auckland, New Zealand, 5-7 November 2007, unpublished.
-
-
-
-
34
-
-
47849098378
-
-
G. McGraw, Software Security: Building Security In, Addison-Wesley, ISBN: 978-0-321-35670-3, 410 pages, 22/02/2006.
-
G. McGraw, Software Security: Building Security In, Addison-Wesley, ISBN: 978-0-321-35670-3, 410 pages, 22/02/2006.
-
-
-
|