-
1
-
-
2342581753
-
From the Ground Up: The DIMACS Software Security Workshop
-
G. McGraw, "From the Ground Up: The DIMACS Software Security Workshop" in IEEE Security & Privacy, vol. 1, 2003, pp. 59-66.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 59-66
-
-
McGraw, G.1
-
2
-
-
0034269416
-
Attacking Malicious Code: A Report to the Infosec Research Council
-
G. McGraw and G. Morrisett, "Attacking Malicious Code: A Report to the Infosec Research Council," IEEE Software, vol. 17, pp. 33-41, 2000.
-
(2000)
IEEE Software
, vol.17
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
4
-
-
3042809894
-
Tangible ROI through Secure Software Engineering
-
K. Hoo, A. Saudbury, and A. Jaquith, "Tangible ROI through Secure Software Engineering," Secure Business Quarterly, vol. 1, pp. 1-3, 2001.
-
(2001)
Secure Business Quarterly
, vol.1
, pp. 1-3
-
-
Hoo, K.1
Saudbury, A.2
Jaquith, A.3
-
5
-
-
49049091235
-
-
A. Jaquith, The Security of Applications: Not All Are Created Equal, @Stake February 2002.
-
A. Jaquith, "The Security of Applications: Not All Are Created Equal," @Stake February 2002.
-
-
-
-
6
-
-
84931024051
-
Integrating security and usability into the requirements and design process
-
I. Flechais, C. Mascolo, and M. A. Sasse, "Integrating security and usability into the requirements and design process," International Journal of Electronic Security and Digital Forensics, vol. 1, pp. 12-26, 2007.
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, pp. 12-26
-
-
Flechais, I.1
Mascolo, C.2
Sasse, M.A.3
-
8
-
-
49049091047
-
-
K. M. Goertzel, T. Winograd, H. L. McKinley, P. Holley, and B. A. Hamilton, Security in the Software Lifecycle, Department of Homeland Security, Version 1.2 August 2006
-
K. M. Goertzel, T. Winograd, H. L. McKinley, P. Holley, and B. A. Hamilton, "Security in the Software Lifecycle," Department of Homeland Security, Version 1.2 August 2006.
-
-
-
-
9
-
-
49049107220
-
-
Information Assurance Technology Analysis Center and Data (IATAC) and Analysis Center for Software (DACS) July 31
-
K. M. Goertzel, T. Winograd, H. L. McKinley, L. Oh, M. Colon, T. McGibbon, E. Fedchak, and R. Vienneau, "Software Security Assurance," Information Assurance Technology Analysis Center and Data (IATAC) and Analysis Center for Software (DACS) July 31 2007.
-
(2007)
Software Security Assurance
-
-
Goertzel, K.M.1
Winograd, T.2
McKinley, H.L.3
Oh, L.4
Colon, M.5
McGibbon, T.6
Fedchak, E.7
Vienneau, R.8
-
11
-
-
3042694356
-
Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report
-
N. Davis, S. T. Redwine, G. Zibulski, G. McGraw, and W. Humphrey, "Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report," in IEEE Security & Privacy, vol. 2, 2004, pp. 18-25.
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 18-25
-
-
Davis, N.1
Redwine, S.T.2
Zibulski, G.3
McGraw, G.4
Humphrey, W.5
-
12
-
-
49049121125
-
Processes to produce Secure Software-Towards more Secure Software
-
National Cyber Security Task Force, March
-
National Cyber Security Task Force, "Processes to produce Secure Software-Towards more Secure Software," National Cyber Security Partnership March 2004.
-
(2004)
National Cyber Security Partnership
-
-
-
13
-
-
49049092246
-
Software Engineering for Secure Software-State of the Art: A Survey
-
September 19th
-
K. R. Jayaram and A. P. Mathur, "Software Engineering for Secure Software-State of the Art: A Survey," CERIAS and SERC SERC-TR-279, September 19th 2005.
-
(2005)
CERIAS and SERC SERC-TR-279
-
-
Jayaram, K.R.1
Mathur, A.P.2
-
14
-
-
19944367288
-
Secure information system development - a survey and comparison
-
R. Villarroel, E. Fernández-Medina, and M. Piattini, "Secure information system development - a survey and comparison," Computers & Security, vol. 24, pp. 308-321, 2005.
-
(2005)
Computers & Security
, vol.24
, pp. 308-321
-
-
Villarroel, R.1
Fernández-Medina, E.2
Piattini, M.3
-
17
-
-
0242655790
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
presented at the, Dresden, Germany
-
T. Lodderstedt, D. A. Basin, and J. Doser, "SecureUML: A UML-Based Modeling Language for Model-Driven Security," presented at the 5th International Conference on the Unified Modeling Langugage, Dresden, Germany, 2002.
-
(2002)
5th International Conference on the Unified Modeling Langugage
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
18
-
-
49049097771
-
A UML profile for the identification and analysis of security risks during structured brainstorming
-
May
-
M. S. Lund, F. d. Braber, K. Stølen, and F. Vraalsen, "A UML profile for the identification and analysis of security risks during structured brainstorming," SINTEF ICT STF40 A03067, May 2004,
-
(2004)
SINTEF ICT
-
-
Lund, M.S.1
Braber, F.D.2
Stølen, K.3
Vraalsen, F.4
-
20
-
-
24344438696
-
Secure Software Development by Example
-
A. Apvrille and M. Pourzandi, "Secure Software Development by Example," in IEEE Security & Privacy, vol. 3, 2005, pp. 10-17.
-
(2005)
IEEE Security & Privacy
, vol.3
, pp. 10-17
-
-
Apvrille, A.1
Pourzandi, M.2
-
21
-
-
49049093094
-
Developing Secure Software
-
N. Davis, "Developing Secure Software," The DoD Software Tech News, vol. 8, pp. 3-7, 2005.
-
(2005)
The DoD Software Tech News
, vol.8
, pp. 3-7
-
-
Davis, N.1
-
23
-
-
0346236349
-
-
Art and Science: Addison Wesley Professional
-
M. Bishop., Computer Security: Art and Science: Addison Wesley Professional, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
26
-
-
49049089840
-
-
D. M. Kienzle, M. C. Elder, D. Tyree, and J. Edwards-Hewitt, Security Patterns Repository Version 1.0, 2002
-
D. M. Kienzle, M. C. Elder, D. Tyree, and J. Edwards-Hewitt, "Security Patterns Repository Version 1.0," 2002.
-
-
-
-
28
-
-
33750050331
-
-
Wiley
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating Security and Systems Engineering: Wiley 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
29
-
-
49049086154
-
-
B. Blakley, C. Heath, and TheOpenGroup, Security Design Patterns (SDP) technical guide, accessed 1.10.2007, [Online], Ed.: http://www.opengroup.org/security, 2004.
-
B. Blakley, C. Heath, and TheOpenGroup, "Security Design Patterns (SDP) technical guide," vol. accessed 1.10.2007, [Online], Ed.: http://www.opengroup.org/security, 2004.
-
-
-
-
30
-
-
35048840247
-
Information Security Antipatterns in Software Requirements Engineering
-
presented at the
-
M. Kis, "Information Security Antipatterns in Software Requirements Engineering," presented at the 9th Conference on Pattern Language of Programs 2002 (PLoP2 2002), 2002.
-
(2002)
9th Conference on Pattern Language of Programs 2002 (PLoP2
-
-
Kis, M.1
-
32
-
-
0002670359
-
Attack Trees - Modeling security threats
-
B. Schneier, "Attack Trees - Modeling security threats," Dr. Dobb's Journal, 2001.
-
(2001)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
34
-
-
49049114810
-
-
B. K. Jayaswal and P. C. Pattern, Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software: Prentice Hall 2006.
-
B. K. Jayaswal and P. C. Pattern, Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software: Prentice Hall 2006.
-
-
-
-
35
-
-
4544364572
-
-
Microsoft Corporation
-
J. D. Meier, A. Mackman, M. Dunner, S. Vasireddy, R. Escamilla, and A. Murukan, Improving Web Application Security: Threats and Countermeasures: Microsoft Corporation, 2003.
-
(2003)
Improving Web Application Security: Threats and Countermeasures
-
-
Meier, J.D.1
Mackman, A.2
Dunner, M.3
Vasireddy, S.4
Escamilla, R.5
Murukan, A.6
-
39
-
-
49049090641
-
The Science of Software Development
-
S. Campbell, "The Science of Software Development," in The Code Project, 2004.
-
(2004)
The Code Project
-
-
Campbell, S.1
-
40
-
-
33750490069
-
-
Prentice Hall
-
C. Steel, R. Nagappan, and R. Lai, Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management: Prentice Hall, 2005.
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
|