메뉴 건너뛰기




Volumn 7, Issue 4, 2009, Pages 84-87

Software assumptions lead to preventable errors

Author keywords

Assumptions; Building security in; Software development

Indexed keywords

ASSUMPTIONS; BUILDING SECURITY IN; CONTROL FLOWS; DATA ASSUMPTION; DEPLOYMENT TIME; DESIGN TIME; FUNCTIONAL SPECIFICATION; IN-LINE; INPUT AND OUTPUTS; RUNTIMES; SECURITY REQUIREMENTS; SIDE EFFECT; SOFTWARE DEVELOPMENT; SOURCE CODES;

EID: 70349312711     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.107     Document Type: Article
Times cited : (8)

References (3)
  • 1
    • 65249116275 scopus 로고    scopus 로고
    • The Real Cost of Software Errors
    • M. Zhivich and R.K. Cunningham, "The Real Cost of Software Errors," IEEE Security & Privacy, vol.7, no.2, 2009, pp. 87-90.
    • (2009) IEEE Security & Privacy , vol.7 , Issue.2 , pp. 87-90
    • Zhivich, M.1    Cunningham, K.R.2
  • 2
    • 34047226994 scopus 로고    scopus 로고
    • Assumptions 2. Management in Software Development
    • Carnegie Mellon Univ
    • G.A. Lewis et al., "Assumptions 2. Management in Software Development," Software Eng. Inst., Carnegie Mellon Univ., 2004; www.sei.cmu.edu/publications/documents/04.reports/04tn021.html.
    • (2004) Software Eng. Inst.
    • Lewis, G.A.1
  • 3
    • 0030092390 scopus 로고    scopus 로고
    • Check- 3. ing for Race Conditions in File Accesses
    • M. Bishop and M. Dilger, "Check- 3. ing for Race Conditions in File Accesses," Computing Systems, vol.9, no.2, 1996, pp. 131-152.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.