-
1
-
-
70449639903
-
Global report on soa/web services security initiatives
-
G. Trub and L. Olski, "Global report on soa/web services security initiatives," GMG Insights, Tech. Rep., 2008.
-
(2008)
GMG Insights, Tech. Rep.
-
-
Trub, G.1
Olski, L.2
-
2
-
-
47749117614
-
Soa and web services: New technologies, new standards - New attacks
-
Halle(Saale), Germany
-
N. Gruschka, M. Jensen, R. Herkenhöner, and N. Luttenberger, "Soa and web services: New technologies, new standards - new attacks," in Proceedings of the 5th IEEE European Conference on Web Services (ECOWS), Halle(Saale), Germany, 2007.
-
(2007)
Proceedings of the 5th IEEE European Conference on Web Services (ECOWS)
-
-
Gruschka, N.1
Jensen, M.2
Herkenhöner, R.3
Luttenberger, N.4
-
3
-
-
59449108823
-
-
National Institute of Standards and Technology. [Online]. Available: http://nvd.nist.gov/
-
National Institute of Standards and Technology, "National vulnerability database," http://nvd.nist.gov/, 2009. [Online]. Available: http://nvd.nist.gov/
-
(2009)
National Vulnerability Database
-
-
-
4
-
-
84871961892
-
-
Open Security Foundation (OSF) . [Online]. Available: http://osvdb.org
-
Open Security Foundation (OSF), "Open Source Vulnerability Database (OSVDB)," http://osvdb.org, 2009. [Online]. Available: http://osvdb.org
-
(2009)
Open Source Vulnerability Database (OSVDB)
-
-
-
5
-
-
70449646408
-
-
[Online]. Available
-
SecurityFocus, "Securityfocus vulnerability database," 2009. [Online]. Available: http://www.securityfocus.com/vulnerabilities
-
(2009)
Securityfocus Vulnerability Database
-
-
-
6
-
-
70449672552
-
-
[Online]. Available: http://www.sans.org/top20/
-
SANS, "Sans top 20 security risks," http://www.sans.org/top20/, 2007. [Online]. Available: http://www.sans.org/top20/
-
(2007)
Sans Top 20 Security Risks
-
-
-
7
-
-
70449685977
-
-
MITRE Corporation. [Online]. Available: http://measurablesecurity.mitre. org/
-
MITRE Corporation, "Making security measurable," http://measurablesecurity.mitre.org/, 2009. [Online]. Available: http://measurablesecurity.mitre.org/
-
(2009)
Making Security Measurable
-
-
-
8
-
-
70449635321
-
-
The OWASP Foundation. [Online]. Available: http://www.owasp.org/
-
The OWASP Foundation, "Open web application security project (owasp)," http://www.owasp.org/, 2009. [Online]. Available: http://www.owasp.org/
-
(2009)
Open Web Application Security Project (Owasp)
-
-
-
9
-
-
70449629149
-
-
Web Application Security Consortium, [Online]. Available
-
Web Application Security Consortium, "Web application security consortium threat classification," 2009. [Online]. Available: http://www.webappsec.org/projects/threat/
-
(2009)
Web Application Security Consortium Threat Classification
-
-
-
10
-
-
66249106228
-
Symantec global internet security threat report: Trends for july to december 2007
-
D. Turner, M. Fossi, E. Johnson, T. Mack, J. Blackbird, S. Entwisle, M. K. Low, D. McKinney, and C. Wueest, "Symantec global internet security threat report: Trends for july to december 2007," Symantec, Tech. Rep., 2008.
-
(2008)
Symantec, Tech. Rep.
-
-
Turner, D.1
Fossi, M.2
Johnson, E.3
MacK, T.4
Blackbird, J.5
Entwisle, S.6
Low, M.K.7
McKinney, D.8
Wueest, C.9
-
12
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner, "Detecting format string vulnerabilities with type qualifiers," in In Proceedings of the 10th USENIX Security Symposium, 2001, pp. 201-220.
-
Proceedings of the 10th USENIX Security Symposium
, vol.2001
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
13
-
-
10944267118
-
Static analysis for security
-
B. Chess and G. McGraw, "Static analysis for security," IEEE Security and Privacy, vol.Nov/Dec, pp. 32-35, 2004.
-
(2004)
IEEE Security and Privacy
, vol.NOV AND DEC
, pp. 32-35
-
-
Chess, B.1
McGraw, G.2
-
14
-
-
31744432699
-
Finding application errors and security flaws using pql: A program query language
-
San Diego, California, USA
-
M. Martin, B. Livshits, and M. S. Lam, "Finding application errors and security flaws using pql: a program query language," in 20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), San Diego, California, USA, 2005.
-
(2005)
20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
18
-
-
70449637425
-
-
[Online]. Available
-
A. Arsanjani, L.-J. Zhang, M. Ellis, A. Allam, and K. Channabasavaiah, "Ibm developer works: Design an soa solution using a reference architecture," 2007. [Online]. Available: http://www.ibm.com/ developerworks/architecture/library/ar-archtemp/index.html?S TACT=105AGX20&SCMP=EDU
-
(2007)
IBM Developer Works: Design an Soa Solution using a Reference Architecture
-
-
Arsanjani, A.1
Zhang, L.-J.2
Ellis, M.3
Allam, A.4
Channabasavaiah, K.5
-
19
-
-
34547322724
-
Software vulnerability analysis for web services software systems
-
W. D. Yu, D. Aravind, and P. Supthaweesuk, "Software vulnerability analysis for web services software systems," in Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC), 2006, pp. 740- 748.
-
(2006)
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC)
, pp. 740-748
-
-
Yu, W.D.1
Aravind, D.2
Supthaweesuk, P.3
-
20
-
-
0003513832
-
-
technical report nbsir 76-1041, ICET, National Bureau of Standards, Washington, DC 20234, Tech. Rep.
-
R. Abbott, J. Chin, J. Donnelley, W. Konigsford, S. Tokubo, and D. Webb, "Security analysis and enhancements of computer operating systems. technical report nbsir 76-1041," ICET, National Bureau of Standards, Washington, DC 20234, Tech. Rep., 1976.
-
(1976)
Security Analysis and Enhancements of Computer Operating Systems
-
-
Abbott, R.1
Chin, J.2
Donnelley, J.3
Konigsford, W.4
Tokubo, S.5
Webb, D.6
-
21
-
-
2442605789
-
-
technical report isi/sr-78-13, University of Southern California Information Sciences Institute, Marina Del Rey, CA, Tech. Rep.
-
R. Bisbey II and D. Hollingworth, "Protection analysis: Final report. technical report isi/sr-78-13," University of Southern California Information Sciences Institute, Marina Del Rey, CA, Tech. Rep., 1978.
-
(1978)
Protection Analysis: Final Report
-
-
Bisbey II, R.1
Hollingworth, D.2
-
22
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C. Landwehr, A. Bull, J. McDermott, and W. Choi, "A taxonomy of computer program security flaws," Computing Surveys 26, vol.3, pp. 211-254, 1994.
-
(1994)
Computing Surveys 26
, vol.3
, pp. 211-254
-
-
Landwehr, C.1
Bull, A.2
McDermott, J.3
Choi, W.4
-
23
-
-
2442463532
-
Use of a taxonomy of security faults
-
T. Aslam, I. Krsul, and E. H. Spafford, "Use of a taxonomy of security faults," in Proceedings of the 19th National Information Systems Security Conference, pp. 551-560, 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, pp. 551-560
-
-
Aslam, T.1
Krsul, I.2
Spafford, E.H.3
-
25
-
-
30344442772
-
Seven pernicious kingdoms: A taxonomy of software security errors
-
K. Tsipenyuk, B. Chess, and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," IEEE Security and Privacy, vol.3, no.6, pp. 81-84, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 81-84
-
-
Tsipenyuk, K.1
Chess, B.2
McGraw, G.3
-
28
-
-
70449651912
-
-
Forum Of Incident Response And Security Teams (FIRST), [Online]. Available
-
Forum Of Incident Response And Security Teams (FIRST), "Common vulnerability scoring system 2.0," 2007. [Online]. Available: http://www.first.org/cvss
-
(2007)
Common Vulnerability Scoring System 2.0
-
-
-
29
-
-
70350545677
-
Classification of component vulnerabilities in Java service oriented programming (SOP) platforms
-
ser. LNCS. Springer, October
-
P. Parrend and S. Frénot, "Classification of component vulnerabilities in Java service oriented programming (SOP) platforms," in Conference on Component-based Software Engineering (CBSE'2008), ser. LNCS, vol.5282/2008. Springer, October 2008.
-
(2008)
Conference on Component-based Software Engineering (CBSE'2008)
, vol.5282
, Issue.2008
-
-
Parrend, P.1
Frénot, S.2
-
30
-
-
36348977135
-
-
MITRE Corporation. [Online]. Available: http://cwe.mitre.org/
-
MITRE Corporation, "Common weakness enumeration," http://cwe.mitre.org, 2009. [Online]. Available: http://cwe.mitre.org/
-
(2009)
Common Weakness Enumeration
-
-
-
32
-
-
70449646402
-
A vulnerability taxonomy methodology applied to web services
-
Helger Lipmaa, Dieter Gollman, Ed.
-
C. V. Berghe, J. Riordan, and F. Piessens, "A vulnerability taxonomy methodology applied to web services," in Proceedings of the 10th Nordic Workshop on Secure IT Systems (NordSec), Helger Lipmaa, Dieter Gollman, Ed., 2005.
-
(2005)
Proceedings of the 10th Nordic Workshop on Secure IT Systems (NordSec)
-
-
Berghe, C.V.1
Riordan, J.2
Piessens, F.3
-
33
-
-
46849093205
-
A stateful web service firewall for BPEL
-
N. Gruschka, M. Jensen, and N. Luttenberger, "A Stateful Web Service Firewall for BPEL," in Proceedings of the International Conference on Web Services (ICWS), 2007, pp. 142-149.
-
(2007)
Proceedings of the International Conference on Web Services (ICWS)
, pp. 142-149
-
-
Gruschka, N.1
Jensen, M.2
Luttenberger, N.3
-
34
-
-
69949159983
-
-
MITRE Corporation. [Online]. Available: http://capec.mitre.org/
-
MITRE Corporation, "Common Attack Pattern Enumeration and Classification (CAPEC)," http://capec.mitre.org/, 2009. [Online]. Available: http://capec.mitre.org/
-
(2009)
Common Attack Pattern Enumeration and Classification (CAPEC)
-
-
-
37
-
-
57849117582
-
Compliance monitor for early warning risk determination
-
October
-
R. Accorsi, Y. Sato, and S. Kai, "Compliance monitor for early warning risk determination," Wirtschaftsinformatik, vol.50, no.5, October 2008.
-
(2008)
Wirtschaftsinformatik
, vol.50
, Issue.5
-
-
Accorsi, R.1
Sato, Y.2
Kai, S.3
-
38
-
-
84883001875
-
Detective information flow analysis for business processes
-
ser. LNI. GI
-
R. Accorsi and C. Wonnemann, "Detective information flow analysis for business processes," in Business Processes, Services Computing and Intelligent Service Management, ser. LNI, vol.147. GI, 2009, pp. 223-224.
-
(2009)
Business Processes, Services Computing and Intelligent Service Management
, vol.147
, pp. 223-224
-
-
Accorsi, R.1
Wonnemann, C.2
-
39
-
-
67049172237
-
Service-oriented architectures testing: A survey
-
G. Canfora and M. di Penta, "Service-oriented architectures testing: A survey," Springer LNCS: Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures, vol.1, pp. 78-105, 2009.
-
(2009)
Springer LNCS: Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
, vol.1
, pp. 78-105
-
-
Canfora, G.1
Di Penta, M.2
-
40
-
-
84857188344
-
-
IT Governance Institute
-
IT Governance Institute, "Cobit 4.1," 2007.
-
(2007)
Cobit 4.1
-
-
-
41
-
-
70449674451
-
-
[Online]. Available: http: //www.sans.org/cag/
-
J. Gilligan, "Consensus audit guidelines," http://www.sans.org/ cag/, 2009. [Online]. Available: http: //www.sans.org/cag/
-
(2009)
Consensus Audit Guidelines
-
-
Gilligan, J.1
-
42
-
-
57349158625
-
Rubacon: Automated support for model-based compliance engineering
-
New York, NY, USA: ACM
-
S. Höhn and J. Jürjens, "Rubacon: automated support for model-based compliance engineering," in Proceedings of the 30th International Conference on Software Engineering (ICSE). New York, NY, USA: ACM, 2008, pp. 875-878.
-
(2008)
Proceedings of the 30th International Conference on Software Engineering (ICSE)
, pp. 875-878
-
-
Höhn, S.1
Jürjens, J.2
|