-
2
-
-
0028514027
-
Taxonomy of computer program security flaws
-
C.E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi, "Taxonomy of Computer Program Security Flaws, " ACM Computing Surveys, 1994, vol. 16, no. 3, pp. 211-254.
-
(1994)
ACM Computing Surveys
, vol.16
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
Mcdermott, J.P.3
Choi, W.S.4
-
3
-
-
0004229237
-
-
Doctoral dissertation, Department of Computer Sciences, Purdue University, Indiana, USA
-
I.V. Krsul, "Software Vulnerability Analysis, " Doctoral dissertation, Department of Computer Sciences, Purdue University, Indiana, USA, 1998.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.V.1
-
4
-
-
51949090977
-
Quantifying security in secure software development phases
-
Turku, Finland, IEEE CS Press, 2008
-
M.U.A. Khan and M. Zulkernine, "Quantifying Security in Secure Software Development Phases, " In Proc. of the 2nd IEEE International Workshop on Secure Software Engineering (IWSSE'08), Turku, Finland, 2008, IEEE CS Press, pp. 955-960, 2008.
-
(2008)
Proc. of the 2nd IEEE International Workshop on Secure Software Engineering (IWSSE'08)
, pp. 955-960
-
-
Khan, M.U.A.1
Zulkernine, M.2
-
6
-
-
4344569744
-
Risk analysis in software design
-
IEEE CS Press
-
D. Verdon and G. McGraw, "Risk Analysis in Software Design, " IEEE Security and Privacy, IEEE CS Press, 2004, vol. 2, no. 4, pp. 79-84.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
Mcgraw, G.2
-
9
-
-
21644480889
-
The trustworthy computing security development lifecycle
-
CA, USA, IEEE CS Press
-
S. Lipner, "The Trustworthy Computing Security Development Lifecycle, " In Proc. of the 20th Annual Computer Security Applications Conference (ACSAC '04), CA, USA, 2004, IEEE CS Press, pp. 2-13.
-
(2004)
Proc. of the 20th Annual Computer Security Applications Conference (ACSAC '04)
, pp. 2-13
-
-
Lipner, S.1
-
10
-
-
70849091059
-
-
Visited May
-
OWASP CLASP Project, http://www.owasp.org/index.php/Category:OWASP-CLASP- Project. Visited May 2009.
-
(2009)
OWASP CLASP Project
-
-
-
11
-
-
84931024051
-
Integrating security and usability into the requirements and design process
-
Inderscience Publishers, Geneva, Switzerland
-
I. Flechais, C. Mascolo, and M.A. Sasse, "Integrating Security and Usability into the Requirements and Design Process, " International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, Geneva, Switzerland, 2007, vol. 1, no. 1, pp. 12-26.
-
(2007)
International Journal of Electronic Security and Digital Forensics
, vol.1
, Issue.1
, pp. 12-26
-
-
Flechais, I.1
Mascolo, C.2
Sasse, M.A.3
-
12
-
-
54149109737
-
Towards building secure software systems
-
Informing Science Institute, California, USA
-
A.S. Sodiya, S.A. Onashoga, and O.B. Ajayi, "Towards Building Secure Software Systems, " Issues in Informing Science and Information Technology, Informing Science Institute, California, USA, 2006, vol. 3, pp. 635-646.
-
(2006)
Issues in Informing Science and Information Technology
, vol.3
, pp. 635-646
-
-
Sodiya, A.S.1
Onashoga, S.A.2
Ajayi, O.B.3
-
13
-
-
47849113405
-
S2d-prom: A strategy oriented process model for secure software development
-
Cap Esterel, French Riviera, France
-
M. Essafi, L. Labed, and H.B. Ghezala, "S2D-ProM: A Strategy Oriented Process Model for Secure Software Development, " In Proc. of the 2nd International Conference on Software Engineering Advances (ICSEA'07), Cap Esterel, French Riviera, France, 2007, p. 24.
-
(2007)
Proc. of the 2nd International Conference on Software Engineering Advances (ICSEA'07)
, pp. 24
-
-
Essafi, M.1
Labed, L.2
Ghezala, H.B.3
-
14
-
-
70449679234
-
On selecting appropriate development processes and requirement engineering methods for secure software
-
Seattle, WA, USA, IEEE CS Press, to appear
-
M.U.A. Khan and M. Zulkernine, "On Selecting Appropriate Development Processes and Requirement Engineering Methods for Secure Software, " In Proc. of the 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009), Seattle, WA, USA, IEEE CS Press, 2009, to appear.
-
(2009)
Proc. of the 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009)
-
-
Khan, M.U.A.1
Zulkernine, M.2
-
15
-
-
0024089511
-
Understanding and controlling software costs
-
B.W. Boehm and P.N. Papaccio, "Understanding and Controlling Software Costs, " IEEE Transactions on Software Engineering, 1988, vol. 14, no. 10, pp. 1462-1477.
-
(1988)
IEEE Transactions on Software Engineering
, vol.14
, Issue.10
, pp. 1462-1477
-
-
Boehm, B.W.1
Papaccio, P.N.2
|