-
1
-
-
79959561018
-
Some thoughts on security after ten years of qmail 1.0
-
ACM
-
D. J. Bernstein. Some thoughts on security after ten years of qmail 1.0. In CSAW '07, pages 1-10. ACM, 2007.
-
(2007)
CSAW '07
, pp. 1-10
-
-
Bernstein, D.J.1
-
2
-
-
85084162921
-
Privtrans: Automatically partitioning programs for privilege separation
-
August
-
D. Brumley and D. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX 13, August 2004.
-
(2004)
USENIX 13
-
-
Brumley, D.1
Song, D.2
-
3
-
-
70349694735
-
Identifying and resolving least privilege violations in software architectures
-
K. Buyens, B. De Win, and W. Joosen. Identifying and resolving least privilege violations in software architectures. In ARES, 2009.
-
(2009)
ARES
-
-
Buyens, K.1
De Win, B.2
Joosen, W.3
-
4
-
-
70349910077
-
Resolving least privilege violations in software architectures
-
K. Buyens, B. De Win, and W. Joosen. Resolving least privilege violations in software architectures. In SESS '09, 2009.
-
(2009)
SESS '09
-
-
Buyens, K.1
De Win, B.2
Joosen, W.3
-
6
-
-
34548777513
-
Archstudio 4: An architecture-based meta-modeling environment
-
E. Dashofy, H. Asuncion, S. Hendrickson, G. Surya-narayana, J. Georgas, and R. Taylor. Archstudio 4: An architecture-based meta-modeling environment. In ICSE COMPANION '07, pages 67-68, 2007.
-
(2007)
ICSE COMPANION '07
, pp. 67-68
-
-
Dashofy, E.1
Asuncion, H.2
Hendrickson, S.3
Surya-narayana, G.4
Georgas, J.5
Taylor, R.6
-
9
-
-
57349158625
-
Rubacon: Automated support for model-based compliance engineering
-
S. Höhn and J. Jürjens. Rubacon: automated support for model-based compliance engineering. In ICSE 13, pages 875-878, 2008.
-
(2008)
ICSE 13
, pp. 875-878
-
-
Höhn, S.1
Jürjens, J.2
-
12
-
-
72449127925
-
-
D. Van Landuyt, J. Gregoire, S. Michiels, E. Truyen, and W. Joosen. Architectural design of a digital publishing system. Technical report, Katholieke Univer-siteit Leuven, October 2006.
-
D. Van Landuyt, J. Gregoire, S. Michiels, E. Truyen, and W. Joosen. Architectural design of a digital publishing system. Technical report, Katholieke Univer-siteit Leuven, October 2006.
-
-
-
-
13
-
-
0037368172
-
An empirically-based process for software architecture evaluation
-
M. Lindvall, R.T. Tvedt, and P. Costa. An empirically-based process for software architecture evaluation. Empirical Software Engineering, 8(1):83-108, 2003.
-
(2003)
Empirical Software Engineering
, vol.8
, Issue.1
, pp. 83-108
-
-
Lindvall, M.1
Tvedt, R.T.2
Costa, P.3
-
14
-
-
67650131779
-
A formal model for a system's attack surface
-
Technical report, Carnegie Mellon University CMU, July
-
P. K. Manadhata, D. K. Kaynar, and J. M. Wing. A formal model for a system's attack surface. Technical report, Carnegie Mellon University (CMU), July 2007.
-
(2007)
-
-
Manadhata, P.K.1
Kaynar, D.K.2
Wing, J.M.3
-
15
-
-
0141947425
-
-
Prentice Hall PTR Upper Saddle River, NJ, USA
-
R.C. Martin. Agile software development: principles, patterns, and practices. Prentice Hall PTR Upper Saddle River, NJ, USA, 2003.
-
(2003)
Agile software development: Principles, patterns, and practices
-
-
Martin, R.C.1
-
17
-
-
43949109911
-
-
Springer
-
M. Morandini, D.C. Nguyen, A. Perini, A. Siena, and A. Susi. Tool-supported development with tropos: The conference management system case study. In AOSE 8, pages 182-196. Springer, 2008.
-
(2008)
Tool-supported development with tropos: The conference management system case study
, vol.AOSE 8
, pp. 182-196
-
-
Morandini, M.1
Nguyen, D.C.2
Perini, A.3
Siena, A.4
Susi, A.5
-
18
-
-
72449155430
-
-
N. Provos. Systrace, interactive policy generation for system calls
-
N. Provos. Systrace - interactive policy generation for system calls.
-
-
-
-
19
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
20
-
-
34547462739
-
Towards a measuring framework for security properties of software
-
R. Scandariato, B. De Win, and W. Joosen. Towards a measuring framework for security properties of software. In Quality of Protection '06, pages 27-30, 2006.
-
(2006)
Quality of Protection '06
, pp. 27-30
-
-
Scandariato, R.1
De Win, B.2
Joosen, W.3
-
21
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
|