-
1
-
-
34748872855
-
Some trends in Web application development
-
DOI 10.1109/FOSE.2007.26, 4221621, FoSE 2007: Future of Software Engineering
-
Jazayeri, M.: Some trends in Web application development. In: International Conference on Software Engineering, pp. 199-213. IEEE Computer Society, Washington (2007) (Pubitemid 47484926)
-
(2007)
FoSE 2007: Future of Software Engineering
, pp. 199-213
-
-
Jazayeri, M.1
-
2
-
-
33847326664
-
Agile web engineering (AWE) process
-
University of Glasgow, UK (December)
-
McDonald, A., Welland, R.: Agile web engineering (AWE) process. Technical report, Department of Computer Science, University of Glasgow, UK (December 2001)
-
(2001)
Technical Report, Department of Computer Science
-
-
McDonald, A.1
Welland, R.2
-
4
-
-
34250689142
-
Agile development of secure web applications
-
ACM, New York
-
Ge, X., Paige, R.F., Polack, F.A.C., Chivers, H., Brooke, P.J.: Agile development of secure web applications. In: Proceedings of the 6th international conference on Web engineering. ACM, New York (2006)
-
(2006)
Proceedings of the 6th International Conference on Web Engineering
-
-
Ge, X.1
Paige, R.F.2
Polack, F.A.C.3
Chivers, H.4
Brooke, P.J.5
-
5
-
-
26444465547
-
Agile security using an incremental security architecture
-
Extreme Programming and Agile Processes in Software Engineering: 6th International Conference, XP 2005. Proceedings
-
Chivers, H., Paige, R.F., Ge, X.: Agile security using an incremental security architecture. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol. 3556, pp. 57-65. Springer, Heidelberg (2005) (Pubitemid 41424950)
-
(2005)
Lecture Notes in Computer Science
, vol.3556
, pp. 57-65
-
-
Chivers, H.1
Paige, R.F.2
Ge, X.3
-
6
-
-
27544492875
-
Integrating security into agile development methods
-
Siponen, M., Baskerville, R., Kuivalainen, T.: Integrating security into agile development methods. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, vol. 7, p. 185a (2005)
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
, vol.7
-
-
Siponen, M.1
Baskerville, R.2
Kuivalainen, T.3
-
7
-
-
35048816560
-
Security engineering and extreme programming: An impossible marriage?
-
Zannier, C., Erdogmus, H., Lindstrom, L. (eds.). XP/Agile Universe 2004, Springer, Heidelberg
-
Wayrynen, J., Bodén, M., Bostrom, G.: Security Engineering and eXtreme Programming: An Impossible Marriage? In: Zannier, C., Erdogmus, H., Lindstrom, L. (eds.) XP/Agile Universe 2004. LNCS, vol. 3134, pp. 117-128. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3134
, pp. 117-128
-
-
Wayrynen, J.1
Bodén, M.2
Bostrom, G.3
-
8
-
-
29244456856
-
Extreme security engineering: On employing XP practices to achieve "good enough security" without defining it
-
Fairfax, VA
-
Beznosov, K.: Extreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security" without Defining It. In: First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA (2003)
-
(2003)
First ACM Workshop on Business Driven Security Engineering (BizSec)
-
-
Beznosov, K.1
-
9
-
-
84876226464
-
-
Last date accessed 2009-12-10
-
Agile Manifesto, http://agilemanifesto.org/ (Last date accessed 2009-12-10)
-
-
-
-
10
-
-
0036496386
-
Going faster: Testing the Web application
-
DOI 10.1109/52.991333
-
Hieatt, E., Mee, R.: Going Faster: Testing TheWeb Application. IEEE Software 19, 60-65 (2002) (Pubitemid 34249427)
-
(2002)
IEEE Software
, vol.19
, Issue.2
, pp. 60-65
-
-
Hieatt, E.1
Mee, R.2
-
11
-
-
0036437990
-
Testing web applications
-
Di Lucca, G.A., Fasolino, A.R., Faralli, F., De Carlini, U.: Testing Web applications. In: Proceedings of International Conference on Software Maintenance, pp. 310-319 (2002) (Pubitemid 35406598)
-
(2002)
Conference on Software Maintenance
, pp. 310-319
-
-
Di Lucca, G.A.1
Fasolino, A.R.2
Faralli, F.3
De Carlini, U.4
-
12
-
-
33750613475
-
Testing Web-based applications: The state of the art and future trends
-
DOI 10.1016/j.infsof.2006.06.006, PII S0950584906000851
-
Di Lucca, G.A., Fasolino, A.R.: Testing Web-based applications: The state of the art and future trends. Information and Software Technology 48, 1172-1186 (2006) (Pubitemid 44693351)
-
(2006)
Information and Software Technology
, vol.48
, Issue.12
, pp. 1172-1186
-
-
Di Lucca, G.A.1
Fasolino, A.R.2
-
13
-
-
69249090883
-
Symantec internet security threat report: Trends for July-December 2007
-
Turner, D., Fossi, M., Johnson, E., Mack, T., Blackbird, J., Entwisle, S., Low, M.K., McKinney, D., Wueest, C.: Symantec Internet Security Threat Report: Trends for July-December 2007. Technical report, Symantec Corporation, Vol. XIII (2008)
-
(2008)
Technical Report, Symantec Corporation
, vol.13
-
-
Turner, D.1
Fossi, M.2
Johnson, E.3
Mack, T.4
Blackbird, J.5
Entwisle, S.6
Low, M.K.7
McKinney, D.8
Wueest, C.9
-
14
-
-
3042823607
-
Why security testing is hard
-
Thompson, H.H.: Why Security Testing Is Hard. IEEE Security & Privacy 1, 83-86 (2003)
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 83-86
-
-
Thompson, H.H.1
-
15
-
-
33847756784
-
Agile security testing of web-based systems via HTTPUnit
-
DOI 10.1109/ADC.2005.11, 1609802, Proceedings - AGILE Confernce 2005
-
Tappenden, A., Beatty, P., Miller, J., Geras, A., Smith, M.: Agile security testing of Web-based systems via HTTP Unit. In: Proceedings of Agile Conference, pp. 29-38 (2005) (Pubitemid 46379839)
-
(2005)
Proceedings - AGILE Confernce 2005
, vol.2005
, pp. 29-38
-
-
Tappenden, A.1
Beatty, P.2
Miller, J.3
Geras, A.4
Smith, M.5
-
18
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10, 34-44 (2005)
-
(2005)
Requirements Engineering
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
20
-
-
14744271696
-
Software penetration testing
-
DOI 10.1109/MSP.2005.23
-
Arkin, B., Stender, S., McGraw, G.: Software penetration testing. IEEE Security & Privacy 3, 84-87 (2005) (Pubitemid 40325588)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 84-87
-
-
Arkin, B.1
Stender, S.2
McGraw, G.3
-
21
-
-
14744271048
-
Application penetration testing
-
DOI 10.1109/MSP.2005.3
-
Thompson, H.H.: Application penetration testing. IEEE Security & Privacy 3, 66-69 (2005) (Pubitemid 40325585)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 66-69
-
-
Thompson, H.H.1
-
22
-
-
84876238169
-
-
Last date accessed 2009-11-13
-
The Open Web Application Security Project. OWASP Testing Guide V3.0, http://www.owasp.org/index.php/Category:OWASP-Testing-Project (Last date accessed 2009-11-13)
-
OWASP Testing Guide V3.0
-
-
-
23
-
-
0036575072
-
Knowledge management in software engineering
-
DOI 10.1109/MS.2002.1003450
-
Rus, I., Lindvall, M.: Knowledge management in software engineering. IEEE Software 19, 26-38 (2002) (Pubitemid 34631149)
-
(2002)
IEEE Software
, vol.19
, Issue.3
, pp. 26-38
-
-
Rus, I.1
Lindvall, M.2
-
24
-
-
77953034868
-
-
Agile Trends Survey, (Last date accessed 2009-11-26)
-
Davidson, M.: Survey: Agile interest high, but waterfall still used by many. Agile Trends Survey (2008), http://searchsoftwarequality.techtarget.com/ news/article/0,289142,sid92-gci1318992,00.html (Last date accessed 2009-11-26)
-
(2008)
Survey: Agile Interest High, but Waterfall Still Used by Many
-
-
Davidson, M.1
-
25
-
-
35348829230
-
-
Addison-Wesley, Reading
-
Wysopal, C., Nelson, L., Dustin, E., Nelson, L., Zovi, D.D.: The Art of Software Security Testing. Addison-Wesley, Reading (2006)
-
(2006)
The Art of Software Security Testing.
-
-
Wysopal, C.1
Nelson, L.2
Dustin, E.3
Nelson, L.4
Zovi, D.D.5
-
27
-
-
84876278827
-
-
Last date accessed 2009-11-13
-
BugTraq mailing list, http://www.securityfocus.com/archive/1 (Last date accessed 2009-11-13)
-
BugTraq Mailing List
-
-
-
28
-
-
84876221470
-
-
Last date accessed 2009-11-13
-
Common Vulnerabilities and Exposures, http://cve.mitre.org/ (Last date accessed 2009-11-13)
-
-
-
-
29
-
-
84876260115
-
-
Last date accessed 2009-11-13
-
Computer Emergency Readiness Team (CERT), http://www.cert.org/ (Last date accessed 2009-11-13)
-
-
-
-
30
-
-
84876276473
-
-
Last date accessed 2009-11-13
-
OWASP Top 10 vulnerabilities, http://www.owasp.org/index.php/Top-10-2007 (Last date accessed 2009-11-13)
-
Top 10 Vulnerabilities
-
-
-
32
-
-
84876238169
-
-
Last date accessed 2009-12-02
-
The OpenWeb Application Security Project. OWASP Testing Guide V3.0, http://www.owasp.org/index.php/Category:OWASP-Testing-Project (Last date accessed 2009-12-02)
-
OWASP Testing Guide V3.0
-
-
-
33
-
-
33747238250
-
Guest editor's introduction: The state of web security
-
Andrews, M.: Guest Editor's Introduction: The State of Web Security. IEEE Security and Privacy 4, 14-15 (2006)
-
(2006)
IEEE Security and Privacy
, vol.4
, pp. 14-15
-
-
Andrews, M.1
-
35
-
-
84876230092
-
-
Last date accessed 2009-11-14
-
Acunetix Web Vulnerability Scanner, http://www.acunetix.com/ (Last date accessed 2009-11-14)
-
-
-
-
36
-
-
84876230915
-
-
Last date accessed 2009-11-14
-
SeaMonster V3.0, http://sourceforge.net/projects/seamonster/ (Last date accessed 2009-11-14)
-
-
-
-
37
-
-
70349667605
-
Static code analysis to detect software security vulnerabilities - Does experience matter?
-
Baca, D., Petersen, K., Carlsson, B., Lundberg, L.: Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? In: IEEE International Conference on Availability, Reliability and Security, pp. 804-810 (2009)
-
(2009)
IEEE International Conference on Availability, Reliability and Security
, pp. 804-810
-
-
Baca, D.1
Petersen, K.2
Carlsson, B.3
Lundberg, L.4
|