-
1
-
-
0346236349
-
-
Addison-Wesley, Pearson Education, Boston, USA
-
Matt Bishop. Computer Security. Addison-Wesley, Pearson Education, Boston, USA, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
2
-
-
70449646402
-
A vulnerability taxonomy methodology applied to web services
-
Helger Lipmaa, Dieter Gollman, editor
-
Chris Vanden Berghe, James Riordan, and Frank Piessens. A Vulnerability Taxonomy Methodology applied to Web Services. In Helger Lipmaa, Dieter Gollman, editor, Proceedings of the 10th Nordic Workshop on Secure IT Systems (NordSec 2005), 2005.
-
(2005)
Proceedings of the 10th Nordic Workshop on Secure IT Systems (NordSec 2005)
-
-
Berghe, C.V.1
Riordan, J.2
Piessens, F.3
-
3
-
-
10944267118
-
Static analysis for security
-
IEEE Computer Society
-
Brian Chess and Gary McGraw. Static Analysis for Security. In IEEE Security and Privacy. IEEE Computer Society, 2004.
-
(2004)
IEEE Security and Privacy
-
-
Chess, B.1
McGraw, G.2
-
5
-
-
80052211982
-
One step ahead
-
ACM
-
Vlad Gorelik. One Step Ahead. In ACM Queue. ACM, 2007.
-
(2007)
ACM Queue
-
-
Gorelik, V.1
-
7
-
-
31744432699
-
Finding application errors and security flaws using PQL: A program query language
-
San Diego, California, USA
-
Michael Martin, Benjamin Livshits, and Monica S. Lam. Finding Application Errors and Security Flaws Using PQL: a Program Query Language. In 20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, San Diego, California, USA, 2005.
-
(2005)
20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
8
-
-
59449108823
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology. National Vulnerability Database, 2007.
-
(2007)
National Vulnerability Database
-
-
-
11
-
-
34547239511
-
A scalable approach to attack graph generation
-
Alexandria, Virginia, USA ACM
-
Xinming Ou, Wayne F. Boyer, and Miles A. McQueen. A Scalable Approach to Attack Graph Generation. In Proceedings of the Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006. ACM.
-
(2006)
Proceedings of the Conference on Computer and Communications Security
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
14
-
-
84865198433
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS). Application Vulnerability Description Language (AVDL), 2004.
-
(2004)
Application Vulnerability Description Language (AVDL)
-
-
-
15
-
-
79951592893
-
-
Organization for the Advancement of Structured Information Standards (OASIS)
-
Organization for the Advancement of Structured Information Standards (OASIS). Business Process Execution Language (BPEL), 2007.
-
(2007)
Business Process Execution Language (BPEL)
-
-
-
16
-
-
70449651912
-
-
Forum Of Incident Response and Security Teams (FIRST)
-
Forum Of Incident Response and Security Teams (FIRST). Common Vulnerability Scoring System, 2007.
-
(2007)
Common Vulnerability Scoring System
-
-
-
18
-
-
84978945056
-
A software flaw taxonomy: Aiming tools at security
-
St. Louis, Missouri, USA ACM
-
Sam Weber, Paul A. Karger, and Amit Paradkar. A Software Flaw Taxonomy: Aiming Tools At Security. In Software Engineering for Secure Systems, St. Louis, Missouri, USA, 2005. ACM.
-
(2005)
Software Engineering for Secure Systems
-
-
Weber, S.1
Karger, P.A.2
Paradkar, A.3
|