메뉴 건너뛰기




Volumn , Issue , 2005, Pages

Leveraging architectural models to inject trust into software systems

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; LIFE CYCLE; NETWORK SECURITY; SOFTWARE ARCHITECTURE;

EID: 85088201822     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1083200.1083213     Document Type: Conference Paper
Times cited : (21)

References (44)
  • 3
    • 0003563348 scopus 로고
    • Building a secure computer system
    • New York, NY, USA
    • Gasser, M. Building a secure computer system. Van Nostrand Reinhold Co., New York, NY, USA, ISBN 0-442-23022-2 1988, 288 pp.
    • (1988) Van Nostrand Reinhold Co
    • Gasser, M.1
  • 10
    • 0033892696 scopus 로고    scopus 로고
    • A classification and comparison framework for software architecture description languages
    • January
    • Medvidovic, N. and Taylor, R. N. A Classification and Comparison Framework for Software Architecture Description Languages. IEEE Transactions on Software Engineering, Vol. 26, No. 1, pp. 70-93, January, 2000.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.1 , pp. 70-93
    • Medvidovic, N.1    Taylor, R.N.2
  • 11
    • 0018505572 scopus 로고
    • Time-dependent error-detection rate models for software reliability and other performance measures
    • Goel, A.L. and Okumoto K. Time-Dependent Error-Detection Rate Models for Software Reliability and Other Performance Measures, IEEE Trans. on Reliability, 28(3):206-211, 1979.
    • (1979) IEEE Trans. on Reliability , vol.28 , Issue.3 , pp. 206-211
    • Goel, A.L.1    Okumoto, K.2
  • 15
    • 0002638023 scopus 로고    scopus 로고
    • Securing network software applications: Introduction
    • February
    • Bashir, I., Serafini, E., and Wall, K. Securing network software applications: introduction. Communications of the ACM, Vol. 44, Issue 2, pp. 28-30, February 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 28-30
    • Bashir, I.1    Serafini, E.2    Wall, K.3
  • 19
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • MITRE Corp., Bedford, Mass., March
    • Bell, D. and LaPadula, L. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESDTR- 75-306, MITRE Corp., Bedford, Mass., March 1976.
    • (1976) Technical Report ESDTR-75-306
    • Bell, D.1    LaPadula, L.2
  • 24
    • 4043139788 scopus 로고    scopus 로고
    • Security vulnerabilities in event-driven systems
    • Xenitellis, S. (2002a). Security vulnerabilities in event-driven systems. Proceedings of IFIP SEC'2002. Pp. 147-160.
    • (2002) Proceedings of IFIP SEC'2002 , pp. 147-160
    • Xenitellis, S.1
  • 30
    • 0022581573 scopus 로고
    • An experimental evaluation of the assumption of independence in multi-version programming
    • January
    • Knight, J. C. and Leveson, N. G. An Experimental Evaluation of the Assumption of Independence in Multi-version Programming, IEEE Transactions on Software Engineering, Vol. SE-12, No. 1 (January 1986), pp. 96-109.
    • (1986) IEEE Transactions on Software Engineering , vol.SE-12 , Issue.1 , pp. 96-109
    • Knight, J.C.1    Leveson, N.G.2
  • 31
    • 0026103623 scopus 로고
    • An empirical comparison of software fault tolerance and fault elimination
    • February
    • Shimeall, T. J. and Leveson, N. G. An Empirical Comparison of Software Fault Tolerance and Fault Elimination. IEEE Transactions on Software Engineering, vol. 17, no. 2, pp. 173-182, February 1991.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.2 , pp. 173-182
    • Shimeall, T.J.1    Leveson, N.G.2
  • 44
    • 85027575085 scopus 로고    scopus 로고
    • http://www-scf.usc.edu/~sbanerje/Trustworthiness/trust-taxonomy. Pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.