標題: Titlebook: Engineering Secure Software and Systems; First International Fabio Massacci,Samuel T. Redwine,Nicola Zannone Conference proceedings 2009 S [打印本頁] 作者: 解毒藥 時間: 2025-3-21 17:52
書目名稱Engineering Secure Software and Systems影響因子(影響力)
書目名稱Engineering Secure Software and Systems影響因子(影響力)學科排名
書目名稱Engineering Secure Software and Systems網絡公開度
書目名稱Engineering Secure Software and Systems網絡公開度學科排名
書目名稱Engineering Secure Software and Systems被引頻次
書目名稱Engineering Secure Software and Systems被引頻次學科排名
書目名稱Engineering Secure Software and Systems年度引用
書目名稱Engineering Secure Software and Systems年度引用學科排名
書目名稱Engineering Secure Software and Systems讀者反饋
書目名稱Engineering Secure Software and Systems讀者反饋學科排名
作者: 極大痛苦 時間: 2025-3-21 23:06
The Discursive Construction of Blamessibility of errors and inconsistencies that may be introduced when enforcement code is written manually. Furthermore, the use of aspects ensures the modularity of the enforcement code and its separation from the business logic.作者: 不幸的人 時間: 2025-3-22 03:40
https://doi.org/10.1057/9780230377462finition, and some more recent notions TA-security, TO-security and ITO-security defined by van der Meyden. It is also shown that refinement preserves weak access control structure, an implementation mechanism that ensures TA-security.作者: 材料等 時間: 2025-3-22 08:13
Workers in China’s Rural Industries the vulnerable components were in the top nine percent of the total component ranking, but with a 48% false positive rate. The results indicate that non-security failures can be used as one of the input variables for security-related prediction models.作者: 印第安人 時間: 2025-3-22 11:32
Fran?ois Combarnous,Eric Rougierbsence of security rules specifying the vulnerable function or the presence of a bug in the static analysis tool. Complex code is more likely to contain complicated code constructs and obscure format string functions, resulting in lower detection rates.作者: V切開 時間: 2025-3-22 16:08 作者: V切開 時間: 2025-3-22 20:31
Architectural Refinement and Notions of Intransitive Noninterferencefinition, and some more recent notions TA-security, TO-security and ITO-security defined by van der Meyden. It is also shown that refinement preserves weak access control structure, an implementation mechanism that ensures TA-security.作者: BALE 時間: 2025-3-22 23:02 作者: Dislocation 時間: 2025-3-23 05:19 作者: 束以馬具 時間: 2025-3-23 06:48 作者: Eclampsia 時間: 2025-3-23 09:53
Report: Measuring the Attack Surfaces of Enterprise Softwareted manner. We demonstrate the feasibility of our approach by measuring the attack surfaces of three versions of an SAP software system. We envision our measurement method and tool to be useful to software developers for improving software security and quality.作者: CURB 時間: 2025-3-23 14:44 作者: conduct 時間: 2025-3-23 18:34 作者: Defense 時間: 2025-3-24 01:08
https://doi.org/10.1007/978-3-658-38477-7. A major component of the architecture is the end-user device, the security of which is enhanced with processor-level encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.作者: institute 時間: 2025-3-24 06:23
https://doi.org/10.1057/9780230297685secure. We show that it is possible to guarantee that the refinement of this system at a lower level of abstraction is still secure, regardless the behavior of the implementation of the untrusted component.作者: oracle 時間: 2025-3-24 10:02 作者: amyloid 時間: 2025-3-24 10:44
Emmanuel Saffa Abdulai,Ina Kubbey access errors and vulnerabilities. It works by using static analysis to prove memory accesses safe. If a memory access cannot be proven safe, MEDS falls back to run-time analysis. The system exceeds previous work with dramatic reductions in false positives, as well as covering all memory segments (stack, static, heap).作者: 極少 時間: 2025-3-24 17:09 作者: Vasodilation 時間: 2025-3-24 22:12 作者: overhaul 時間: 2025-3-25 02:29
Idea: Trusted Emergency Management. A major component of the architecture is the end-user device, the security of which is enhanced with processor-level encryption of memory. This paper introduces an approach to more efficiently use the processor-encryption feature for secure data storage, as well as ISA instructions for the management of emergency state.作者: conscribe 時間: 2025-3-25 03:58
Idea: Action Refinement for Security Properties Enforcementsecure. We show that it is possible to guarantee that the refinement of this system at a lower level of abstraction is still secure, regardless the behavior of the implementation of the untrusted component.作者: Spartan 時間: 2025-3-25 09:41 作者: Synovial-Fluid 時間: 2025-3-25 12:10
MEDS: The Memory Error Detection Systemy access errors and vulnerabilities. It works by using static analysis to prove memory accesses safe. If a memory access cannot be proven safe, MEDS falls back to run-time analysis. The system exceeds previous work with dramatic reductions in false positives, as well as covering all memory segments (stack, static, heap).作者: 現代 時間: 2025-3-25 16:33
Conference proceedings 2009selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance..作者: Liability 時間: 2025-3-25 20:18
0302-9743 iewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance..978-3-642-00198-7978-3-642-00199-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 星星 時間: 2025-3-26 03:43 作者: 上下連貫 時間: 2025-3-26 07:48
The cold shredder: a special method,ted manner. We demonstrate the feasibility of our approach by measuring the attack surfaces of three versions of an SAP software system. We envision our measurement method and tool to be useful to software developers for improving software security and quality.作者: 為寵愛 時間: 2025-3-26 11:27 作者: ASSAY 時間: 2025-3-26 15:55 作者: 果仁 時間: 2025-3-26 19:57 作者: septicemia 時間: 2025-3-26 23:38
A Scalable Approach to Full Attack Graphs Generationbe the various elements in the conceptual model. Thirdly, based on VAML, a scalable approach to generate full attack graphs is put forward. The prototype system CAVS has been tested on an operational network with over 150 hosts. We have explored the system’s scalability by evaluating simulated netwo作者: Cpap155 時間: 2025-3-27 03:47 作者: follicular-unit 時間: 2025-3-27 09:11 作者: 被詛咒的人 時間: 2025-3-27 11:57
Interest Groups and Collective Action,ucted as a laboratory exercise. Students actively shared misuse cases, threat models, and their limited software security expertise as they discussed vulnerabilities in their course project. We observed students relating vulnerabilities to the business impacts of the system. Protection Poker lead to作者: 密碼 時間: 2025-3-27 15:20 作者: 樸素 時間: 2025-3-27 19:08
Peter Nyn?s,Ariela Keysar,Paul Stenners that may have remained unexecuted in previous tests. The experimental results indicate that our method is effective to find new vulnerabilities, and test data generation may help to improve the effectiveness of detection.作者: 領帶 時間: 2025-3-27 23:20
Verification of Business Process Entailment Constraints Using SPINe machines. The properties to be verified are usually expressed as formula in temporal logic. In this paper we present an approach to verify access control security properties of a security annotated business process model. To this end we utilise a security enhanced BPMN notation to define access co作者: Coronation 時間: 2025-3-28 05:04 作者: Solace 時間: 2025-3-28 06:14 作者: Palpable 時間: 2025-3-28 12:54
Idea: Action Refinement for Security Properties Enforcementgh level) specification of a secure system with a possible untrusted component. It is controlled by a controller program, in such a way the system is secure. We show that it is possible to guarantee that the refinement of this system at a lower level of abstraction is still secure, regardless the be作者: 下邊深陷 時間: 2025-3-28 15:56 作者: LVAD360 時間: 2025-3-28 20:00 作者: installment 時間: 2025-3-29 02:35 作者: Biomarker 時間: 2025-3-29 05:11
Report: Measuring the Attack Surfaces of Enterprise Softwareo mitigate security risk; measuring and reducing the . of software is a complementary approach. In this paper, we apply a method for measuring attack surfaces to enterprise software written in .. We implement a tool as an Eclipse plugin to measure an SAP software system’s attack surface in an automa作者: 攀登 時間: 2025-3-29 11:10 作者: Incompetent 時間: 2025-3-29 14:15 作者: 猜忌 時間: 2025-3-29 18:49 作者: macabre 時間: 2025-3-29 21:09
Toward Non-security Failures as a Predictor of Security Faults and Failuresrics from the non-security realm. We analyzed non-security and security failure data reported for the year 2007 of a Cisco software system. We used non-security failure reports as input variables into a classification and regression tree (CART) model to determine the probability that a component wil作者: 減去 時間: 2025-3-30 02:56 作者: Buttress 時間: 2025-3-30 04:06 作者: 貞潔 時間: 2025-3-30 11:40 作者: 館長 時間: 2025-3-30 14:09
Report: Functional Security Testing Closing the Software – Security Testing Gap: A Case from a Telecsecurity testing is suitable for this purpose as it bridges the gap between software and security testing. In this paper we describe the aspects of such a functional security testing approach. Further we provide evidence for a practical application of our approach and show the benefits we found.作者: 諂媚于人 時間: 2025-3-30 18:30
Idea: Measuring the Effect of Code Complexity on Static Analysis Resultsor each vulnerability, one containing the vulnerability and one in which the vulnerability was fixed. We examined the effect of code complexity on the quality of static analysis results, including successful detection and false positive rates. Static analysis detected 63% of the format string vulner作者: 攤位 時間: 2025-3-30 22:38
978-3-642-00198-7Springer-Verlag Berlin Heidelberg 2009作者: 說笑 時間: 2025-3-31 03:05
Engineering Secure Software and Systems978-3-642-00199-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: upstart 時間: 2025-3-31 08:20 作者: Bereavement 時間: 2025-3-31 12:52 作者: MERIT 時間: 2025-3-31 15:01 作者: Decongestant 時間: 2025-3-31 20:17
https://doi.org/10.1007/978-3-658-38477-7ents to a trusted emergency information management (EIM) system that securely allows for extraordinary access to sensitive information during a crisis. A major component of the architecture is the end-user device, the security of which is enhanced with processor-level encryption of memory. This pape作者: Pastry 時間: 2025-4-1 00:07 作者: 飲料 時間: 2025-4-1 05:16 作者: 喧鬧 時間: 2025-4-1 07:50
https://doi.org/10.1057/9780230377462 systems development, one might refine such a design by viewing a component as being composed of subcomponents, and specifying permitted flows of information between these subcomponents and others in the design. The paper studies the soundness of such refinements with respect to a spectrum of differ作者: 使殘廢 時間: 2025-4-1 13:08 作者: myriad 時間: 2025-4-1 14:56
The cold shredder: a special method,o mitigate security risk; measuring and reducing the . of software is a complementary approach. In this paper, we apply a method for measuring attack surfaces to enterprise software written in .. We implement a tool as an Eclipse plugin to measure an SAP software system’s attack surface in an automa