Sciweavers

5843 search results - page 84 / 1169
» Software Security in Practice
Sort
View
TASE
2007
IEEE
15 years 10 months ago
Software Security
Jeannette M. Wing
140
Voted
ICSE
2010
IEEE-ACM
15 years 1 months ago
Portable secure identity management for software engineering
Christopher Staite
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 9 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
COMPSAC
2003
IEEE
15 years 9 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han