Sciweavers

2213 search results - page 25 / 443
» Software Security
Sort
View
SSIRI
2010
14 years 9 months ago
Model-Based Argument Analysis for Evolving Security Requirements
Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar...
ICSOFT
2009
14 years 9 months ago
A Knowledge Base for Justified Information Security Decision-making
Daria Stepanova, Simon Edward Parkin, Aad P. A. va...
WETICE
2005
IEEE
15 years 5 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
15 years 5 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...