Sciweavers

946 search results - page 36 / 190
» Software engineering for security: a roadmap
Sort
View
AUIC
2003
IEEE
15 years 3 months ago
User Interface Requirements for Authentication of Communication
Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authen...
Audun Jøsang, Mary Anne Patton
ESEM
2010
ACM
14 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
SACMAT
2003
ACM
15 years 3 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
CGO
2005
IEEE
15 years 3 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ESEM
2009
ACM
15 years 4 months ago
Progress report on the experimental evaluation of security inspection guidance
Although security inspections have proven to be a very efficient means for assuring software security early in the software development lifecycle, they are not used extensively be...
Frank Elberzhager, Marek Jawurek, Christian Jung, ...