Developing and evaluating security-aware software systems

"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Khan, Khaled M., 1959-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2013.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 03799nam a2200505 a 4500
001 30186
003 IGIG
005 20121117141605.0
006 m e d
007 cr bn||||m|||a
008 121114s2013 pau fob 000 0 eng d
010 # # |z 2012023337 
020 # # |a 9781466624832 (ebook) 
020 # # |z 9781466624825 (hardcover) 
024 7 # |a 10.4018/978-1-4666-2482-5  |2 doi 
035 # # |a (CaBNVSL)gtp00553977 
035 # # |a (OCoLC)818587638 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5105.59  |b .D48 2013e 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Developing and evaluating security-aware software systems  |c Khaled M. Khan, editor.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2013. 
300 # # |a electronic texts (308 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Fléchais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araújo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.]. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed November 16, 2012). 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Computer software  |x Development. 
650 # 0 |a Computer security. 
653 # # |a Dependable systems 
653 # # |a Global security systems 
653 # # |a Programming security 
653 # # |a Secure software integration 
653 # # |a Service-oriented systems 
653 # # |a Software assurance 
653 # # |a Software engineering 
700 1 # |a Khan, Khaled M.,  |d 1959- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2012023337 
776 0 8 |i Print version:  |w (DLC) 2012023337  |z 9781466624825  |z 1466624825 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5  |z View fulltext via EzAccess