Developing and evaluating security-aware software systems

"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Khan, Khaled M., 1959-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2013.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang
  • Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz
  • Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Fléchais
  • Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.]
  • Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun
  • Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araújo Neto, Marco Vieira
  • Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.]
  • Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan
  • A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang
  • Building secure software using XP / Walid Al-Ahmad
  • Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov
  • Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid
  • JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.]
  • A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl
  • Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].