Developing and evaluating security-aware software systems
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2013.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang
- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz
- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Fléchais
- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.]
- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun
- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araújo Neto, Marco Vieira
- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.]
- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan
- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang
- Building secure software using XP / Walid Al-Ahmad
- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov
- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid
- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.]
- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl
- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].