Developing and evaluating security-a...
IGI Global.

 

  • Developing and evaluating security-aware software systems
  • Record Type: Language materials, printed : monographic
    Secondary Intellectual Responsibility: KhanKhaled M., 1959-
    Secondary Intellectual Responsibility: IGI Global.
    Place of Publication: Hershey, Pa.
    Published: IGI Global;
    Year of Publication: c2013.
    Description: electronic texts (308 p.)digital files. :
    Subject: Computer security. -
    Subject: Computer software - Development. -
    Subject: Computer networks - Security measures. -
    Subject: Dependable systems
    Subject: Global security systems
    Subject: Programming security
    Subject: Secure software integration
    Subject: Service-oriented systems
    Subject: Software assurance
    Subject: Software engineering
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
    Notes: Restricted to subscribers or individual electronic text purchasers.
    Summary: "This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
    ISBN: 9781466624832
    Content Note: Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang Building secure software using XP / Walid Al-Ahmad Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login