Case Base for Secure Software Development Using Software Security Knowledge Base
暂无分享,去创建一个
Atsuo Hazeyama | Hironori Washizaki | Nobukazu Yoshioka | Takao Okubo | Haruhiko Kaiya | Masahito Saito | Takanori Kobashi | Azusa Kumagai | H. Kaiya | H. Washizaki | A. Hazeyama | T. Okubo | Takanori Kobashi | Nobukazu Yoshioka | Masahito Saito | Azusa Kumagai
[1] Atsuo Hazeyama,et al. Preliminary Evaluation of a Software Security Learning Environment , 2014, Int. J. Softw. Innov..
[2] Jorge Gonzalez,et al. CakePHP 2 Application Cookbook , 2014 .
[3] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[4] Axelle Apvrille,et al. Secure software development by example , 2005, IEEE Security & Privacy Magazine.
[5] Jens Bürger,et al. Maintaining requirements for long-living software systems by incorporating security knowledge , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).
[6] Johannes Sametinger,et al. Software Security , 2013, 2013 20th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS).
[7] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[8] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[9] Lin Liu,et al. Security Requirements Engineering in the Wild: A Survey of Common Practices , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[10] Gary McGraw,et al. Knowledge for Software Security , 2005, IEEE Secur. Priv..