Software Security: The Dangerous Afterthought
暂无分享,去创建一个
Aftab Ahmad | Cheryl V. Hinds | Curtis Steward | Luay A. Wahsheh | Jonathan M. Graham | Aurelia T. Williams | Sandra J. DeLoatch
[1] S. Rehman,et al. Research on software design level security vulnerabilities , 2009, SOEN.
[2] John Goodenough,et al. Arguing Security – Creating Security Assurance Cases , 2014 .
[3] Javier López,et al. Security assurance during the software development cycle , 2009, CompSysTech '09.
[4] Jim Alves-Foss,et al. Policy-Based Security for Wireless Components in High Assurance Computer Systems , 2007 .
[5] Nancy R. Mead,et al. Engineering Security Into the Software Development Life Cycle , 2005 .
[6] Joseph K. Kearney,et al. Software complexity measurement , 1986, CACM.
[7] Laurie A. Williams,et al. Is complexity really the enemy of software security? , 2008, QoP '08.
[8] Steven B. Lipner,et al. The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.
[9] Lars Lundberg,et al. Evaluating the cost reduction of static code analysis for software security , 2008, PLAS '08.