An Approach for Certifying Security in Software Components
暂无分享,去创建一个
[1] William Cheswick,et al. Firewalls and Internet Security , 1994 .
[2] Bruce Schneier,et al. Cryptography, security, and the future , 1999 .
[3] Keith W. Miller,et al. Confidently Assessing a Zero Probability of Software Failure , 1993, SAFECOMP.
[4] Jeffrey M. Voas,et al. Predicting How Badly "Good" Software Can Behave , 1997, IEEE Softw..
[5] Gary McGraw,et al. An automated approach for identifying potential vulnerabilities in software , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[6] Dan Farmer,et al. Improving the Security of Your Site by Breaking Into it , 2000 .
[7] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[8] Jeffrey M. Voas,et al. Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events , 1995, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95.
[9] David Safford,et al. The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment , 1993, USENIX Security Symposium.
[10] Matt Bishop,et al. Property-based testing: a new approach to testing for assurance , 1997, SOEN.