Book Description
"This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation"--Provided by publisher.
Author : Mouratidis, H.
Publisher : IGI Global
Page : 388 pages
File Size : 15,82 MB
Release : 2010-10-31
Category : Computers
ISBN : 1615208380
"This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation"--Provided by publisher.
Author : Haralambos Mouratidis
Publisher :
Page : pages
File Size : 29,6 MB
Release : 2011
Category :
ISBN :
"This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation"--Provided by publisher.
Author : Khaled M. Khan
Publisher : IGI Publishing
Page : 96 pages
File Size : 14,64 MB
Release : 2010
Category :
ISBN : 9781609608958
The International Journal of Secure Software Engineering (IJSSE) publishes original research on the security concerns that construe during the software development practice. IJSSE promotes the idea of developing security-aware software systems from the ground up. This journal examines the software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. IJSSE includes all aspects of software security in the development, deployment, and management processes of software systems.
Author : C. Warren Axelrod
Publisher : Artech House
Page : 350 pages
File Size : 23,52 MB
Release : 2013
Category : Computers
ISBN : 1608074722
This first-of-its-kind resource offers a broad and detailed understanding of software systems engineering from both security and safety perspectives. Addressing the overarching issues related to safeguarding public data and intellectual property, the book defines such terms as systems engineering, software engineering, security, and safety as precisely as possible, making clear the many distinctions, commonalities, and interdependencies among various disciplines. You explore the various approaches to risk and the generation and analysis of appropriate metrics. This unique book explains how processes relevant to the creation and operation of software systems should be determined and improved, how projects should be managed, and how products can be assured. You learn the importance of integrating safety and security into the development life cycle. Additionally, this practical volume helps identify what motivators and deterrents can be put in place in order to implement the methods that have been recommended.
Author : Khaled M. Khan
Publisher : IGI Publishing
Page : 86 pages
File Size : 21,29 MB
Release : 2011-09-01
Category : Computer security
ISBN : 9781613508978
The International Journal of Secure Software Engineering (IJSSE) publishes original research on the security concerns that construe during the software development practice. IJSSE promotes the idea of developing security-aware software systems from the ground up. This journal examines the software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. IJSSE includes all aspects of software security in the development, deployment, and management processes of software systems.
Author : Jan Jürjens
Publisher : Springer
Page : 245 pages
File Size : 37,38 MB
Release : 2014-02-18
Category : Computers
ISBN : 331904897X
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
Author : Zissis, Dimitrios
Publisher : IGI Global
Page : 290 pages
File Size : 16,61 MB
Release : 2014-03-31
Category : Political Science
ISBN : 1466658215
In modern electoral processes, Information and Communication Technologies play a crucial role, whether used in voter registration, ballot casting, or processing of results. Securing these systems is a necessary step in ensuring the fairness of the democratic process. Design, Development, and Use of Secure Electronic Voting Systems analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society. Stakeholders, researchers, architects, designers, and scholars interested in the use of electronic systems in government processes will use this book to gain a broader understanding of some of the latest advances in this emerging field.
Author : Raimundas Matulevičius
Publisher : Springer
Page : 225 pages
File Size : 12,17 MB
Release : 2017-08-17
Category : Computers
ISBN : 3319617176
This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.
Author : Amine, Abdelmalek
Publisher : IGI Global
Page : 348 pages
File Size : 21,9 MB
Release : 2013-11-30
Category : Computers
ISBN : 1466647906
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.
Author : Nazila Gol Mohammadi
Publisher : Springer
Page : 320 pages
File Size : 39,64 MB
Release : 2019-08-03
Category : Computers
ISBN : 3658274883
Trustworthiness is a key success factor in the acceptance and adoption of cyber-physical systems. The author first discusses various existing definitions of trust and trustworthiness and extends them to cyber-physical systems. A comprehensive framework is proposed, including methods that cover all phases of development: requirements engineering, system design, trustworthiness evaluation, run-time maintenance, and evidence-based assurance. To support a smooth integration of the methods into development projects, these methods are provided in the form of so-called capability patterns. A running example from the ambient assisted living domain is used to demonstrate the application of the methods. About the Author: Nazila Gol Mohammadi is currently working as an associate researcher at paluno – The Ruhr Institute for Software Technology in Essen, Germany. Her research interests include software engineering, requirements engineering, digitalization, cloud computing, cyber-physical systems, and trustworthiness of software systems.