語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Developing and evaluating security-a...
~
IGI Global.
Developing and evaluating security-aware software systems
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Developing and evaluating security-aware software systemsKhaled M. Khan, editor.
其他作者:
Khan, Khaled M.,
出版者:
Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),c2013.
面頁冊數:
electronic texts (308 p.) :digital files.
標題:
Computer networksSecurity measures.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
ISBN:
9781466624832 (ebook)
Developing and evaluating security-aware software systems
Developing and evaluating security-aware software systems
[electronic resource] /Khaled M. Khan, editor. - Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),c2013. - electronic texts (308 p.) :digital files.
Includes bibliographical references.
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
Restricted to subscribers or individual electronic text purchasers.
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466624832 (ebook)
Standard No.: 10.4018/978-1-4666-2482-5doi
LCCN: 2012023337Subjects--Topical Terms:
185597
Computer networks
--Security measures.Subjects--Index Terms:
Dependable systems
LC Class. No.: TK5105.59 / .D48 2013e
Dewey Class. No.: 005.8
Developing and evaluating security-aware software systems
LDR
:03333nmm a2200409 a 4500
001
464513
003
IGIG
005
20121117141605.0
008
151130s2013 pau fob 000 0 eng d
010
$a
2012023337
020
$a
9781466624832 (ebook)
020
$a
9781466624825 (hardcover)
024
7
$a
10.4018/978-1-4666-2482-5
$2
doi
035
$a
(CaBNVSL)gtp00553977
035
$a
(OCoLC)818587638
035
$a
00000202
040
$a
CaBNVSL
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.D48 2013e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Developing and evaluating security-aware software systems
$h
[electronic resource] /
$c
Khaled M. Khan, editor.
260
$a
Hershey, Pa. :
$b
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
$c
c2013.
300
$a
electronic texts (308 p.) :
$b
digital files.
504
$a
Includes bibliographical references.
505
0
$a
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer software
$x
Development.
$3
184751
650
0
$a
Computer security.
$3
184416
653
$a
Dependable systems
653
$a
Global security systems
653
$a
Programming security
653
$a
Secure software integration
653
$a
Service-oriented systems
653
$a
Software assurance
653
$a
Software engineering
700
1
$a
Khan, Khaled M.,
$d
1959-
$3
581945
710
2
$a
IGI Global.
$3
529832
776
0
$c
(Original)
$w
(DLC)2012023337
776
0 8
$i
Print version:
$z
1466624825
$z
9781466624825
$w
(DLC) 2012023337
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000113535
電子館藏
1圖書
電子書
EB TK5105.59 D48 c2013
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入