Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Developing and evaluating security-a...
~
IGI Global.
Developing and evaluating security-aware software systems
Record Type:
Electronic resources : Monograph/item
Title/Author:
Developing and evaluating security-aware software systemsKhaled M. Khan, editor.
other author:
Khan, Khaled M.,
Published:
Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),c2013.
Description:
electronic texts (308 p.) :digital files.
Subject:
Computer networksSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
ISBN:
9781466624832 (ebook)
Developing and evaluating security-aware software systems
Developing and evaluating security-aware software systems
[electronic resource] /Khaled M. Khan, editor. - Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),c2013. - electronic texts (308 p.) :digital files.
Includes bibliographical references.
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
Restricted to subscribers or individual electronic text purchasers.
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466624832 (ebook)
Standard No.: 10.4018/978-1-4666-2482-5doi
LCCN: 2012023337Subjects--Topical Terms:
185597
Computer networks
--Security measures.Subjects--Index Terms:
Dependable systems
LC Class. No.: TK5105.59 / .D48 2013e
Dewey Class. No.: 005.8
Developing and evaluating security-aware software systems
LDR
:03333nmm a2200409 a 4500
001
464513
003
IGIG
005
20121117141605.0
008
151130s2013 pau fob 000 0 eng d
010
$a
2012023337
020
$a
9781466624832 (ebook)
020
$a
9781466624825 (hardcover)
024
7
$a
10.4018/978-1-4666-2482-5
$2
doi
035
$a
(CaBNVSL)gtp00553977
035
$a
(OCoLC)818587638
035
$a
00000202
040
$a
CaBNVSL
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.D48 2013e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Developing and evaluating security-aware software systems
$h
[electronic resource] /
$c
Khaled M. Khan, editor.
260
$a
Hershey, Pa. :
$b
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
$c
c2013.
300
$a
electronic texts (308 p.) :
$b
digital files.
504
$a
Includes bibliographical references.
505
0
$a
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer software
$x
Development.
$3
184751
650
0
$a
Computer security.
$3
184416
653
$a
Dependable systems
653
$a
Global security systems
653
$a
Programming security
653
$a
Secure software integration
653
$a
Service-oriented systems
653
$a
Software assurance
653
$a
Software engineering
700
1
$a
Khan, Khaled M.,
$d
1959-
$3
581945
710
2
$a
IGI Global.
$3
529832
776
0
$c
(Original)
$w
(DLC)2012023337
776
0 8
$i
Print version:
$z
1466624825
$z
9781466624825
$w
(DLC) 2012023337
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000113535
電子館藏
1圖書
電子書
EB TK5105.59 D48 c2013
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login