SHIELDS Detecting known security vulnerabilities from within design and development tools FP 7 - ICT - 2007 215995 D 5 . 3 Final Evaluation Report
نویسندگان
چکیده
منابع مشابه
SHIELDS Detecting known security vulnerabilities from within design and development tools FP 7 - ICT - 2007 215995 D 2 . 2 Initial Modelling Methods and Prototype Modelling Tools
متن کامل
Detecting known security vulnerabilities from within design and development tools FP 7 - ICT - 2007 215995 D 2 . 1 Formalism Definitions and Representation Schemata
متن کامل
Two complementary approaches to detecting vulnerabilities in C programs. (Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C)
In general, computer software vulnerabilities are de ned as special cases where an unexpected behavior of the system leads to the degradation of security properties or the violation of security policies. These vulnerabilities can be exploited by malicious users or systems impacting the security and/or operation of the attacked system. Since the literature on vulnerabilities is not always availa...
متن کاملEuropean Commission Seventh Framework Programme Call : FP 7 - ICT - 2007 - 1 , Activity : ICT - 1 - 4 . 1 Contract No : 216267 Prototype and Applications Evaluation
متن کامل
Usability, Accessibility and Web Security Assessment of E-government Websites in Tanzania
In spite of the fact that e-government agency (ega) in Tanzania emphasize on the use of ICT within public institutions in Tanzania, accessibility, usability and web security vulnerabilities are still not considered by the majority of web developers. The main objective of this study is to assess the usability, accessibility and web security vulnerabilities of selected Tanzania e-government websi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010