Security and Software Engineering Research Center (S2ERC)
نویسنده
چکیده
’The two foundational methods, namely sequencebased software specification and Markov chain usage-based statistical testing, were developed in the 1990s by Jesse Poore and his colleagues at the University of Tennessee’s Software Quality Research Laboratory. Since their inception they have been successfully combined and applied to a variety of industry and government projects. Field applications of these methods had earlier identified the need to address complexity and increase scalability both theoretically and practically for larger and more complex applications.
منابع مشابه
Gender HCI Issues in End-User Software Engineering Environments
From 18.01.07 to 23.02.07, the Dagstuhl Seminar 07081 EndUser Software Engineering was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and i...
متن کاملSecurity Engineering towards Building a Secure Software
Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Sec...
متن کاملOn the Horizon
Worse, more complex problems such as race conditions and subtle design errors wait in the wings for the buffer overflow’s demise. Software security problems will be with us for years, and hackers will continue to exploit systems via software defects. Clearly, a central and critical aspect of the computer security problem resides in software. Software security—the idea of engineering software th...
متن کاملModeling of Evolution to Secure Application System: from Requirements Model to Software Architecture
This paper describes an approach to modeling the evolution of an application system to a secure application system in terms of the software requirements model and software architecture model. The requirements for security services are captured separately from application requirements, and the security services are encapsulated in connectors in the software architecture, separately from the comp...
متن کاملSecurity Requirements for the Prevention of Modern Software Vulnerabilities and a Process for Incorporation into Classic Software Development Lifecycles
Software vulnerabilities and their associated exploits have been increasing over the last several years this research attempts to reverse that trend. Currently, security experts recommend that concerns for security start at the earliest stage possible, generally during the requirements engineering phase. Having a set of security requirements enables the production of a secure design, and produc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007