Secure Software

نویسنده

  • John D. McGregor
چکیده

Granting access to those who should have it and denying access to those who shouldn’t is a basic feature in many software products. Security is of strategic importance in many markets and types of products. In this month’s issue of Strategic Software Engineering, I will explore some issues about the strategic importance of security. I will discuss the influence of other product qualities such as correctness on the security of the product.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Software Engineering for Secure Software - State of the Art: A Survey

This report contains a survey of the state of the art in software engineering for secure software. Secure software is defined and techniques used in each phase of the software lifecycle to engineer the development of secure software are described. Also identified are open questions and areas where further research is needed. The survey reported here was undertaken to understand how the practice...

متن کامل

CERIAS Tech Report 2005-67 SOFTWARE ENGINEERING FOR SECURE SOFTWARE - STATE OF THE ART: A SURVEY

This report contains a survey of the state of the art in software engineering for secure software. Secure software is defined and techniques used in each phase of the software lifecycle to engineer the development of secure software are described. Also identified are open questions and areas where further research is needed. The survey reported here was undertaken to understand how the practice...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Towards Building Secure Software Systems

Software security breaches are now very extremely common and a larger percentage is caused by software design defects. Since individuals and organizations now completely depend on software systems for their day-to-day operations, it is then important to produce secure software products. This paper discusses the problems of producing secure software products and provides a model for improving so...

متن کامل

Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture

This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Object Technology

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2005