International Symposium on Engineering Secure Software and Systems

نویسندگان

  • Maritta Heisel
  • Eda Marchetti
  • Harsha K. Kalutarage
  • Siraj A. Shaikh
  • Qin Zhou
  • Alexander van den Berghe
  • Riccardo Scandariato
چکیده

The Future Internet is posing new security challenges as their scenarios are bringing together a huge amount of stakeholders and devices that must interact under unforeseeable conditions. In addition, in these scenarios we cannot expect entities to know each other beforehand, and therefore, they must be involved in risky and uncertain collaborations. In order to minimize threats and security breaches, it is required that a well-informed decision-making process is in place, and it is here where trust and reputation can play a crucial role. Unfortunately, services and applications developers are often unarmed to address trust and reputation requirements in these scenarios. To overcome this limitation, we propose a trust and reputation framework that allows developers to create trustand reputation-aware applications. Supervisors: Carmen Fernandez-Gago and Javier Lopez

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Regression Testing, Spoken Language, Crash-Inducing Commits, UML, and Legal Policy

THIS MONTH’S COLUMN reports on papers from the 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, the 11th International Conference on Predictive Models and Data Analytics in Software Engineering, and the 2015 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems. Feedback or suggestions are welcome. In addition, if you try or ...

متن کامل

Advances in Rule Interchange and Applications, International Symposium, RuleML 2007, Orlando, Florida, October 25-26, 2007, Proceedings

Title Type advances in rule interchange and applications international symposium ruleml 2007 orlando florida PDF rule based reasoning programming and applications 5th international symposium ruleml 2011 europ PDF advances in computation and intelligence second international symposium isica 2007 wuhan china s PDF stochastic algorithms foundations and applications 4th international symposium saga...

متن کامل

Security Engineering towards Building a Secure Software

Information Systems Security is one of the most critical challenges presently facing nearly every one of the organizations. However, making certain security and quality in both information and the systems which control information is a difficult goal necessitating the mixture of two wide research disciplines which are typically separate: security engineering and secure software engineering. Sec...

متن کامل

The Gap Between Academic Research and Industrial Practice in Software Testing

Name Abbr. Type Papers (2014) Software Testing, Verification and Reliability STVR journal 24 / year International Conference on Software Testing, Verification and Validation ICST conf. 141 submitted 40 accepted International Symposium on Software Testing and Analysis ISSTA conf. 128 submitted 36 accepted International Conference on Testing Software and Systems ICTSS conf. 36 submitted 17 accept...

متن کامل

Educators' Symposium of the Acm / Ieee 8th International Conference on Model Driven Engineering Languages and Systems (formerly the Uml Series of Conferences) Symposium Chair Symposium Co-chair Program Committee Teaching Experiences with Uml at the University of Texas at Dallas

This paper reports the recent experiences of four different instructors in teaching graduate-level software engineering courses using UML. Due to different backgrounds of the instructors, the courses were organized and taught using different textbooks and with different focuses. The experiences are organized from several different perspectives: the role and issues of UML in object-oriented mode...

متن کامل

Secure Tropos: a Security-Oriented Extension of the Tropos Methodology

Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013