EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"International Journal of Secure Software Engineering (IJSSE)"
Narrow search

Narrow search

Year of publication
Subject
All
Security 5 Software Security 4 Agile Software Development 2 Design Patterns 2 Empirical Study 2 Privacy 2 Requirements Engineering 2 Risk Analysis 2 Risk Assessment 2 Web Security 2 Access Control 1 Agent 1 Agile 1 Agile Development 1 Agile Development Approach 1 Agile Method 1 Analytic Hierarchy Process 1 Android 1 Case Study 1 Challenges 1 Classification 1 Closed Source 1 Cloud Security 1 Code Injection 1 Code Obfuscation Techniques 1 Code Transformation 1 Cognitive Informatics 1 Cognitive Information Complexity Measure (CICM) 1 Comparison 1 Continuous Integration 1 Countermeasures 1 Cross-Site Scripting 1 Database 1 Database Security 1 Design 1 Dynamic Code Obfuscation 1 Ericsson AB 1 Fault Injection 1 Fuzzing 1 Fuzzy Logic System 1
more ... less ...
Online availability
All
Undetermined 24
Type of publication
All
Article 24
Language
All
English 24
Author
All
Shahriar, Hossain 3 Cruzes, Daniela Soares 2 Haddad, Hisham 2 Jaatun, Martin Gilje 2 Kalloniatis, Christos 2 Abreu, Rui 1 Adeniran, Olusola 1 Adewumi, Adewole 1 Al-hadhrami, Nasser 1 Arbain, Adila Firdaus Bt 1 Arogundade, Oluwasefunmi ‘Tale 1 Aziz, Benjamin 1 Baca, Dejan 1 Behera, Chandan Kumar 1 Bhaskari, D. Lalitha 1 Boldt, Martin 1 Bulusu, Pranahita 1 Carlsson, Bengt 1 Damasevicius, Robertas 1 Eichler, Jörn 1 Fenz, Stefan 1 Ghani, Imran 1 Gritzalis, Stefanos 1 Haddad, Hisham M. 1 Hosseinian-Far, Amin 1 Hu, Zhenjiang 1 Hyrynsalmi, Sami 1 Islam, Shareeful 1 Jacobsson, Andreas 1 Jimenez, Lina M. 1 Jin, Zhi 1 Kaiya, Haruhiko 1 Kavakli, Evangelia 1 Kettunen, Atte 1 Kontostathis, Kiriakos 1 Lebron, David 1 Leppänen, Ville 1 Li, Yingmei 1 Lupu, Rubana 1 Maskeliunas, Rytis 1
more ... less ...
Published in...
All
International Journal of Secure Software Engineering (IJSSE) 24
Source
All
Other ZBW resources 24
Showing 1 - 10 of 24
Cover Image
A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams
Oyetoyan, Tosin Daniel; Jaatun, Martin Gilje; Cruzes, … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 1, pp. 1-27
Although most organizations understand the need for application security at an abstract level, achieving adequate software security at the sharp end requires taking bold steps to address security practices within the organization. In the Agile software development world, a security engineering...
Persistent link: https://www.econbiz.de/10012048080
Saved in:
Cover Image
Jif-Based Verification of Information Flow Policies for Android Apps
Jimenez, Lina M.; Ochoa, Martin; Rueda, Sandra J. - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 1, pp. 28-42
Android stores and users need mechanisms to evaluate whether their applications are secure or not. Although various previous works use data and control flow techniques to evaluate security features of Android applications, this paper extends those works by using Jif to verify compliance of...
Persistent link: https://www.econbiz.de/10012048081
Saved in:
Cover Image
Case Study of Agile Security Engineering: Building Identity Management for a Government Agency
Rindell, Kalle; Hyrynsalmi, Sami; Leppänen, Ville - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 1, pp. 43-57
Security concerns are increasingly guiding both the design and processes of software-intensive product development. In certain environments, the development of the product requires special security arrangements for development processes, product release, maintenance and hosting, and specific...
Persistent link: https://www.econbiz.de/10012048082
Saved in:
Cover Image
Designing Secure and Privacy-Aware Information Systems
Kalloniatis, Christos; Kavakli, Evangelia; Gritzalis, … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 2, pp. 1-25
Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is...
Persistent link: https://www.econbiz.de/10012048083
Saved in:
Cover Image
Introducing a Novel Security-Enhanced Agile Software Development Process
Boldt, Martin; Jacobsson, Andreas; Baca, Dejan; … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 2, pp. 26-52
In this paper, a novel security-enhanced agile software development process, SEAP, is introduced. It has been designed, tested, and implemented at Ericsson AB, specifically in the development of a mobile money transfer system. Two important features of SEAP are 1) that it includes additional...
Persistent link: https://www.econbiz.de/10012048084
Saved in:
Cover Image
Design Patterns and Design Quality: Theoretical Analysis, Empirical Study, and User Experience
Yu, Liguo; Li, Yingmei; Ramaswamy, Srini - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 2, pp. 53-81
Design patterns are reusable software design solutions to object-oriented programs. Since the initial introduction of the 23 well-known design patterns in 1995, more and more patterns have been identified and utilized in the software industry. The benefits of applying design patterns include...
Persistent link: https://www.econbiz.de/10012048085
Saved in:
Cover Image
A Database of Existing Vulnerabilities to Enable Controlled Testing Studies
Rei, Sofia; Abreu, Rui - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 1-23
From holding worldwide companies' information hostage to keeping several distributed systems down for hours, the last years were marked by several security attacks which are the result of complex software and its fast production. There are already tools which can be used to help companies detect...
Persistent link: https://www.econbiz.de/10012048086
Saved in:
Cover Image
Self-Modifying Code: A Provable Technique for Enhancing Program Obfuscation
Behera, Chandan Kumar; Bhaskari, D. Lalitha - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 24-41
This article describes how code obfuscation techniques aim to conceal the functionality of a program by mystifying the code so that it is unreadable or in an incomprehensible format. Since the objective of this article is to make a program obfuscated, the source code shall appear like normal...
Persistent link: https://www.econbiz.de/10012048087
Saved in:
Cover Image
Goal Modelling for Security Problem Matching and Pattern Enforcement
Washizaki, Hironori; Yu, Yijun; Kaiya, Haruhiko; … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 3, pp. 42-57
This article describes how earlier detection of security problems and the implementation of solutions would be a cost-effective approach for developing secure software systems. Developing, gathering and sharing similar repeatable programming knowledge and solutions has led to the introduction of...
Persistent link: https://www.econbiz.de/10012048088
Saved in:
Cover Image
Risk Centric Activities in Secure Software Development in Public Organisations
Jaatun, Martin Gilje; Cruzes, Daniela Soares; Tøndel, … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 4, pp. 1-30
When working with software security in a risk-centric way, development projects become equipped to make decisions on how much security to include and what type of security pays off. This article presents the results of a study made among 23 public organisations, mapping their risk-centric...
Persistent link: https://www.econbiz.de/10012048089
Saved in:
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...