EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"International Journal of Secure Software Engineering (IJSSE)"
Narrow search

Narrow search

Year of publication
Subject
All
Security 5 Software Security 4 Agile Software Development 2 Design Patterns 2 Empirical Study 2 Privacy 2 Requirements Engineering 2 Risk Analysis 2 Risk Assessment 2 Web Security 2 Access Control 1 Agent 1 Agile 1 Agile Development 1 Agile Development Approach 1 Agile Method 1 Analytic Hierarchy Process 1 Android 1 Case Study 1 Challenges 1 Classification 1 Closed Source 1 Cloud Security 1 Code Injection 1 Code Obfuscation Techniques 1 Code Transformation 1 Cognitive Informatics 1 Cognitive Information Complexity Measure (CICM) 1 Comparison 1 Continuous Integration 1 Countermeasures 1 Cross-Site Scripting 1 Database 1 Database Security 1 Design 1 Dynamic Code Obfuscation 1 Ericsson AB 1 Fault Injection 1 Fuzzing 1 Fuzzy Logic System 1
more ... less ...
Online availability
All
Undetermined 24
Type of publication
All
Article 24
Language
All
English 24
Author
All
Shahriar, Hossain 3 Cruzes, Daniela Soares 2 Haddad, Hisham 2 Jaatun, Martin Gilje 2 Kalloniatis, Christos 2 Abreu, Rui 1 Adeniran, Olusola 1 Adewumi, Adewole 1 Al-hadhrami, Nasser 1 Arbain, Adila Firdaus Bt 1 Arogundade, Oluwasefunmi ‘Tale 1 Aziz, Benjamin 1 Baca, Dejan 1 Behera, Chandan Kumar 1 Bhaskari, D. Lalitha 1 Boldt, Martin 1 Bulusu, Pranahita 1 Carlsson, Bengt 1 Damasevicius, Robertas 1 Eichler, Jörn 1 Fenz, Stefan 1 Ghani, Imran 1 Gritzalis, Stefanos 1 Haddad, Hisham M. 1 Hosseinian-Far, Amin 1 Hu, Zhenjiang 1 Hyrynsalmi, Sami 1 Islam, Shareeful 1 Jacobsson, Andreas 1 Jimenez, Lina M. 1 Jin, Zhi 1 Kaiya, Haruhiko 1 Kavakli, Evangelia 1 Kettunen, Atte 1 Kontostathis, Kiriakos 1 Lebron, David 1 Leppänen, Ville 1 Li, Yingmei 1 Lupu, Rubana 1 Maskeliunas, Rytis 1
more ... less ...
Published in...
All
International Journal of Secure Software Engineering (IJSSE) 24
Source
All
Other ZBW resources 24
Showing 11 - 20 of 24
Cover Image
LDAP Vulnerability Detection in Web Applications
Shahriar, Hossain; Haddad, Hisham; Bulusu, Pranahita - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 4, pp. 31-50
Lightweight Directory Access Protocol (LDAP) is commonly used in web applications to provide lookup information and enforcing authentication. Web applications may suffer from LDAP injection vulnerabilities that can lead to security breaches such as login bypass and privilege escalation. This...
Persistent link: https://www.econbiz.de/10012048090
Saved in:
Cover Image
Analysis of Existing Software Cognitive Complexity Measures
Misra, Sanjay; Adewumi, Adewole; Damasevicius, Robertas; … - In: International Journal of Secure Software Engineering (IJSSE) 8 (2017) 4, pp. 51-71
In order to maintain the quality of software, it is important to measure it complexity. This provides an insight into the degree of comprehensibility and maintainability of the software. Measurement can be carried out using cognitive measures which are based on cognitive informatics. A number of...
Persistent link: https://www.econbiz.de/10012048091
Saved in:
Cover Image
Agile Threat Assessment and Mitigation: An Approach for Method Selection and Tailoring
Teichmann, Clemens; Renatus, Stephan; Eichler, Jörn - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 1, pp. 1-16
Security engineering and agile development are often perceived as a clash of cultures. To address this clash, several approaches have been proposed that allow for agile security engineering. Unfortunately, agile development organizations differ in their actual procedures and environmental...
Persistent link: https://www.econbiz.de/10012048068
Saved in:
Cover Image
Evaluation of the Challenges of Developing Secure Software Using the Agile Approach
Ghani, Imran; Arbain, Adila Firdaus Bt; Oueslati, Hela; … - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 1, pp. 17-37
A set of challenges of developing secure software using the agile development approach and methods are reported in the literature. This paper reports about a systematic literature review to identify these challenges and evaluate the causes of each of these challenges, with respect to the agile...
Persistent link: https://www.econbiz.de/10012048069
Saved in:
Cover Image
Steps Towards Fuzz Testing in Agile Test Automation
Pietikäinen, Pekka; Kettunen, Atte; Röning, Juha - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 1, pp. 38-52
Including and automating secure software development activities into agile development processes is challenging. Fuzz testing is a practical method for finding vulnerabilities in software, but has some characteristics that do not directly map to existing processes. The main challenge is that...
Persistent link: https://www.econbiz.de/10012048070
Saved in:
Cover Image
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications
Shahriar, Hossain; Haddad, Hisham - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 2, pp. 1-18
This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research challenge of finding enough historical data to compute the probability of vulnerabilities and exploitations. They develop a...
Persistent link: https://www.econbiz.de/10012048071
Saved in:
Cover Image
The Case for Privacy Awareness Requirements
Omoronyia, Inah - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 2, pp. 19-36
Privacy awareness is a core determinant of the success or failure of privacy infrastructures: if systems and users are not aware of potential privacy concerns, they cannot effectively discover, use or judge the effectiveness of privacy management capabilities. Yet, privacy awareness is only...
Persistent link: https://www.econbiz.de/10012048072
Saved in:
Cover Image
An Incremental B-Model for RBAC-Controlled Electronic Marking System
Aziz, Benjamin; Al-hadhrami, Nasser; Othmane, Lotfi ben - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 2, pp. 37-64
The incremental development of software through the addition of new features and the insertion of new access rules potentially renders the access control models inconsistent and creates security flaws. This paper proposes modeling Role Based Access Control (RBAC) models of these software using...
Persistent link: https://www.econbiz.de/10012048073
Saved in:
Cover Image
Towards Ontological Approach to Security Risk Analysis of Information System: Model and Architecture
Arogundade, Oluwasefunmi ‘Tale; Adeniran, Olusola; … - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 3, pp. 1-25
Resource allocation decisions can be enhanced by performing risk assessment during the early development phase. In order to improve and maintain the security of the Information System (IS, hereafter), there is need to build risk analysis model that can dynamically analyze threat data collected...
Persistent link: https://www.econbiz.de/10012048074
Saved in:
Cover Image
An Exploratory Study of the Security Design Pattern Landscape and their Classification
Ponde, Poonam; Shirwaikar, Shailaja - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 3, pp. 26-43
Security is a critical part of information systems and must be integrated into every aspect of the system. It requires a lot of expertise to design and implement secure systems due to the broad coverage of security issues and threats. A good system design is based on sound software engineering...
Persistent link: https://www.econbiz.de/10012048075
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...