Showing 1 - 9 of 9
When working with software security in a risk-centric way, development projects become equipped to make decisions on how much security to include and what type of security pays off. This article presents the results of a study made among 23 public organisations, mapping their risk-centric...
Persistent link: https://www.econbiz.de/10012048089
Although most organizations understand the need for application security at an abstract level, achieving adequate software security at the sharp end requires taking bold steps to address security practices within the organization. In the Agile software development world, a security engineering...
Persistent link: https://www.econbiz.de/10012048080
This paper describes a methodology for embedding dynamic behaviour into software components. The implications and system architecture requirements to support this adaptivity are discussed. This work is part of a European Commission funded and industry supported project to produce a...
Persistent link: https://www.econbiz.de/10009467313
Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the extensive body of research, BO is still a threat menacing security-critical applications. The authors present a comprehensive systematic review on techniques intended to detecting BO vulnerabilities...
Persistent link: https://www.econbiz.de/10012048204
Persistent link: https://www.econbiz.de/10004067521
Persistent link: https://www.econbiz.de/10006431709
Software products are often built from commercial-off-the-shelf (COTS) components. When new releases of these components are made available for integration and testing, source code is usually not provided by the COTS vendors. Various regression test selection (RTS) techniques have been developed...
Persistent link: https://www.econbiz.de/10009431146
The overall goal of software testing is to disclose defects efficiently (i.e. minimal time and cost) and effectively (i.e. maximum faults detected). It takes time to understand what to test, to generate test cases, to execute the test suite and to analyze the results. In a situation where one...
Persistent link: https://www.econbiz.de/10009431187
Access control is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) define how access is managed and the high-level rules of who can access what information under certain conditions. Traditionally, access control policies have been...
Persistent link: https://www.econbiz.de/10009431211