Software security assurance

Results: 433



#Item
1

DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2018-04-09 14:09:44
    2Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Internet privacy / Human security / Software security assurance

    Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models Paul Dourish, Jessica Delgado de la Flor, and Melissa Joseph School of Information and Computer Science University of California, I

    Add to Reading List

    Source URL: www.andrewpatrick.ca

    Language: English - Date: 2003-01-16 18:02:06
    3Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

    IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

    Add to Reading List

    Source URL: www.tsc.com

    Language: English - Date: 2015-10-14 13:33:57
    4Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

    Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

    Add to Reading List

    Source URL: www.safecode.org

    Language: English - Date: 2015-11-20 16:43:16
    5Computer security / Security / Computing / Software testing / Security Target / Vulnerability / Evaluation Assurance Level / Kernel / Common Criteria / Open-source movement

    Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

    Add to Reading List

    Source URL: www.atsec.com

    Language: English - Date: 2015-09-10 07:41:12
    6Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

    Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2011-12-15 18:21:30
    7Software engineering / Software / Quality management / Software testing / Software review / Quality assurance / Hacking / Vulnerability / Code review / Coverity / Static program analysis / FindBugs

    Collaborative Security Code-Review Towards Aiding Developers Ensure Software-Security Hala Assal∗, Jeff Wilson, Sonia Chiasson, and Robert Biddle School of Computer Science Carleton University Ottawa, Canada

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2015-07-03 02:38:45
    8Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

    Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

    Add to Reading List

    Source URL: www.notablesoftware.com

    Language: English - Date: 2007-02-28 16:29:24
    9Security / Access control / Computer security / Computer access control / Social information processing / Role-based access control / PERMIS / Web 2.0 / Social software / Attribute-Based Access Control

    Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

    Add to Reading List

    Source URL: www.infosys.tuwien.ac.at

    Language: English - Date: 2012-06-04 07:35:14
    10Multilevel security / John Rushby / Lynx Software Technologies / Milliradian / Mill / Assurance services / Computing / Software / Technology

    MILS Research and Development: Accomplishments and Ongoing Work Rance DeLong∗ November 15, 2011 Abstract

    Add to Reading List

    Source URL: fm.csl.sri.com

    Language: English - Date: 2011-12-15 18:21:31
    UPDATE