搜索结果: 1-13 共查到“计算机软件 Security”相关记录13条 . 查询时间(0.203 秒)
2017 IEEE国际可靠性,安全性和其他质量冲突与协同研讨会(IEEE International Workshop on Conflicts and Synergies among Reliability, Security, and other Qualities)
2017 IEEE国际 可靠性 安全性 其他质量 冲突 协同 研讨会
2017/6/29
The mastering of software quality is recognized as a key issue in software engineering. Further, it is becoming increasingly important as software currently provides the software qualities of systems ...
2017国际软件安全与保证会议(2017 International Conference on Software Security and Assurance)(ICSSA)
2017年 国际软件安全与保证 会议
2017/6/21
Although many attempts have been made to improve software security over the years, traditional software security research has relied on the tools and techniques focusing on testing (e.g, static analys...
第30届IEEE计算机安全基础研讨会(30th IEEE Computer Security Foundations Symposium)
第30届 IEEE计算机安全基础 研讨会
2017/3/31
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for th...
第2届物联网,大数据和安全国际会议(International Conference on Internet of Things, Big Data and Security)
第2届 物联网 大数据和安全 国际会议
2017/3/30
Internet of Things (IoT) is a platform and a phenomenon that allows everything to process information, communicate data, analyze context collaboratively and in the service or individuals, organization...
2017IEEE欧洲安全和隐私研讨会(2017 IEEE European Symposium on Security and Privacy) (EuroS&P)
欧洲安全和隐私 研讨会
2017/3/21
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and pra...
Static Detection of Security Vulnerabilities in Scripting Languages
Static Detection Security Vulnerabilities Scripting Languages
2016/5/24
We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier ar...
Researchers Tackle Issues Surrounding Security Tools for Software Developers
Researchers Tackle Issues Surrounding Security Tools Software Developers
2015/9/9
For software programmers, security tools are analytic software that can scan or run their code to expose vulnerabilities long before the software goes to market. But these tools can have shortcomings,...
MECA:an Extensible,Expressive System and Language for Statically Checking Security Properties
MECA Extensible Expressive System Statically Checking Security Properties
2015/8/7
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of practical constructs to ef...
广东工业大学计算机学院操作系统英文课件Chapter9 Security。
Database Security and the Problem of Polyinstantiation: a moral scrutiny
Database Security Polyinstantiation moral scrutiny
2009/12/9
In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being th...
Security Analysis of Australian and E.U. E-passport Implementation
Security Analysis of Australian E.U. E-passport Implementation
2014/3/11
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation an...
An Ontology-Driven Approach Applied to Information Security
Information security Security ontologies Security attacks Security defenses
2014/3/11
Software systems have become highly distributed and complex involving independent components working together towards achieving systems’ goals. Meanwhile, security attacks against such systems have in...
Modelling Reusable Security Requirements based on an Ontology Framework
Security Requirements Requirements Reuse Risk Analysis Ontologies
2014/3/11
In recent years, security in Information Systems (IS) has become an important issue, and needs to be taken into account in all stages of IS development, including the early phase of Requirements Engin...