Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Risk Analysis in Software Design
IEEE Security and Privacy
An Integrated Approach to Software Engineering
An Integrated Approach to Software Engineering
Vulnerability analysis For evaluating quality of protection of security policies
Proceedings of the 2nd ACM workshop on Quality of protection
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Security metrics for source code structures
Proceedings of the fourth international workshop on Software engineering for secure systems
Impact of inheritance on vulnerability propagation at design phase
ACM SIGSOFT Software Engineering Notes
Security Vulnerabilities and Mitigation Strategies for Application Development
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Security for whom? the shifting security assumptions of pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Hi-index | 0.00 |
At the current point in the history of information security, companies have spent a lot of time analysing various options for remote access to their information systems. Many of them began with IPsec-based systems to connect different sites. It all seemed simple at first, but as the number of sites (and clients) that needed to be interconnected increased, scalability and interfacing problems began to emerge.