Using UMLsec and goal trees for secure systems development
Proceedings of the 2002 ACM symposium on Applied computing
Information leakage from optical emanations
ACM Transactions on Information and System Security (TISSEC)
Security attribute evaluation method: a cost-benefit approach
Proceedings of the 24th International Conference on Software Engineering
Dependability of embedded systems
Proceedings of the 24th International Conference on Software Engineering
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Secure systems development based on the common criteria: the PalME project
Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering
Automated Software Engineering
Desert Island Reading: A Software Engineering Perspective
Automated Software Engineering
Secure systems development based on the common criteria: the PalME project
ACM SIGSOFT Software Engineering Notes
Denial of Service in Sensor Networks
Computer
Can We Ever Build Survivable Systems from COTS Components?
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Designing Secure Integration Architectures
ICCBSS '03 Proceedings of the Second International Conference on COTS-Based Software Systems
The Correctness of Crypto Transaction Sets (Discussion)
Revised Papers from the 8th International Workshop on Security Protocols
Encapsulating Rules of Prudent Security Engineering
Revised Papers from the 9th International Workshop on Security Protocols
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Optical Fault Induction Attacks
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Designing a distributed access control processor for network services on the Web
Proceedings of the 2002 ACM workshop on XML security
A novel architecture for power maskable arithmetic units
Proceedings of the 13th ACM Great Lakes symposium on VLSI
Journal of Biomedical Informatics
Computer security: theory, process and management
Journal of Computing Sciences in Colleges
Energy-aware design techniques for differential power analysis protection
Proceedings of the 40th annual Design Automation Conference
Computing systems dependability
Proceedings of the 25th International Conference on Software Engineering
Privacy-enhancing technologies: approaches and development
Computer Standards & Interfaces
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Assurance in life/nation critical endeavors a panel
Proceedings of the 2002 workshop on New security paradigms
From the Ground Up: The DIMACS Software Security Workshop
IEEE Security and Privacy
Cryptography and competition policy: issues with 'trusted computing'
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Formally Testing Fail-Safety of Electronic Purse Protocols
Proceedings of the 16th IEEE international conference on Automated software engineering
Balancing performance and flexibility with hardware support for network architectures
ACM Transactions on Computer Systems (TOCS)
Delay-based circuit authentication and applications
Proceedings of the 2003 ACM symposium on Applied computing
Efficient Memory Integrity Verification and Encryption for Secure Processors
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
A secure fingerprint matching technique
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Inter-personnel communications and network security procedures
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
Secure object identification: or: solving the Chess Grandmaster Problem
Proceedings of the 2003 workshop on New security paradigms
An Introduction to Computing System Dependability
Proceedings of the 26th International Conference on Software Engineering
IBM Systems Journal
Network Awareness for Mobile Agents on Ad Hoc Networks
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
A First Step Towards Formal Verification of Security Policy Properties for RBAC
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
Display-only file server: a solution against information theft due to insider attack
Proceedings of the 4th ACM workshop on Digital rights management
Enforcing security and safety models with an information flow analysis tool
Proceedings of the 2004 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Sound development of secure service-based systems
Proceedings of the 2nd international conference on Service oriented computing
Data protection and data sharing in telematics
Mobile Networks and Applications
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Training a wireless sensor network
Mobile Networks and Applications
IEEE Security and Privacy
Timing the Application of Security Patches for Optimal Uptime
LISA '02 Proceedings of the 16th USENIX conference on System administration
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
The user non-acceptance paradigm: INFOSEC's dirty little secret
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Omnivore: risk management through bidirectional transparency
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions
Proceedings of the 32nd annual international symposium on Computer Architecture
An agent-based approach to security service
Journal of Network and Computer Applications
A Portal for Software Security
IEEE Security and Privacy
A secure architectural description language for agent systems
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Microcoded coprocessor for embedded secure biometric authentication systems
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
International Journal of Human-Computer Studies
EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Service Discovery in Pervasive Computing Environments
IEEE Pervasive Computing
IEEE Security and Privacy
A framework for security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Password management strategies for online accounts
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Protecting domestic power-line communications
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Ad hoc extensibility and access control
ACM SIGOPS Operating Systems Review
Law-abiding and integrity on the internet: a case for agents
Artificial Intelligence and Law
Anonymity and software agents: an interdisciplinary challenge
Artificial Intelligence and Law
Putting the Tools to Work: How to Succeed with Source Code Analysis
IEEE Security and Privacy
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Trustworthy software systems: a discussion of basic concepts and terminology
ACM SIGSOFT Software Engineering Notes
Electronic Notes in Theoretical Computer Science (ENTCS)
M-TREE: a high efficiency security architecture for protecting integrity and privacy of software
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Cryptographic voting protocols: a systems perspective
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Design methods for security and trust
Proceedings of the conference on Design, automation and test in Europe
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Controlled physical random functions and applications
ACM Transactions on Information and System Security (TISSEC)
Efficient and secure fingerprint verification for embedded devices
EURASIP Journal on Applied Signal Processing
Embedded security in a pervasive world
Information Security Tech. Report
Centralized Web Proxy Services: Security and Privacy Considerations
IEEE Internet Computing
Aegis: A Single-Chip Secure Processor
IEEE Design & Test
The security of the Fiat--Shamir scheme in the presence of transient hardware faults
ACM Transactions on Embedded Computing Systems (TECS)
A security system implementation using software agents
International Journal of High Performance Computing and Networking
Secure information systems engineering: a manifesto
International Journal of Electronic Security and Digital Forensics
Active hardware metering for intellectual property protection and security
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Recovering data from USB flash memory sticks that have been damaged or electronically erased
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Information Sciences: an International Journal
Re-engineering Xen internals for higher-assurance security
Information Security Tech. Report
Journal of Systems and Software
EPIC: ending piracy of integrated circuits
Proceedings of the conference on Design, automation and test in Europe
Verifying Design with Proof Scores
Verified Software: Theories, Tools, Experiments
Syntactic Validation of Web Services Security Policies
ICSOC '07 Proceedings of the 5th international conference on Service-Oriented Computing
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Models in Software Engineering
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Development of E-Learning Design Criteria with Secure Realization Concepts
ISSEP '08 Proceedings of the 3rd international conference on Informatics in Secondary Schools - Evolution and Perspectives: Informatics Education - Supporting Computational Thinking
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Active control and digital rights management of integrated circuit IP cores
CASES '08 Proceedings of the 2008 international conference on Compilers, architectures and synthesis for embedded systems
Electronic Emissions Security: Danger in the Air
Information Systems Management
BootJacker: compromising computers using forced restarts
Proceedings of the 15th ACM conference on Computer and communications security
Strategic planning for the computer science security
WSEAS Transactions on Computers
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Towards the development of privacy-aware systems
Information and Software Technology
Data and information security (DIS) for BS and MS programs: a proposal
ACM SIGCSE Bulletin
Lest we remember: cold boot attacks on encryption keys
SS'08 Proceedings of the 17th conference on Security symposium
Techniques for Design and Implementation of Secure Reconfigurable PUFs
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
A security approach for off-chip memory in embedded microprocessor systems
Microprocessors & Microsystems
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
Editorial: Model-Driven Development for secure information systems
Information and Software Technology
A coding-theoretic approach for efficient message verification over insecure channels
Proceedings of the second ACM conference on Wireless network security
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Model-based reasoning on the achievement of business goals
Proceedings of the 2009 ACM symposium on Applied Computing
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
Modeling and analysis of security trade-offs - A goal oriented approach
Data & Knowledge Engineering
RBAC-MAS and SODA: Experimenting RBAC in AOSE
Engineering Societies in the Agents World IX
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Personal information and privacy in E-commerce application
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
A new watermarking approach for relational data
Proceedings of the 46th Annual Southeast Regional Conference on XX
BLINK: pixel-domain encryption for secure document management
Proceedings of the 11th ACM workshop on Multimedia and security
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
Hardware Trojan horse detection using gate-level characterization
Proceedings of the 46th Annual Design Automation Conference
A novel H.264 SVC encryption scheme for secure bit-rate transcoding
PCS'09 Proceedings of the 27th conference on Picture Coding Symposium
Toward Reasoning about Security Protocols: A Semantic Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
Breaking the Model: Finalisation and a Taxonomy of Security Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Multiparty Contract Signing Over a Reliable Network
Electronic Notes in Theoretical Computer Science (ENTCS)
AEGIS: A single-chip secure processor
Information Security Tech. Report
Towards multilaterally secure computing platforms-with open source and trusted computing
Information Security Tech. Report
Basing cryptographic protocols on tamper-evident seals
Theoretical Computer Science
Secure transcoders for single layer video data
Image Communication
Retrofitting security into a web-based information system
ICWE'03 Proceedings of the 2003 international conference on Web engineering
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Security for whom? the shifting security assumptions of pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A goal oriented approach for modeling and analyzing security trade-offs
ER'07 Proceedings of the 26th international conference on Conceptual modeling
Position statement in RFID S&P panel: RFID and the middleman
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Trusted computing: special aspects and challenges
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
RISE'06 Proceedings of the 3rd international conference on Rapid integration of software engineering techniques
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Low-level software security: attacks and defenses
Foundations of security analysis and design IV
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Hierarchies of keys in secure multicast communications
Journal of Computer Security
Biometrics for Electronic Health Records
Journal of Medical Systems
IPv6 stateless address autoconfiguration considered harmful
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Lightweight modeling and analysis of security concepts
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
IEEE/ACM Transactions on Networking (TON)
Basis for an integrated security ontology according to a systematic review of existing proposals
Computer Standards & Interfaces
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
J-PAKE: authenticated key exchange without PKI
Transactions on computational science XI
Systematic design of secure Mobile Grid systems
Journal of Network and Computer Applications
Fighting the 'good' internet war
Security'08 Proceedings of the 16th International conference on Security protocols
Password authenticated key exchange by juggling
Security'08 Proceedings of the 16th International conference on Security protocols
Behavioral biometrics for persistent single sign-on
Proceedings of the 7th ACM workshop on Digital identity management
Evaluation of the existing security patterns in software security
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
Federated identity-management protocols
Proceedings of the 11th international conference on Security Protocols
Assessing the risk of an information infrastructure through security dependencies
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
ACM SIGCAS Computers and Society
Basing cryptographic protocols on tamper-evident seals
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
A survey of security in multi-agent systems
Expert Systems with Applications: An International Journal
The dancing bear: a new way of composing ciphers
SP'04 Proceedings of the 12th international conference on Security Protocols
A mechanism for secure, fine-grained dynamic provisioning of applications on small devices
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Towards a comprehensive framework for secure systems development
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
FLASCHE – a mechanism providing anonymity for mobile users
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Model-Based security engineering with UML
Foundations of Security Analysis and Design III
Security and trust requirements engineering
Foundations of Security Analysis and Design III
Protecting mass data basing on small trusted agent
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Towards an evaluation methodology for computational trust systems
iTrust'05 Proceedings of the Third international conference on Trust Management
A theoretical model for the average impact of attacks on billing infrastructures
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
On the security of the WinRAR encryption method
ISC'05 Proceedings of the 8th international conference on Information Security
Evaluating access control policies through model checking
ISC'05 Proceedings of the 8th international conference on Information Security
Subspace-based technique for speech encryption
Digital Signal Processing
Cooperative intrusion detection for web applications
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Attacks on port knocking authentication mechanism
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Property-Based broadcast encryption for multi-level security policies
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A technique for strengthening weak passwords in electronic medical record systems
FHIES'11 Proceedings of the First international conference on Foundations of Health Informatics Engineering and Systems
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Future perspectives: the car and its IP-address - a potential safety and security risk assessment
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Cryptanalysis of BGW broadcast encryption schemes for DVD content protection
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Survey and analysis on Security Requirements Engineering
Computers and Electrical Engineering
Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS
International Journal of Fuzzy System Applications
Organizational Patterns for Security and Dependability: From Design to Application
International Journal of Secure Software Engineering
A Secure Data Transmission Mechanism for Cloud Outsourced Data
International Journal of Cloud Applications and Computing
Runtime verification using policy-based approach to control information flow
International Journal of Security and Networks
Mosaic: a secure and practical remote voting system
International Journal of Autonomic Computing
International Journal of Adaptive, Resilient and Autonomic Systems
Adaptable, model-driven security engineering for SaaS cloud-based applications
Automated Software Engineering
Hi-index | 0.01 |
From the Publisher:The first quick reference guide to the do's and don'ts of creating high quality security systems.Ross Anderson, widely recognized as one of the world's foremost authorities on security engineering, presents a comprehensive design tutorial that covers a wide range of applications. Designed for today's programmers who need to build systems that withstand malice as well as error (but have no time to go do a PhD in security), this bookillustrates basic concepts through many real-world system design successes and failures. Topics range from firewalls, through phone phreaking and copyright protection, to frauds against e-businesses. Anderson's book shows how to use a wide range of tools, from cryptology through smartcards to applied psychology. As everything from burglar alarms through heart monitors to bus ticket dispensers starts talking IP, the techniques taught in this book will become vital to everyone who wants to build systems that are secure, dependable and manageable.