Secure software engineering teaching modules
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
On the Secure Software Development Process: CLASP and SDL Compared
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Checking threat modeling data flow diagrams for implementation conformance and security
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Applying an open application security process to a clinical information system: a case study
Proceedings of the 2008 C3S2E conference
Guidelines for secure software development
Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Threat analysis for hardware and software products using HazOP
CIS'09 Proceedings of the international conference on Computational and information science 2009
On lightweight mobile phone application certification
Proceedings of the 16th ACM conference on Computer and communications security
Resolving least privilege violations in software architectures
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Security considerations in m-learning: threats and countermeasures
Advanced Technology for Learning
Low-level software security: attacks and defenses
Foundations of security analysis and design IV
On the effectiveness of unit test automation at Microsoft
ISSRE'09 Proceedings of the 20th IEEE international conference on software reliability engineering
Unified modeling of attacks, vulnerabilities and security activities
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Harmonizing privacy with security principles and practices
IBM Journal of Research and Development
The benefit of the CSSLP certification for educators and professionals
Journal of Computing Sciences in Colleges
Analyzing security architectures
Proceedings of the IEEE/ACM international conference on Automated software engineering
An automatic approach to aid process integration within a secure software processes family
ICSP'10 Proceedings of the 2010 international conference on New modeling concepts for today's software processes: software process
Automated detection of least privilege violations in software architectures
ECSA'10 Proceedings of the 4th European conference on Software architecture
Proceedings of the 26th Annual Computer Security Applications Conference
Middleware support for complex and distributed security services in multi-tier web applications
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
After-life vulnerabilities: a study on firefox evolution, its vulnerabilities, and fixes
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Agile development with security engineering activities
Proceedings of the 2011 International Conference on Software and Systems Process
SAGE: whitebox fuzzing for security testing
Communications of the ACM
SAGE: Whitebox Fuzzing for Security Testing
Queue - Networks
Software security for small development teams: a case study
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Mathematical and Computer Modelling: An International Journal
Network Security
Does organizing security patterns focus architectural choices?
Proceedings of the 34th International Conference on Software Engineering
Pattern-Based context establishment for service-oriented architectures
Software Service and Application Engineering
Point-and-shoot security design: can we build better tools for developers?
Proceedings of the 2012 workshop on New security paradigms
Incremental development of large, secure smart card applications
Proceedings of the Workshop on Model-Driven Security
Threat and Risk-Driven Security Requirements Engineering
International Journal of Mobile Computing and Multimedia Communications
Agile Software Development: The Straight and Narrow Path to Secure Software?
International Journal of Secure Software Engineering
Building Secure Software Using XP
International Journal of Secure Software Engineering
Not Ready for Prime Time: A Survey on Security in Model Driven Development
International Journal of Secure Software Engineering
Interactive support for secure programming education
Proceeding of the 44th ACM technical symposium on Computer science education
Billions and billions of constraints: whitebox fuzz testing in production
Proceedings of the 2013 International Conference on Software Engineering
POSTER: Critique of the CISSP common body of knowledge of cryptography
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Secure development tool adoption in open-source
Proceedings of the 2013 companion publication for conference on Systems, programming, & applications: software for humanity
Social influences on secure development tool adoption: why security tools spread
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Teaching secure coding for beginning programmers
Journal of Computing Sciences in Colleges
Hi-index | 0.02 |
This introduction to the Security Development Lifecycle (SDL) provides a history of the methodology and guides you through each stage of a proven process-from design to release-that helps minimize security defects.