On the Secure Software Development Process: CLASP and SDL Compared
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Supporting Security Monitor-Aware Development
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
An Analysis of the Security Patterns Landscape
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Automated Test Generation for Access Control Policies via Change-Impact Analysis
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Building Anti-Phishing Browser Plug-Ins: An Experience Report
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
A Smart Fuzzer for x86 Executables
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Using Automated Fix Generation to Secure SQL Statements
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
A Threat Model Driven Approach for Security Testing
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Hi-index | 0.00 |
The theme of this year of the International Conference on Software Engineering is about "Developing Dependable Software", acknowledging the fact that our lives depend directly on several complex software-based systems. The Internet connects and enables a growing list of critical activities from which people expect services and revenues. They should be able to trust these systems to provide data and elaborations with a degree of confidentiality, integrity, and availability compatible with their needs. The pervasiveness of software products in the creation of critical infrastructures has raised the value of trustworthiness and new efforts should be dedicated to achieve it. Yet, nowadays almost every application has some kind of security requirement even if its use is not to be considered critical.