Towards agile security assurance
K Beznosov, P Kruchten - … of the 2004 workshop on
New security …, 2004 - dl.acm.org
… securitycritical solutions, what do we do about assurance? This paper
examines how conventional
security assurance suits … It classifies security assurance methods and techniques with …
security assurance suits … It classifies security assurance methods and techniques with …
[HTML][HTML] Security assurance
SB Lipner - Communications of the ACM, 2015 - dl.acm.org
… Assurance affects not only security features but also any system
component that will
respond to untrusted input. … In this column, I summarize my experience building a process …
respond to untrusted input. … In this column, I summarize my experience building a process …
Security assurance for smart contract
E Zhou, S Hua, B Pi, J
Sun, Y Nomura… - … Mobility and Security …, 2018 - ieeexplore.ieee.org
… In this paper, we proposed a security assurance method for smart
contract source code to
find potential security risks. It contains two main functions, the first is syntax topological …
find potential security risks. It contains two main functions, the first is syntax topological …
[PDF][PDF] Security assurance cases: motivation and the state of the art
R Alexander, R Hawkins… - High Integrity Systems …,
2011 - www-users.cs.york.ac.uk
… It appears that the process of creating a security case is compatible with
typical evaluation …
experiment with security assurance cases by creating one for a small low-security product, in …
experiment with security assurance cases by creating one for a small low-security product, in …
Security assurance: How online service providers can influence security control perceptions and gain trust
… The study also examines whether these seemingly undependable perceptions of
security …
security risks. To address these issues, this study proposes a new theory of security assurance …
security risks. To address these issues, this study proposes a new theory of security assurance …
Security monitoring and information security assurance behaviour among employees: An empirical analysis
… security assurance behaviour, which helps organisations to assess
their current practices,
which may nurture or suppress information security… form of information security measure. Third…
which may nurture or suppress information security… form of information security measure. Third…
[HTML][HTML] System security assurance: a systematic literature review
… early detection of security vulnerabilities, development of a
security assurance model,
and security assurance tools to maintain and enhance the security of the deployed system. …
and security assurance tools to maintain and enhance the security of the deployed system. …
A preliminary structure of software security assurance model
RA Khan, SU Khan -
Proceedings of the 13th International Conference …, 2018 - dl.acm.org
… In order to improve security processes in the context of SDLC, we will
develop Software
Security Assurance Model (SSAM) to assist vendor organisations in measuring their readiness …
Security Assurance Model (SSAM) to assist vendor organisations in measuring their readiness …
SafSec: Commonalities between safety and security assurance
S Lautieri, D Cooper, D Jackson - Constituents of Modern System-safety …, 2005 -
Springer
Many systems, particularly in the military domain, must be certified or accredited by
both
safety and security authorities. Current practice argues safety and security accreditations …
safety and security authorities. Current practice argues safety and security accreditations …
Software security assurance: a state-of-art report (sar)
KM Goertzel, T Winograd, HL McKinley, LJ Oh… - 2007 - apps.dtic.mil
… expert in software security assurance and information
assurance, particularly multilevel …
Security Software Assurance Program and the National Security Agency’s Center for Assured …
Security Software Assurance Program and the National Security Agency’s Center for Assured …