Towards agile security assurance

K Beznosov, P Kruchten - … of the 2004 workshop on New security …, 2004 - dl.acm.org
securitycritical solutions, what do we do about assurance? This paper examines how conventional
security assurance suits … It classifies security assurance methods and techniques with …

[HTML][HTML] Security assurance

SB Lipner - Communications of the ACM, 2015 - dl.acm.org
Assurance affects not only security features but also any system component that will
respond to untrusted input. … In this column, I summarize my experience building a process …

Security assurance for smart contract

E Zhou, S Hua, B Pi, J Sun, Y Nomura… - … Mobility and Security …, 2018 - ieeexplore.ieee.org
… In this paper, we proposed a security assurance method for smart contract source code to
find potential security risks. It contains two main functions, the first is syntax topological …

[PDF][PDF] Security assurance cases: motivation and the state of the art

R Alexander, R Hawkins… - High Integrity Systems …, 2011 - www-users.cs.york.ac.uk
… It appears that the process of creating a security case is compatible with typical evaluation …
experiment with security assurance cases by creating one for a small low-security product, in …

Security assurance: How online service providers can influence security control perceptions and gain trust

S Ray, T Ow, SS Kim - Decision Sciences, 2011 - Wiley Online Library
… The study also examines whether these seemingly undependable perceptions of security
security risks. To address these issues, this study proposes a new theory of security assurance

Security monitoring and information security assurance behaviour among employees: An empirical analysis

Z Ahmad, TS Ong, TH Liew… - … & Computer Security, 2019 - emerald.com
security assurance behaviour, which helps organisations to assess their current practices,
which may nurture or suppress information security… form of information security measure. Third…

[HTML][HTML] System security assurance: a systematic literature review

A Shukla, B Katt, LO Nweke, PK Yeng… - Computer Science …, 2022 - Elsevier
… early detection of security vulnerabilities, development of a security assurance model,
and security assurance tools to maintain and enhance the security of the deployed system. …

A preliminary structure of software security assurance model

RA Khan, SU Khan - Proceedings of the 13th International Conference …, 2018 - dl.acm.org
… In order to improve security processes in the context of SDLC, we will develop Software
Security Assurance Model (SSAM) to assist vendor organisations in measuring their readiness …

SafSec: Commonalities between safety and security assurance

S Lautieri, D Cooper, D Jackson - Constituents of Modern System-safety …, 2005 - Springer
Many systems, particularly in the military domain, must be certified or accredited by both
safety and security authorities. Current practice argues safety and security accreditations …

Software security assurance: a state-of-art report (sar)

KM Goertzel, T Winograd, HL McKinley, LJ Oh… - 2007 - apps.dtic.mil
… expert in software security assurance and information assurance, particularly multilevel …
Security Software Assurance Program and the National Security Agency’s Center for Assured