学术讨论会 发表于 2025-3-28 15:32:57

Subjectivism, Freedom, and Social-Interest protocols is very difficult and error-prone and most tool-based verification approaches only consider standard security properties such as secrecy or authenticity. In our opinion, application-specific security properties give better guarantees. In this paper we illustrate how to verify properties t

纠缠 发表于 2025-3-28 21:35:40

https://doi.org/10.1007/978-1-4684-4145-1idespread. In these dynamic environments the code that is going to be executed is not known at compile-time, and often not even at application start-up, neither by the application producer nor by the user. This turns reliable, well designed software into a dangerous and potentially malicious softwar

minimal 发表于 2025-3-28 23:36:00

https://doi.org/10.1007/978-1-349-15871-3messages caused by SQL injection from revealing sensitive information. The goal of this research is to assess the relative effectiveness of unit and system level testing of web applications to reveal both error message information leak and SQL injection vulnerabilities. To produce 100% test coverage

Conflagration 发表于 2025-3-29 05:16:12

https://doi.org/10.1007/978-1-349-07984-1between visualization and security: when the application data is protected by an access control policy, the GUI should be aware of this and respect the policy. For example, the GUI should not display options to users for actions that they are not authorized to execute on application data. Taking thi

中止 发表于 2025-3-29 08:20:30

https://doi.org/10.1007/978-3-662-59298-4me pressure. This paper describes how we have addressed this problem by using a collection of modular safeguards, which are tailored to the application domain. These safeguards, which are specific but still fairly atomic, are combined into requirement profiles that seamlessly integrate into the over

花争吵 发表于 2025-3-29 14:29:26

http://reply.papertrans.cn/32/3110/310939/310939_46.png

Malleable 发表于 2025-3-29 19:10:45

Fabio Massacci,Dan Wallach,Nicola ZannoneFast track conference proceeding.Unique visibility.State of the art research

Obstacle 发表于 2025-3-29 23:44:39

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/310939.jpg

Omnipotent 发表于 2025-3-30 02:17:00

https://doi.org/10.1007/978-3-642-11747-3Java; calculus; model checking; program rewriting; security architecture; security assurance; security mea

Decongestant 发表于 2025-3-30 06:50:08

978-3-642-11746-6Springer-Verlag Berlin Heidelberg 2010
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Engineering Secure Software and Systems; Second International Fabio Massacci,Dan Wallach,Nicola Zannone Conference proceedings 2010 Springe