[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1137627acmconferencesBook PagePublication PagesicseConference Proceedingsconference-collections
SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems
ACM2006 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICSE06: International Conference on Software Engineering Shanghai China May 20 - 21, 2006
ISBN:
978-1-59593-411-6
Published:
20 May 2006
Sponsors:
Next Conference
Reflects downloads up to 26 Dec 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Workshop papers
Article
Towards a structured unified process for software security

Security is often an afterthought when developing software, and is often bolted on late in development or even during deployment or maintenance, through activities such as penetration testing, add-on security software and penetrate-and patch ...

Article
Extending XP practices to support security requirements engineering

This paper proposes a way of extending eXtreme Programming (XP) practices, in particular the original planning game and the coding guidelines, to aid the developers and the customer to engineer security requirements while maintaining the iterative and ...

Article
On instrumenting obfuscated java bytecode with aspects

Code obfuscators are widely used tools for protecting commercial Java software. Advanced obfuscation techniques make de-compiled Java programs not re-compilable, thus greatly raising the barrier of instrumenting Java bytecode for malicious purpose. ...

Article
How secure is AOP and what can we do about it?

From a software engineering perspective, using Aspect-Oriented Programming (AOP) to build secure software has clear advantages. Until recently, the security perspective of this approach has been given less attention, however. This paper analyses the ...

Article
A framework for security requirements engineering

This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on ...

Article
Building problem domain ontology from security requirements in regulatory documents

Establishing secure systems assurance based on Certification and Accreditation (C&A) activities, requires effective ways to understand the enforced security requirements, gather relevant evidences, perceive related risks in the operational environment, ...

Article
Trust and tamper-proof software delivery

Software engineering today relies to a large extent on acquiring and composing software components and other software-related artifacts from different producers, either at design or at run time. For any user of such artifacts, both as developer and as ...

Article
Formal specification and analysis of JAAS framework

This paper reports on our experience of using Alloy for analysis of system design in regard to changes in the security requirements. It presents some of technical details for the specification and analysis of the JAAS framework. The declarative way of ...

Article
A formal approach to sensor placement and configuration in a network intrusion detection system

Network Intrusion Detection Systems (NIDSs) can be composed of a potentially large number of sensors, which monitor the traffic flowing in the network. Deciding where sensors should be placed and what information they need in order to detect the desired ...

Contributors
  • University of Milan
  • KU Leuven
  • University of Milan
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 8 of 11 submissions, 73%
YearSubmittedAcceptedRate
SESS '1111873%
Overall11873%