نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

2017
Winston Chong Lee Shen

Learning today has shifted from face-to-face curriculum to distance learning. Recent advances in distance learning bring major changes in education and educators take different roles in teaching courses. As technology offers a great potential for distance learning, many schools have been adopting this innovative approach. This paper explores a project undertaken by a large US university. We exa...

2008
Farhad Foroughi

The information security strategic plan is necessarily comprehensive, including business processes, people, and physical infrastructure, as well as the information system. The Security risk evaluation needs the calculating asset value to predict the impact and consequence of security incidents. The return on security investment (ROSI) is defining the value for all invested in terms of security ...

Journal: :Information & Software Technology 2015
Katerina Goseva-Popstojanova Andrei Perhinschi

Context: Static analysis of source code is a scalable method for discovery of software faults and security vulnerabilities. Techniques for static code analysis have matured in the last decade and many tools have been developed to support automatic detection. Objective: This research work is focused on empirical evaluation of the ability of static code analysis tools to detect security vulnerabi...

2017
Z. Cliffe Schreuders Thomas Shaw Mohammad Shan-A.-Khuda Gajendra Ravichandran Jason Keighley Mihai Ordean

Computer security students benefit from hands-on experience applying security tools and techniques to attack and defend vulnerable systems. Virtual machines (VMs) provide an effective way of sharing targets for hacking. However, developing these hacking challenges is time consuming, and once created, essentially static. That is, once the challenge has been "solved" there is no remaining challen...

2010
Said Jafari Fredrick Mtenzi Ronan Fitzpatrick Brendan O’Shea

Information sharing among different healthcare organizations is critical for efficient and cost effective healthcare service delivery. Healthcare organisations with information systems need to be interconnected to ensure information exchange. Interconnectivity increases exposure to risk of damage, loss and fraud. Security and privacy of patients’ information are concerns of all healthcare organ...

Journal: :IACR Cryptology ePrint Archive 2014
Tsz Hon Yuen Sherman S. M. Chow Cong Zhang Siu-Ming Yiu

Boneh-Boyen signatures are widely used in many advanced cryptosystems. It has a structure of “inversion in the exponent”, and its unforgeability against q chosen-messages attack is proven under the non-static q-Strong Diffie-Hellman assumption. It has been an open problem whether the exponent-inversion signature, and its various applications, can be proved based on a weaker static assumption. W...

 The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...

2016
George Spanoudakis

Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates that security characteristics should be considered from the early stages of the software development life cycle and should not be added as another layer in the system on an ad-hoc basis after the system is built. In ...

2015
Hanmeet Kaur Brar Puneet Jai Kaur

Static analysis tools check the software for potential vulnerabilities and hence software security is improved with their usage. They prevent a wide range of difficulties those one can face at a later stage, in case, the flaws are not detected at an early stage in Software Development Life Cycle. For static analysis, a number of static analysis tools are available nowadays, which include both c...

2015
Hanmeet Kaur Brar Puneet Jai Kaur R. Jetley B. Chelf H. K. Brar P. J. Kaur Vincenzo Ciriello Gabriella Carrozza

Static code analysis is a software verification activity in which source code is scrutinized for quality and security. In a Software Development Lifecycle, timely detection of flaws is beneficial and static analysis tools help us to detect flaws at a very early stage. Both commercial and open source static analysis tools are available today. Due to diverse user requirements and capabilities of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید