Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Building safe PaaS clouds: A survey on security in multitenant software platforms
This paper surveys the risks brought by multitenancy in software platforms, along with the
most prominent solutions proposed to address them. A multitenant platform hosts and …
most prominent solutions proposed to address them. A multitenant platform hosts and …
Attack surface definitions: A systematic literature review
Abstract Context Michael Howard conceptualized the attack surface of a software system as
a metaphor for risk assessment during the development and maintenance of software. While …
a metaphor for risk assessment during the development and maintenance of software. While …
Map** the field of software life cycle security metrics
Context: Practitioners establish a piece of software's security objectives during the software
development process. To support control and assessment, practitioners and researchers …
development process. To support control and assessment, practitioners and researchers …
A cloud design for user-controlled storage and processing of sensor data
Ubiquitous sensing environments such as sensor networks collect large amounts of data.
This data volume is destined to grow even further with the vision of the Internet of Things …
This data volume is destined to grow even further with the vision of the Internet of Things …
Benchmarking cloud security level agreements using quantitative policy trees
While the many economic and technological advantages of Cloud computing are apparent,
the migration of key sector applications onto it has been limited, in part, due to the lack of …
the migration of key sector applications onto it has been limited, in part, due to the lack of …
I-JVM: a Java virtual machine for component isolation in OSGi
The OSGi framework is a Java-based, centralized, component oriented platform. It is being
widely adopted as an execution environment for the development of extensible applications …
widely adopted as an execution environment for the development of extensible applications …
Maintaining user control while storing and processing sensor data in the cloud
Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing
large amounts of data. Eventually, sensor networks will automatically collect such data. A …
large amounts of data. Eventually, sensor networks will automatically collect such data. A …
ModGuard : Identifying Integrity & Confidentiality Violations in Java Modules
With version 9, Java has been given the new module system Jigsaw. Major goals were to
simplify maintainability of the JDK and improve its security by encapsulating modules' …
simplify maintainability of the JDK and improve its security by encapsulating modules' …
Liability in software engineering: overview of the LISE approach and illustration on a case study
LISE is a multidisciplinary project involving lawyers and computer scientists with the aim to
put forward a set of methods and tools to (1) define software liability in a precise and …
put forward a set of methods and tools to (1) define software liability in a precise and …
[PDF][PDF] Security indicators–a state of the art survey public report
M Rudolph, R Schwarz - FhG IESE VII (043), 2012 - publica.fraunhofer.de
Measurement is one of the foundations of sound engineering practices, because—as Tom
DeMarco put it—you cannot control what you can't measure. This principle should also apply …
DeMarco put it—you cannot control what you can't measure. This principle should also apply …