Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] What Do We Know about Software Security Evaluation? A Preliminary Study.
In software development, software quality is nowadays acknowledged to be as important as
software functionality and there exists an extensive body-of-knowledge on the topic. Yet …
software functionality and there exists an extensive body-of-knowledge on the topic. Yet …
Resolving least privilege violations in software architectures
K Buyens, B De Win, W Joosen - 2009 ICSE Workshop on …, 2009 - ieeexplore.ieee.org
Supporting a security principle, such as least privilege, in a software architecture is difficult.
Systematic rules are lacking, no guidance explains how to apply the principle in practice. As …
Systematic rules are lacking, no guidance explains how to apply the principle in practice. As …
Measuring the interplay of security principles in software architectures
Security principles like least privilege and attack surface reduction play an important role in
the architectural phase of security engineering processes. However, the interplay between …
the architectural phase of security engineering processes. However, the interplay between …
Costs of security in the PFS file system
K Walsh, F Schneider - 2012 - ecommons.cornell.edu
Various principles have been proposed for the design of trustworthy systems. But there is
little data about their impact on system performance. A filesystem that pervasively …
little data about their impact on system performance. A filesystem that pervasively …
[PDF][PDF] Authorization and trust in software systems
K Walsh - 2012 - ecommons.cornell.edu
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning
about credentials and authorization policies. It extends prior access control logics that are …
about credentials and authorization policies. It extends prior access control logics that are …
[PDF][PDF] Measuring Attack Surface in Software Architecture (CMU-ISR-11-121)
J Gennari, D Garlan - 2012 - reports-archive.adm.cs.cmu.edu
In this report we show how to adapt the notion of “attack surface” to formally evaluate
security properties at the architectural level of design and to identify vulnerabilities in …
security properties at the architectural level of design and to identify vulnerabilities in …
[PDF][PDF] Adaptive PoLP: Tailoring Least Privilege Access Controls for Dynamic IoT Environments
M Bibi, M Zadi, H Mehar, A Razzaq, M Shaikh - researchgate.net
As the Internet of Things (IoT) becomes more interconnected, it is critical to make sure
security measures are strong. Because of the dynamic nature of IoT contexts, traditional …
security measures are strong. Because of the dynamic nature of IoT contexts, traditional …
[PDF][PDF] Automated detection and resolution of least privilege violations in software architectures
Supporting security principles, like least privilege, in a software architecture is difficult due to
the lack of both a sound theory and effective secure software engineering practices. As a …
the lack of both a sound theory and effective secure software engineering practices. As a …
[PDF][PDF] Trust in a Principled Filesystem
K Walsh, FB Schneider - Citeseer
Users typically have little reason to trust that systems will protect user data against
unauthorized access. A prototype filesystem stack was implemented with a structure …
unauthorized access. A prototype filesystem stack was implemented with a structure …
[HTML][HTML] Publications DISTRINET
DNRD Bites, DN Seminars - cs.kuleuven.be
Gupta, Sandeep; Buriro, Attaullah; Crispo, Bruno: A chimerical dataset combining
physiological and behavioral biometric traits for reliable user authentication on smart …
physiological and behavioral biometric traits for reliable user authentication on smart …