Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Evolution of security engineering artifacts: a state of the art survey
Security is an important quality aspect of modern open software systems. However, it is
challenging to keep such systems secure because of evolution. Security evolution can only …
challenging to keep such systems secure because of evolution. Security evolution can only …
Deldroid: an automated approach for determination and enforcement of least-privilege architecture in android
Android is widely used for the development and deployment of autonomous and smart
systems, including software targeted for IoT and mobile devices. Security of such systems is …
systems, including software targeted for IoT and mobile devices. Security of such systems is …
Self-protection of android systems from inter-component communication attacks
The current security mechanisms for Android apps, both static and dynamic analysis
approaches, are insufficient for detection and prevention of the increasingly dynamic and …
approaches, are insufficient for detection and prevention of the increasingly dynamic and …
Determination and enforcement of least-privilege architecture in android
Modern mobile platforms rely on a permission model to guard the system's resources and
apps. In Android, since the permissions are granted at the granularity of apps, and all …
apps. In Android, since the permissions are granted at the granularity of apps, and all …
Making least privilege the low-hanging fruit in clouds
Failing to promote the least privilege principle in administration can lead to substantial
vulnerabilities in cloud computing. A malicious insider like a compromised cloud …
vulnerabilities in cloud computing. A malicious insider like a compromised cloud …
Composition of least privilege analysis results in software architectures (position paper)
Security principles are often neglected by software architects, due to the lack of precise
definitions. This results in potentially high-risk threats to systems. Our own previous work …
definitions. This results in potentially high-risk threats to systems. Our own previous work …
Towards Least Privilege Principle: Limiting Unintended Accesses in Software Systems.
BH Ng - 2013 - deepblue.lib.umich.edu
Adhering to the least privilege principle involves ensuring that only legitimate subjects have
access rights to objects. Sometimes, this is hard because of permission irrevocability …
access rights to objects. Sometimes, this is hard because of permission irrevocability …
[PDF][PDF] Connecting Security Requirements and Software Architecture with Patterns (Beveiligingsvereisten en softwarearchitectuur verbinden met patronen)
K Yskout - 2013 - lirias.kuleuven.be
Recurring solutions to software engineering problems are often captured in patterns, which
describe, in a generic but reusable manner, a specific problem and a corresponding …
describe, in a generic but reusable manner, a specific problem and a corresponding …
Extraction of an Architectural Model for Least Privilege Analysis
B Spitz, R Scandariato, W Joosen - International Journal of Secure …, 2012 - igi-global.com
This paper presents the design and implementation of a prototype tool for the extraction of
the so-called Task Execution Model directly from the source code of a software system. The …
the so-called Task Execution Model directly from the source code of a software system. The …