Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security patterns: A systematic map** study
Security patterns are a well-established means to encapsulate and communicate proven
security solutions and introduce security into the development process. Our objective is to …
security solutions and introduce security into the development process. Our objective is to …
Systematic literature review of security pattern research
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
and operations that often appear in certain contexts. Since the late 1990s, about 500 …
Securing a deployment pipeline
At the RELENG 2014 Q&A, the question was asked,“What is your greatest concern?” and the
response was “someone subverting our deployment pipeline”. That is the motivation for this …
response was “someone subverting our deployment pipeline”. That is the motivation for this …
Vulnerabilities in continuous delivery pipelines? a case study
C Paule, TF Düllmann… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
More and more companies are in the process of adopting modern continuous software
development practices and approaches like continuous integration (CI), continuous delivery …
development practices and approaches like continuous integration (CI), continuous delivery …
[HTML][HTML] P2ISE: preserving project integrity in CI/CD based on secure elements
During the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …
highly automated and flexible one, thanks to the emergence of continuous integration and …
Building deployment pipelines for a production computing service using live pipeline templates
MR Frank, IA Mosher, FWB Jodoin… - US Patent …, 2019 - Google Patents
Techniques are presented for managing a deployment pipe line using an inheritable and
extensible source code tem plate generally referred to as a live pipeline template (LPT). As …
extensible source code tem plate generally referred to as a live pipeline template (LPT). As …
Security support in continuous deployment pipeline
Continuous Deployment (CD) has emerged as a new practice in the software industry to
continuously and automatically deploy software changes into production. Continuous …
continuously and automatically deploy software changes into production. Continuous …
Matching and enforcing deployment pipeline configurations with live pipeline templates
MR Frank, IA Mosher, FWB Jodoin… - US Patent …, 2019 - Google Patents
Techniques are presented for managing a deployment pipe line using an inheritable and
extensible source code tem plate—generally referred to as a live pipeline template (LPT). As …
extensible source code tem plate—generally referred to as a live pipeline template (LPT). As …
[PDF][PDF] Security for Devops deployment processes: Defenses, risks, research directions
N Wilde, B Eddy, K Patel, N Cooper… - International Journal of …, 2016 - academia.edu
DevOps is an emerging collection of software management practices intended to shorten
time to market for new software features and to reduce the risk of costly deployment errors. In …
time to market for new software features and to reduce the risk of costly deployment errors. In …
ICITPM: integrity validation of software in iterative continuous integration through the use of Trusted Platform Module (TPM)
Software development has passed from being rigid and not very flexible, to be automated
with constant changes. This happens due to the creation of continuous integration and …
with constant changes. This happens due to the creation of continuous integration and …