Software engineering for secure systems: industrial and research perspectives
"This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation" - Provided by publisher
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey ; New York
Information Science Reference
[2011]
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | DE-706 DE-1049 DE-898 DE-1050 DE-83 Volltext |
Zusammenfassung: | "This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation" - Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | 1 Online-Ressource (xvii, 370 Seiten) |
ISBN: | 9781615208388 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044294855 | ||
003 | DE-604 | ||
005 | 20220307 | ||
007 | cr|uuu---uuuuu | ||
008 | 170503s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781615208388 |9 978-1-61520-838-8 | ||
024 | 7 | |a 10.4018/978-1-61520-837-1 |2 doi | |
035 | |a (OCoLC)992471248 | ||
035 | |a (DE-599)BVBBV044294855 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1049 |a DE-898 |a DE-1050 |a DE-83 | ||
245 | 1 | 0 | |a Software engineering for secure systems |b industrial and research perspectives |c Haralambos Mouratidis (University of East London, UK) |
264 | 1 | |a Hershey ; New York |b Information Science Reference |c [2011] | |
264 | 4 | |c © 2011 | |
300 | |a 1 Online-Ressource (xvii, 370 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Includes bibliographical references | ||
505 | 8 | |a 1. State of practice in secure software / Bill Whyte, John Harrison -- 2. Using security patterns to develop secure systems / Eduardo Fernandez ... [et al.] -- 3. A pattern-based method to develop secure software / Holger Schmidt, Denis Hatebur, Maritta Heisel -- 4. Security patterns / Armstrong Nhlabatsi ... [et al.] -- 5. Security over the information systems development cycle / C. Blanco ... [et al.] -- 6. Balancing security and performance properties during system architectural design / Siv Houmb ... [et al.] -- 7. State model diagrams / S Maj -- 8. Designing privacy aware information systems / Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis -- 9. Privacy aware systems / Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari -- 10. Incorporating social trust into design practices for secure systems / Piotr Cofta, Hazel Lacoh ee, Paul Hodgson -- 11. Static program analysis of multi-applet JavaCard applications / Alexandros Loizidis, Vasilios Almaliotis, Panagiotis Katsaros -- 12. Automatic timed automata extraction from ladder programs for model-based analysis of control systems / K ezia Oliveira ... [et al.] | |
520 | |a "This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation" - Provided by publisher | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Software engineering | |
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mouratidis, Haralambos |d 1977- |0 (DE-588)1013037197 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61520-837-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-61520-837-2 |
856 | 4 | 0 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-837-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029698885 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-837-1 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-837-1 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-837-1 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-837-1 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-61520-837-1 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138440394407936 |
---|---|
adam_text | |
any_adam_object | |
author2 | Mouratidis, Haralambos 1977- |
author2_role | edt |
author2_variant | h m hm |
author_GND | (DE-588)1013037197 |
author_facet | Mouratidis, Haralambos 1977- |
building | Verbundindex |
bvnumber | BV044294855 |
collection | ZDB-98-IGB ZDB-1-IGE |
contents | 1. State of practice in secure software / Bill Whyte, John Harrison -- 2. Using security patterns to develop secure systems / Eduardo Fernandez ... [et al.] -- 3. A pattern-based method to develop secure software / Holger Schmidt, Denis Hatebur, Maritta Heisel -- 4. Security patterns / Armstrong Nhlabatsi ... [et al.] -- 5. Security over the information systems development cycle / C. Blanco ... [et al.] -- 6. Balancing security and performance properties during system architectural design / Siv Houmb ... [et al.] -- 7. State model diagrams / S Maj -- 8. Designing privacy aware information systems / Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis -- 9. Privacy aware systems / Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari -- 10. Incorporating social trust into design practices for secure systems / Piotr Cofta, Hazel Lacoh ee, Paul Hodgson -- 11. Static program analysis of multi-applet JavaCard applications / Alexandros Loizidis, Vasilios Almaliotis, Panagiotis Katsaros -- 12. Automatic timed automata extraction from ladder programs for model-based analysis of control systems / K ezia Oliveira ... [et al.] |
ctrlnum | (OCoLC)992471248 (DE-599)BVBBV044294855 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV044294855</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220307</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170503s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781615208388</subfield><subfield code="9">978-1-61520-838-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-61520-837-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992471248</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044294855</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software engineering for secure systems</subfield><subfield code="b">industrial and research perspectives</subfield><subfield code="c">Haralambos Mouratidis (University of East London, UK)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey ; New York</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 370 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. State of practice in secure software / Bill Whyte, John Harrison -- 2. Using security patterns to develop secure systems / Eduardo Fernandez ... [et al.] -- 3. A pattern-based method to develop secure software / Holger Schmidt, Denis Hatebur, Maritta Heisel -- 4. Security patterns / Armstrong Nhlabatsi ... [et al.] -- 5. Security over the information systems development cycle / C. Blanco ... [et al.] -- 6. Balancing security and performance properties during system architectural design / Siv Houmb ... [et al.] -- 7. State model diagrams / S Maj -- 8. Designing privacy aware information systems / Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis -- 9. Privacy aware systems / Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari -- 10. Incorporating social trust into design practices for secure systems / Piotr Cofta, Hazel Lacoh ee, Paul Hodgson -- 11. Static program analysis of multi-applet JavaCard applications / Alexandros Loizidis, Vasilios Almaliotis, Panagiotis Katsaros -- 12. Automatic timed automata extraction from ladder programs for model-based analysis of control systems / K ezia Oliveira ... [et al.]</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation" - Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mouratidis, Haralambos</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)1013037197</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61520-837-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-61520-837-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-837-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029698885</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-837-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-837-1</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-837-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-837-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-61520-837-1</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV044294855 |
illustrated | Not Illustrated |
indexdate | 2024-08-23T01:06:31Z |
institution | BVB |
isbn | 9781615208388 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029698885 |
oclc_num | 992471248 |
open_access_boolean | |
owner | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
owner_facet | DE-706 DE-1049 DE-898 DE-BY-UBR DE-1050 DE-83 |
physical | 1 Online-Ressource (xvii, 370 Seiten) |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Software engineering for secure systems industrial and research perspectives Haralambos Mouratidis (University of East London, UK) Hershey ; New York Information Science Reference [2011] © 2011 1 Online-Ressource (xvii, 370 Seiten) txt rdacontent c rdamedia cr rdacarrier Premier reference source Includes bibliographical references 1. State of practice in secure software / Bill Whyte, John Harrison -- 2. Using security patterns to develop secure systems / Eduardo Fernandez ... [et al.] -- 3. A pattern-based method to develop secure software / Holger Schmidt, Denis Hatebur, Maritta Heisel -- 4. Security patterns / Armstrong Nhlabatsi ... [et al.] -- 5. Security over the information systems development cycle / C. Blanco ... [et al.] -- 6. Balancing security and performance properties during system architectural design / Siv Houmb ... [et al.] -- 7. State model diagrams / S Maj -- 8. Designing privacy aware information systems / Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis -- 9. Privacy aware systems / Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari -- 10. Incorporating social trust into design practices for secure systems / Piotr Cofta, Hazel Lacoh ee, Paul Hodgson -- 11. Static program analysis of multi-applet JavaCard applications / Alexandros Loizidis, Vasilios Almaliotis, Panagiotis Katsaros -- 12. Automatic timed automata extraction from ladder programs for model-based analysis of control systems / K ezia Oliveira ... [et al.] "This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation" - Provided by publisher Computer security Software engineering Software Engineering (DE-588)4116521-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Software Engineering (DE-588)4116521-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Mouratidis, Haralambos 1977- (DE-588)1013037197 edt Erscheint auch als Druck-Ausgabe 978-1-61520-837-1 Erscheint auch als Druck-Ausgabe 1-61520-837-2 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-837-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Software engineering for secure systems industrial and research perspectives 1. State of practice in secure software / Bill Whyte, John Harrison -- 2. Using security patterns to develop secure systems / Eduardo Fernandez ... [et al.] -- 3. A pattern-based method to develop secure software / Holger Schmidt, Denis Hatebur, Maritta Heisel -- 4. Security patterns / Armstrong Nhlabatsi ... [et al.] -- 5. Security over the information systems development cycle / C. Blanco ... [et al.] -- 6. Balancing security and performance properties during system architectural design / Siv Houmb ... [et al.] -- 7. State model diagrams / S Maj -- 8. Designing privacy aware information systems / Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis -- 9. Privacy aware systems / Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari -- 10. Incorporating social trust into design practices for secure systems / Piotr Cofta, Hazel Lacoh ee, Paul Hodgson -- 11. Static program analysis of multi-applet JavaCard applications / Alexandros Loizidis, Vasilios Almaliotis, Panagiotis Katsaros -- 12. Automatic timed automata extraction from ladder programs for model-based analysis of control systems / K ezia Oliveira ... [et al.] Computer security Software engineering Software Engineering (DE-588)4116521-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4116521-4 (DE-588)4274324-2 (DE-588)4143413-4 |
title | Software engineering for secure systems industrial and research perspectives |
title_auth | Software engineering for secure systems industrial and research perspectives |
title_exact_search | Software engineering for secure systems industrial and research perspectives |
title_full | Software engineering for secure systems industrial and research perspectives Haralambos Mouratidis (University of East London, UK) |
title_fullStr | Software engineering for secure systems industrial and research perspectives Haralambos Mouratidis (University of East London, UK) |
title_full_unstemmed | Software engineering for secure systems industrial and research perspectives Haralambos Mouratidis (University of East London, UK) |
title_short | Software engineering for secure systems |
title_sort | software engineering for secure systems industrial and research perspectives |
title_sub | industrial and research perspectives |
topic | Computer security Software engineering Software Engineering (DE-588)4116521-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Software engineering Software Engineering Computersicherheit Aufsatzsammlung |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-837-1 |
work_keys_str_mv | AT mouratidisharalambos softwareengineeringforsecuresystemsindustrialandresearchperspectives |