Safe approach to secure software applications in production and exchange of information

Publish Year: 1391
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,585

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

LNCSE02_201

تاریخ نمایه سازی: 6 اسفند 1391

Abstract:

Nowadays, technology advancement, interconnection of the computer systems is increasingly growing. Network security and under-web applications; therefore, has come to be a major challenge. It is certain that technology advancement creates its own problems. Information manipulation, as the intellectual foundation of the nations, by international organizations is considered as an interruption of the national security and action against governments. Information security in virtual environments has been underlined as one of the most important and basic foundations for development. The present paper makes attempt to introduce a framework aiming at evaluating security systems under-web in software production and final product using ESA software engineering standard and two private methods of open web application security project and Microsoft threatening model process as well as a standard general method of common criteria for information technology security evaluation

Keywords:

ISO/IEC 80451 , Open Web Application Security Project , Microsoft Threatening Model Process , ESA Standard , Vulnerability Evaluation

Authors

Sepideh Nasiri

Islamic Azad University

Samad Mohamadi

Islamic Azad University

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • R. Jafarzadeh, and N. A. Poornaki and , H. Shahvalady ...
  • _ _ "Using complexi. ...
  • of vulnerabilitiest , Journal of Systems Architecture, pp. XXX-XXX, 2010. ...
  • N.Modiri, F.Davami, E.A.M.Malayeri "Software Metrics", Ganje Nafis, Tehran, ISBN: 978-60 ...
  • _ A. K. Talukder, M. Chaitanya, "Architecting Secure Software System", ...
  • ISO/IEC 15408-3:20 08-08-15, Information t ec _ logy_security tec hn ...
  • M. E. Shina, H. Gomaab, "Software requirements and architecture _ ...
  • E .Ali- Moh amah-Malayeri, N.Modiri, S.Jabbehdari, "A Proposal for information ...
  • E .Ali-Moh amah-Malayeri, N.Modiri, S.Jabbehdari, _ A Proposal ...
  • Advances in Information Sciences and Service S c i ences ...
  • D. Mellado, E. Fern andez-Medina, M. Piattini, "A common criteria ...
  • _ _ T. Sommestad, . Ekstedt, Pontus Johnson "A probabilistic ...
  • نمایش کامل مراجع