eBooks-it.org Logo
eBooks-IT.org Inner Image

Developing and Evaluating Security-Aware Software Systems

Developing and Evaluating Security-Aware Software Systems Image

Book Details:

Publisher:IGI Global
Series: IGI Global
Author:Khaled M. Khan
Edition:1
ISBN-10:1466624825
ISBN-13:9781466624825
Pages:367
Published:Nov 30 2012
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:43.01 MB

Book Description:

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field.Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Download Link:

Related Books:

Security-aware Cooperation in Cognitive Radio Networks

Security-aware Cooperation in Cognitive Radio Networks Image
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An intro...

Pattern-Oriented Analysis and Design

Composing Patterns to Design Software Systems
Pattern-Oriented Analysis and Design Image
Software experts agree: the most difficult aspect of building software is not coding; it is the decisions the designer makes in the early stages. Those decisions live with the system for the rest of its lifetime. Good designs beget good software. Bad designs beget trouble. Designers are faced with a tough question: how do they know whether their designs are good or bad? Design patterns can provide valid judgment criteria for software designers. While a great deal of effort has been devoted to discovering new design patterns, very little effort has been spent on developing a process for "gluing" or "composing" design patterns to better develop software applications. This book specifically addresses this need, and explains the Patte...

Using Event-B for Critical Device Software Systems

Using Event-B for Critical Device Software Systems Image
Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation). This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into established critical systems development processes - to be discussed in a highly effective and informative way.Using Event-B for Critical Device ...



2007 - 2021 © eBooks-IT.org