Composing Security-Aware Software

@article{Khan2002ComposingSS,
  title={Composing Security-Aware Software},
  author={Khaled M. Khan and Jun Han},
  journal={IEEE Software},
  year={2002},
  volume={19},
  pages={34-41}
}
0 7 4 0 7 4 5 9 / 0 2 / $ 1 7 . 0 0 © 2 0 0 2 I E E E benefits of software reusability. While software components have become popular, security concerns are paramount. Their composition can be considered risky because of the “plug and play” with unknown third-party components. In dynamic runtime applications for critical systems such as e-commerce and ehealth, the risk could be much higher. Component security concerns are twofold: how to build secure components and secure composite systems from… CONTINUE READING
Highly Cited
This paper has 58 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 37 extracted citations

59 Citations

0510'02'05'09'13'17
Citations per Year
Semantic Scholar estimates that this publication has 59 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-7 of 7 references

Component Primer,

  • J. Hopkins
  • Comm. ACM,
  • 2000

Voas , “ Certifying Software for High - Assurance Environments Councill , “ Third - Party Testing and the Quality of Software Components

  • Y. Zheng
  • 1999

An Approach for Certifying Security in Software Components,

  • A. Ghosh, G. McGraw
  • Proc. 21st Nat’l Information Systems Security…
  • 1998

Similar Papers

Loading similar papers…