Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,361,808 papers from all fields of science
Search
Sign In
Create Free Account
Application security
Known as:
Software Security
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Anti-tamper software
Apache Shiro
AppShield
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Should Cyber-Insurance Providers Invest in Software Security?
Aron Laszka
,
Jens Grossklags
European Symposium on Research in Computer…
2015
Corpus ID: 44507280
Insurance is based on the diversifiability of individual risks: if an insurance provider maintains a large portfolio of customers…
Expand
2011
2011
An Architecture-Centric Approach to Detecting Security Patterns in Software
Michaela Bunke
,
K. Sohr
Engineering Secure Software and Systems
2011
Corpus ID: 14841398
Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have…
Expand
Review
2010
Review
2010
Visual analysis of code security
John R. Goodall
,
Hassan Radwan
,
Lenny Halseth
Visualization for Computer Security
2010
Corpus ID: 6494126
To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated…
Expand
2010
2010
Security Engineering Approach to Support Software Security
F. Nunes
,
A. D. Belchior
,
A. Albuquerque
World Congress on Services
2010
Corpus ID: 13642813
As information security and privacy become increasingly important to organizations, the demand grows for software development…
Expand
Review
2009
Review
2009
Security Estimation Framework: Design Phase Perspective
S. Chandra
,
R. Khan
,
A. Agrawal
Sixth International Conference on Information…
2009
Corpus ID: 15849026
Generally, security analysis process is carried out through subjective evaluations. Early methods of security attribute analysis…
Expand
2008
2008
Architecting Secure Software Systems
A. Talukder
,
M. Chaitanya
2008
Corpus ID: 16179349
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how…
Expand
2005
2005
Towards an architectural treatment of software security
J. Ren
,
R. Taylor
,
Paul Dourish
,
D. Redmiles
ACM SIGSOFT Softw. Eng. Notes
2005
Corpus ID: 15195697
Security is a very important concern for software architecture and software components. Previous modeling approaches provide…
Expand
2002
2002
DoD 5200 . 28-STD-DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION
2002
Corpus ID: 145028280
This publication, DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the…
Expand
2001
2001
A case study in detecting software security vulnerabilities using constraint optimization
M. Weber
,
V. Shah
,
C. Ren
Proceedings First IEEE International Workshop on…
2001
Corpus ID: 910592
In this paper we present a case study in static analysis, with a focus on static methods for detecting buffer overflow…
Expand
1989
1989
Safe and Secure Computing Systems
T. Anderson
1989
Corpus ID: 59900410
Aspects of the licensing and assessment of highly dependable computer systems an engineering approach to security evaluation some…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE