Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,684,199 papers from all fields of science
Search
Sign In
Create Free Account
Application security
Known as:
Software Security
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Anti-tamper software
Apache Shiro
AppShield
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
IMPLEMENTATION OF RSA ALGORITHM USING ELLIPTIC CURVE ALGORITHM FOR SECURITY AND PERFORMANCE ENHANCEMENT
Prasant Singh Yadav
,
P. Sharma
,
K. P. Yadav
2012
Corpus ID: 17061809
This paper introduces the concept and implementation of RSA algorithm for security purpos e and to enhance the performance of…
Expand
Review
2010
Review
2010
Visual analysis of code security
J. Goodall
,
Hassan Radwan
,
Lenny Halseth
Visualization for Computer Security
2010
Corpus ID: 6494126
To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated…
Expand
2010
2010
Security Engineering Approach to Support Software Security
F. Nunes
,
A. D. Belchior
,
A. Albuquerque
World Congress on Services
2010
Corpus ID: 13642813
As information security and privacy become increasingly important to organizations, the demand grows for software development…
Expand
Review
2009
Review
2009
Security Estimation Framework: Design Phase Perspective
S. Chandra
,
R. Khan
,
A. Agrawal
Sixth International Conference on Information…
2009
Corpus ID: 15849026
Generally, security analysis process is carried out through subjective evaluations. Early methods of security attribute analysis…
Expand
Review
2008
Review
2008
Software Security; A Vulnerability Activity Revisit
M. A. Hadavi
,
H. Shirazi
,
H. M. Sangchi
,
V. S. Hamishagi
Third International Conference on Availability…
2008
Corpus ID: 15387043
This paper attempts to introduce a method for developing secure software based on the vulnerabilities which are already known. In…
Expand
2008
2008
Architecting Secure Software Systems
A. Talukder
,
M. Chaitanya
2008
Corpus ID: 16179349
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how…
Expand
2006
2006
A qualitative analysis of software security patterns
Spyros T. Halkidis
,
A. Chatzigeorgiou
,
G. Stephanides
Computers & security
2006
Corpus ID: 15110613
2005
2005
Towards an architectural treatment of software security
J. Ren
,
R. Taylor
,
Paul Dourish
,
D. Redmiles
ACM SIGSOFT Softw. Eng. Notes
2005
Corpus ID: 15195697
Security is a very important concern for software architecture and software components. Previous modeling approaches provide…
Expand
2002
2002
DoD 5200 . 28-STD-DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION
2002
Corpus ID: 145028280
This publication, DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the…
Expand
1989
1989
Safe and Secure Computing Systems
T. Anderson
1989
Corpus ID: 59900410
Aspects of the licensing and assessment of highly dependable computer systems an engineering approach to security evaluation some…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE