Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,973,375 papers from all fields of science
Search
Sign In
Create Free Account
Application security
Known as:
Software Security
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Anti-tamper software
Apache Shiro
AppShield
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Should Cyber-Insurance Providers Invest in Software Security?
Aron Laszka
,
Jens Grossklags
European Symposium on Research in Computer…
2015
Corpus ID: 44507280
Insurance is based on the diversifiability of individual risks: if an insurance provider maintains a large portfolio of customers…
Expand
2012
2012
IMPLEMENTATION OF RSA ALGORITHM USING ELLIPTIC CURVE ALGORITHM FOR SECURITY AND PERFORMANCE ENHANCEMENT
Prasant Singh Yadav
,
P. Sharma
,
K. P. Yadav
2012
Corpus ID: 17061809
This paper introduces the concept and implementation of RSA algorithm for security purpos e and to enhance the performance of…
Expand
2011
2011
An Architecture-Centric Approach to Detecting Security Patterns in Software
Michaela Bunke
,
K. Sohr
Engineering Secure Software and Systems
2011
Corpus ID: 14841398
Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have…
Expand
Review
2010
Review
2010
Visual analysis of code security
J. Goodall
,
Hassan Radwan
,
Lenny Halseth
Visualization for Computer Security
2010
Corpus ID: 6494126
To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated…
Expand
2010
2010
Research on MANET Security Architecture Design
Shi-Chang Li
,
Hao-Lan Yang
,
Qing-Sheng Zhu
International Conference on Signal Acquisition…
2010
Corpus ID: 11558508
Owing to characteristics of open medium, dynamic topology and distribution, the security of Mobile Ad hoc Network (MANET) is more…
Expand
2010
2010
Security Engineering Approach to Support Software Security
F. Nunes
,
A. D. Belchior
,
A. Albuquerque
World Congress on Services
2010
Corpus ID: 13642813
As information security and privacy become increasingly important to organizations, the demand grows for software development…
Expand
Review
2008
Review
2008
Software Security; A Vulnerability Activity Revisit
M. A. Hadavi
,
H. Shirazi
,
H. M. Sangchi
,
V. S. Hamishagi
Third International Conference on Availability…
2008
Corpus ID: 15387043
This paper attempts to introduce a method for developing secure software based on the vulnerabilities which are already known. In…
Expand
2008
2008
Architecting Secure Software Systems
A. Talukder
,
M. Chaitanya
2008
Corpus ID: 16179349
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how…
Expand
2006
2006
A qualitative analysis of software security patterns
Spyros T. Halkidis
,
A. Chatzigeorgiou
,
G. Stephanides
Computers & security
2006
Corpus ID: 15110613
1989
1989
Safe and Secure Computing Systems
T. Anderson
1989
Corpus ID: 59900410
Aspects of the licensing and assessment of highly dependable computer systems an engineering approach to security evaluation some…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE