Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,466 papers from all fields of science
Search
Sign In
Create Free Account
Application security
Known as:
Software Security
Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Access control
Anti-tamper software
Apache Shiro
AppShield
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
A Conceptual Security Framework for Cloud Computing Issues
Shadi A. Aljawarneh
,
M. B. Yassein
International Journal of Intelligent Information…
2016
Corpus ID: 357545
In this article, perspectives from Cloud computing practitioners are shown in order to address clients concerns and bring about…
Expand
2012
2012
IMPLEMENTATION OF RSA ALGORITHM USING ELLIPTIC CURVE ALGORITHM FOR SECURITY AND PERFORMANCE ENHANCEMENT
Prasant Singh Yadav
,
P. Sharma
,
K. P. Yadav
2012
Corpus ID: 17061809
This paper introduces the concept and implementation of RSA algorithm for security purpos e and to enhance the performance of…
Expand
Review
2010
Review
2010
Visual analysis of code security
J. Goodall
,
Hassan Radwan
,
Lenny Halseth
Visualization for Computer Security
2010
Corpus ID: 6494126
To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated…
Expand
2009
2009
Individual Taxpayer Intention to Use Tax Preparation Software: Examining Experience, Trust, and Perceived Risk
Alexander J. McLeod
,
Sonja E. Pippin
,
R. Mason
2009
Corpus ID: 16615903
The purpose of this paper is two-fold. First, we apply the "Unified Theory of Acceptance and Use of Technology" (UTAUT) model in…
Expand
Review
2009
Review
2009
Security Estimation Framework: Design Phase Perspective
S. Chandra
,
R. Khan
,
A. Agrawal
Sixth International Conference on Information…
2009
Corpus ID: 15849026
Generally, security analysis process is carried out through subjective evaluations. Early methods of security attribute analysis…
Expand
2009
2009
Proof-Carrying Hardware: Towards Runtime Verification of Reconfigurable Modules
Stephanie Drzevitzky
,
U. Kastens
,
M. Platzner
International Conference on Reconfigurable…
2009
Corpus ID: 833974
Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in…
Expand
2009
2009
A flexible design flow for software IP binding in commodity FPGA
M. Gora
,
A. Maiti
,
P. Schaumont
IEEE International Symposium on Industrial…
2009
Corpus ID: 2143910
Software intellectual property (SWIP) is a critical component of increasingly complex FPGA based system on chip (SOC) designs. As…
Expand
Review
2008
Review
2008
Software Security; A Vulnerability Activity Revisit
M. A. Hadavi
,
H. Shirazi
,
H. M. Sangchi
,
V. S. Hamishagi
Third International Conference on Availability…
2008
Corpus ID: 15387043
This paper attempts to introduce a method for developing secure software based on the vulnerabilities which are already known. In…
Expand
2006
2006
A qualitative analysis of software security patterns
Spyros T. Halkidis
,
A. Chatzigeorgiou
,
G. Stephanides
Computers & security
2006
Corpus ID: 15110613
1989
1989
Safe and Secure Computing Systems
T. Anderson
1989
Corpus ID: 59900410
Aspects of the licensing and assessment of highly dependable computer systems an engineering approach to security evaluation some…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE