Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Microsoft Security Development Lifecycle
Known as:
Trustworthy Computing Security Development Lifecycle
, Security Development Lifecycle
, The Microsoft Security Development Lifecycle
Expand
The Microsoft Security Development Lifecycle is a software development process used and proposed by Microsoft to reduce software maintenance costs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
C string handling
Computer security
Software bug
Spiral model
Expand
Broader (1)
Software development process
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Project OVVL - Threat Modeling Support for the entire secure development lifecycle
A. Schaad
Sicherheit
2020
Corpus ID: 211051236
: OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of…
Expand
2017
2017
The Security Development Lifecycle in the Context of Accreditation Policies and Standards
Ezhil Kalaimannan
,
J. Gupta
IEEE Security and Privacy
2017
Corpus ID: 15110966
The proposed security development lifecycle (SecDLC) model delivers a perpetual cycle of information security management and…
Expand
2017
2017
Security Requirements and Tests for Smart Toys
L. G. D. Carvalho
,
M. Eler
International Conference on Enterprise…
2017
Corpus ID: 52012095
The Internet of Things creates an environment to allow the integration of physical objects into computer-based systems. More…
Expand
2017
2017
A Machine Learning Approach to SDL
R. Kannavara
,
Gilad Gressel
,
Damilare Fagbemi
,
Richard Chow
IEEE Cybersecurity Development
2017
Corpus ID: 34954629
Security Risk Assessments (SRA) play a key role in the Security Development Lifecycle (SDL). At an early stage of the project…
Expand
2016
2016
Hardware security risk assessment: A case study
Brent Sherman
,
David M. Wheeler
IEEE International Symposium on Hardware Oriented…
2016
Corpus ID: 16919667
The security demands on development teams are growing in direct proportion to the security incidents discovered and leveraged in…
Expand
2016
2016
RTeec hpn ioc arl t 80 Towards Security Program Comprehension with Design by Contract and Slicing
K. Sohr
,
Tanveer Mustafa
,
Philipp Hirch
,
Markus Gulmann
2016
Corpus ID: 117942977
Over the last years, the field of software security has evolved. More and more software vendors employ static code analyzers as…
Expand
2015
2015
Agile Secure Software Development in a Large Software Development Organisation: Security Testing
Achim D. Brucker
2015
Corpus ID: 113826515
Security testing is an important part of any (agile) secure software development lifecyle. Still, security testing is often…
Expand
2013
2013
DATA INTEGRITY IN CLOUD COMPUTING SECURITY
Nedhal A. Al-Saiyd
2013
Corpus ID: 5787581
Cloud computing requires comprehensive security sol utions based upon many aspects of a large and loosely integrated system. The…
Expand
Review
2008
Review
2008
Making the invisible visible A theory of security culture for secure and usable grids
Shamal Faily
,
I. Flechais
2008
Corpus ID: 5934038
What is a security culture and why is it useful? There is no straight answer to the first question, but there is an argument for…
Expand
Review
2005
Review
2005
Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle
S. Lipner
GI Jahrestagung
2005
Corpus ID: 35833755
With the growth of the Internet as a vehicle for commercial, governmental, and personal communications and information sharing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE