Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,880,381 papers from all fields of science
Search
Sign In
Create Free Account
Microsoft Security Development Lifecycle
Known as:
Trustworthy Computing Security Development Lifecycle
, Security Development Lifecycle
, The Microsoft Security Development Lifecycle
Expand
The Microsoft Security Development Lifecycle is a software development process used and proposed by Microsoft to reduce software maintenance costs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
C string handling
Computer security
Software bug
Spiral model
Expand
Broader (1)
Software development process
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Project OVVL - Threat Modeling Support for the entire secure development lifecycle
A. Schaad
Sicherheit
2020
Corpus ID: 211051236
: OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of…
Expand
2017
2017
The Security Development Lifecycle in the Context of Accreditation Policies and Standards
Ezhil Kalaimannan
,
J. Gupta
IEEE Security and Privacy
2017
Corpus ID: 15110966
The proposed security development lifecycle (SecDLC) model delivers a perpetual cycle of information security management and…
Expand
2016
2016
Hardware security risk assessment: A case study
Brent Sherman
,
David M. Wheeler
IEEE International Symposium on Hardware Oriented…
2016
Corpus ID: 16919667
The security demands on development teams are growing in direct proportion to the security incidents discovered and leveraged in…
Expand
2016
2016
RTeec hpn ioc arl t 80 Towards Security Program Comprehension with Design by Contract and Slicing
K. Sohr
,
Tanveer Mustafa
,
Philipp Hirch
,
Markus Gulmann
2016
Corpus ID: 117942977
Over the last years, the field of software security has evolved. More and more software vendors employ static code analyzers as…
Expand
2015
2015
Agile Secure Software Development in a Large Software Development Organisation: Security Testing
Achim D. Brucker
2015
Corpus ID: 113826515
Security testing is an important part of any (agile) secure software development lifecyle. Still, security testing is often…
Expand
2014
2014
Assessing the Threat Landscape for Software Libraries
R. Kannavara
IEEE International Symposium on Software…
2014
Corpus ID: 5670681
Libraries are a collection of implementations of behavior written in a computer programming language providing a well-defined…
Expand
2013
2013
DATA INTEGRITY IN CLOUD COMPUTING SECURITY
Nedhal A. Al-Saiyd
2013
Corpus ID: 5787581
Cloud computing requires comprehensive security sol utions based upon many aspects of a large and loosely integrated system. The…
Expand
2012
2012
Model-driven Secure Development Lifecycle
Zhendong Ma
,
Christian Wagner
,
Arndt Bonitz
,
T. Bleier
,
Robert Woitsch
,
Markus Nichterl
2012
Corpus ID: 13233263
Building security into software development lifecycles and doing it right is hard. To address the challenge, several prominent…
Expand
2010
2010
A situation analysis of the security awareness at Software Vendors and how to best inform them about the Microsoft Security Development Lifecycle
Johannes Gunnbäck
,
H. Mischel
2010
Corpus ID: 107884811
In January 2002 Bill Gates sent out the renowned "Trustworthy Computing" memo where he announced that the company would shift…
Expand
Review
2005
Review
2005
Building More Secure Commercial Software: The Trustworthy Computing Security Development Lifecycle
S. Lipner
GI Jahrestagung
2005
Corpus ID: 35833755
With the growth of the Internet as a vehicle for commercial, governmental, and personal communications and information sharing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE