Secure by design

Known as: Security by design 
Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1995-2018
05101519952018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure by Design (SbD) is a project management oriented philosophy to develop secure software. This paper is the result of… (More)
Is this relevant?
2015
2015
A security by design approach for smart metering, using secure design patterns, is introduced in this paper. There are concerns… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2014
Review
2014
We analyze the problem of designing pattern recognition systems in adversarial settings, under an engineering viewpoint… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
2013
2013
We describe networking in Ethos, a clean-slate operating system we designed to meet the security requirements which arise on the… (More)
  • figure 1
  • figure 2
Is this relevant?
2011
2011
We argue that insider threat is a placeholder term that accompanies the transition from securing IT infrastructures to securing… (More)
  • table 1
  • table 2
Is this relevant?
2011
2011
This paper describes results and reflects on the experience of engineering a secure web based system for the pre-employment… (More)
Is this relevant?
2007
2007
Portable devices have become day-to-day necessities in our lives. These devices have several critical constraints due to their… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Danilo Bruschi Dip. Informatica e Comunicazione Università degli Studi di Milano Via Comelico 39/41 – I-20135 Milan, Italy… (More)
Is this relevant?
1996
1996
Most successful crime prevention efforts take the approach of "designing out crime" through the identification of highly specific… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?