Abstract. The secure deployment of components is widely recognized as a cru-cial problem in component-based software engineering. While major effort is concentrated on preventing malicious components from penetrating secure sys-tems, other security violations may also cause significant problems. We un-cover a technique that creates a major breach of security by allowing rogue components to interfere with component-based applications by impersonating various generic components. This interference leads to stealing business value of competitive products and causes problems without violating legal agree-ments. We also present our solution to this problem, called Secure COmponent Deployment Protocol (S-CODEP), and prove its soundness using the a...
Abstract. Increasing effort is being made to build security into software—but with mixed results. Th...
This paper presents a security characterisation process framework for software components and their ...
Abstract. Component-based software has become a mainstream practice as organizations attempt to stre...
Abstract. Software component technology supports the cost-effective design of applications suited to...
Software systems are becoming heterogeneous: instead of a small number of large programs from well-e...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
Software systems are becoming heterogeneous: instead of a small number of large pro-grams from well-...
Software engineering moved from traditional methods of software enterprise applications to com-ponen...
Software systems, in particular component (or service) based software systems, are becoming highly d...
Abstract. Software distribution to target devices like factory controllers, medical instruments, veh...
This article addresses a key issue in security: how to inspire trust by disclosing security properti...
Component-based software engineering facilitates the design of complex systems by subdividing the pr...
Abstract. Success of the mission should be the focus of software and supply chain assurance activiti...
The paper proposes a security characterization structure of software components and their compositio...
Using software components to develop mission-critical systems poses a number of technical, organizat...
Abstract. Increasing effort is being made to build security into software—but with mixed results. Th...
This paper presents a security characterisation process framework for software components and their ...
Abstract. Component-based software has become a mainstream practice as organizations attempt to stre...
Abstract. Software component technology supports the cost-effective design of applications suited to...
Software systems are becoming heterogeneous: instead of a small number of large programs from well-e...
Modern computing platforms have progressed to deploying more secure software with various defensive ...
Software systems are becoming heterogeneous: instead of a small number of large pro-grams from well-...
Software engineering moved from traditional methods of software enterprise applications to com-ponen...
Software systems, in particular component (or service) based software systems, are becoming highly d...
Abstract. Software distribution to target devices like factory controllers, medical instruments, veh...
This article addresses a key issue in security: how to inspire trust by disclosing security properti...
Component-based software engineering facilitates the design of complex systems by subdividing the pr...
Abstract. Success of the mission should be the focus of software and supply chain assurance activiti...
The paper proposes a security characterization structure of software components and their compositio...
Using software components to develop mission-critical systems poses a number of technical, organizat...
Abstract. Increasing effort is being made to build security into software—but with mixed results. Th...
This paper presents a security characterisation process framework for software components and their ...
Abstract. Component-based software has become a mainstream practice as organizations attempt to stre...