The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requirement specification of the enclosing application; (ii) a component-specific security rating; and (iii) an evaluation method for the scored security properties of the candidate component. The assessment scheme ultimately provides a numeric score indicating a relative strength of the security properties of the candidate component. The scheme is partially based on ISO/IEC 15408, the Common Criteria for Information Technology Security Evaluation (CC) and the Multi-Element Component Comparison and Analysis (MECCA) model. The scheme is flexible enough for software engineers ...
We present a security characterisation process framework for software components and their compositi...
Software component plays a significant role in the functionality of software systems. Component of s...
This paper presents a framework for constructing compositional security contracts (CsC) based on the...
The paper proposes an assessment scheme for the security properties of software components. The prop...
Software systems are increasingly being assembled from components that are developed by and purchase...
Software systems are increasingly assembled from components that are developed by and purchased from...
This paper attempts to propose a scheme to characterize non-functional security properties that are ...
Security standards are essential instruments for security assessment. To create security assessment ...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
This paper explores how to characterise security properties of software components, and how to reaso...
This paper explores how to characterize security properties of software components, and how to reaso...
The paper proposes a security characterization structure of software components and their compositio...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
This article addresses a key issue in security: how to inspire trust by disclosing security properti...
This paper presents a security characterisation process framework for software components and their ...
We present a security characterisation process framework for software components and their compositi...
Software component plays a significant role in the functionality of software systems. Component of s...
This paper presents a framework for constructing compositional security contracts (CsC) based on the...
The paper proposes an assessment scheme for the security properties of software components. The prop...
Software systems are increasingly being assembled from components that are developed by and purchase...
Software systems are increasingly assembled from components that are developed by and purchased from...
This paper attempts to propose a scheme to characterize non-functional security properties that are ...
Security standards are essential instruments for security assessment. To create security assessment ...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
This paper explores how to characterise security properties of software components, and how to reaso...
This paper explores how to characterize security properties of software components, and how to reaso...
The paper proposes a security characterization structure of software components and their compositio...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
This article addresses a key issue in security: how to inspire trust by disclosing security properti...
This paper presents a security characterisation process framework for software components and their ...
We present a security characterisation process framework for software components and their compositi...
Software component plays a significant role in the functionality of software systems. Component of s...
This paper presents a framework for constructing compositional security contracts (CsC) based on the...