MA et al., 2005 - Google Patents
Attacks and countermeasures in software system securityMA et al., 2005
- Document ID
- 17728809583051639736
- Author
- MA L
- TSAI J
- Publication year
- Publication venue
- Handbook Of Software Engineering And Knowledge Engineering, Vol 3: Recent Advances
External Links
Snippet
Security has become a major concern of software systems, especially distributed systems. The existence of various attacks should be considered in designing and developing those systems such that appropriate countermeasures could be applied. This chapter provides an …
- 238000011160 research 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Greenberg et al. | Mobile agents and security | |
| Kesh et al. | A framework for analyzing e‐commerce security | |
| US5864683A (en) | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights | |
| US7890612B2 (en) | Method and apparatus for regulating data flow between a communications device and a network | |
| Rani et al. | Cyber security techniques, architectures, and design | |
| US20030037258A1 (en) | Information security system and method` | |
| Yan et al. | Computer network security and technology research | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Chuka-Maduji et al. | Cloud computing security challenges and related defensive measures: A survey and taxonomy | |
| Mammeri | Cryptography: Algorithms, protocols, and standards for computer security | |
| Gao et al. | Research on the main threat and prevention technology of computer network security | |
| Aich et al. | Study on cloud security risk and remedy | |
| Benjamin et al. | Protecting IT systems from cyber crime | |
| Dadhich et al. | Security issues in mobile agents | |
| Ma et al. | Security modeling and analysis of mobile agent systems | |
| MA et al. | Attacks and countermeasures in software system security | |
| Muttoo et al. | Analysing security checkpoints for an integrated utility-based information system | |
| Tang et al. | Research on security protection countermeasures of internet of things | |
| Zhang et al. | Controlling Network Risk in E-commerce | |
| Soriano | Information and network security | |
| Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
| Gupta et al. | Unveiling Cyber Threats and Digital Forensics | |
| Udaykumar | A study on Network Threats, Attacks & Security Measures | |
| Al-Begain et al. | Security of the Cloud | |
| Pathak | The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals. |