+

MA et al., 2005 - Google Patents

Attacks and countermeasures in software system security

MA et al., 2005

Document ID
17728809583051639736
Author
MA L
TSAI J
Publication year
Publication venue
Handbook Of Software Engineering And Knowledge Engineering, Vol 3: Recent Advances

External Links

Snippet

Security has become a major concern of software systems, especially distributed systems. The existence of various attacks should be considered in designing and developing those systems such that appropriate countermeasures could be applied. This chapter provides an …
Continue reading at www.worldscientific.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Greenberg et al. Mobile agents and security
Kesh et al. A framework for analyzing e‐commerce security
US5864683A (en) System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US7890612B2 (en) Method and apparatus for regulating data flow between a communications device and a network
Rani et al. Cyber security techniques, architectures, and design
US20030037258A1 (en) Information security system and method`
Yan et al. Computer network security and technology research
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Chuka-Maduji et al. Cloud computing security challenges and related defensive measures: A survey and taxonomy
Mammeri Cryptography: Algorithms, protocols, and standards for computer security
Gao et al. Research on the main threat and prevention technology of computer network security
Aich et al. Study on cloud security risk and remedy
Benjamin et al. Protecting IT systems from cyber crime
Dadhich et al. Security issues in mobile agents
Ma et al. Security modeling and analysis of mobile agent systems
MA et al. Attacks and countermeasures in software system security
Muttoo et al. Analysing security checkpoints for an integrated utility-based information system
Tang et al. Research on security protection countermeasures of internet of things
Zhang et al. Controlling Network Risk in E-commerce
Soriano Information and network security
Khanday et al. Intrusion Detection Systems for Trending Cyberattacks
Gupta et al. Unveiling Cyber Threats and Digital Forensics
Udaykumar A study on Network Threats, Attacks & Security Measures
Al-Begain et al. Security of the Cloud
Pathak The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals.
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载