A ROAD MAP TO THE SOFTWARE ENGINEERING SECURITY

被引:1
作者
Kumar, T. M. Kiran [1 ]
机构
[1] Siddaganga Inst Technol, Dept Master Comp Applicat, Tumkur 572103, India
来源
SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS | 2009年
关键词
Security; Security requirements; Software Engineering; Copy protection; water-marking;
D O I
10.1109/ICCEE.2009.62
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Software development Is there such a thing anymore as a software system that doesn't need to be secure? We routinely hear vendors claim that their systems are "secure." However, without knowing what assumptions are made by the vendor, it is hard to justify such a claim. Almost every software controlled system faces threats from potential adversaries, from Internet-aware client applications running on PCs, to complex telecommunications and power systems accessible over the Internet, to commodity software with copy Protection mechanisms. Software engineers must be cognizant of these threats and engineer systems with credible defenses, while still delivering value to customers. In this paper, I present my perspectives on the issues that arise in the interactions between software engineering and security
引用
收藏
页码:306 / 310
页数:5
相关论文
共 16 条
[1]  
[Anonymous], 2009, CHAOS SUMM 2009
[2]  
[Anonymous], 1999, CHAOS REC SUCC
[3]  
BORGIDA A, 1985, IEEE COMPUT, V18, P82
[4]  
*CERT CC, 2009, CERT CC STAT 1995 20
[5]  
COLLBERG CS, 1999, S PRINC PROGR LANG
[6]  
Dash E., 2005, NY TIMES
[7]  
*DEP DEF STAND, 1985, TCSEC DEP DEF TRUST
[8]  
DEVANBU P, 1997, ACM APPL COMPUTING R
[9]  
*FTC, 2006, MATT CARDSYSTEMS SOL
[10]  
Jacobson I., 1997, SOFTWARE REUSE ARCHI