Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software.
Greg HoglundGary McGrawPublished in: IEEE Softw. (2002)
Keyphrases
- cost effective
- security requirements
- low cost
- security issues
- security mechanisms
- computer systems
- software systems
- security level
- data encryption
- key management
- source code
- encryption scheme
- cryptographic protocols
- security measures
- authentication mechanism
- key agreement
- software development
- key exchange protocol
- integrity verification
- security patterns
- key exchange
- diffie hellman
- security architecture
- security management
- security properties
- cost effectiveness
- key distribution
- security model
- data security
- security analysis
- sensitive data
- security policies
- access control