SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices.
Ziyou JiangLin ShiGuowei YangQing WangPublished in: ASE (2023)
Keyphrases
- security requirements
- security issues
- security mechanisms
- security level
- key management
- security measures
- security protocols
- coding scheme
- security analysis
- security properties
- security management
- data encryption
- security architecture
- security model
- sensitive data
- stream cipher
- data security
- digital signature scheme
- information security
- security services
- identity management
- secure routing
- key exchange protocol
- authentication mechanism
- encryption scheme
- access control
- security patterns
- integrity verification
- high security
- cryptographic protocols
- private key
- user authentication
- security policies
- authentication protocol
- electronic voting
- diffie hellman
- public key cryptosystem
- key exchange
- digital rights management
- public key encryption
- key distribution
- network security
- trusted computing
- rfid systems
- authentication scheme
- resource constrained
- wireless sensor networks
- smart card
- factor authentication
- key agreement
- data mining
- association rules
- secure multiparty computation
- collaborative learning
- intrusion detection
- privacy preserving
- public key
- secret key
- secure communication