Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge.
Konstantin BeznosovBrian ChessPublished in: IEEE Softw. (2008)
Keyphrases
- security requirements
- security issues
- security level
- security measures
- security mechanisms
- information security
- key management
- computer hardware
- security management
- security properties
- security protocols
- security patterns
- security services
- security analysis
- software systems
- data encryption
- software industry
- security policies
- case study
- software architecture
- security vulnerabilities
- data security
- key agreement protocol
- user authentication
- security architecture
- access control
- key exchange protocol
- security model
- authentication protocol
- software development
- key establishment
- authentication mechanism
- high assurance
- stream cipher
- cryptographic protocols
- encryption scheme
- public key encryption
- trusted computing
- previously mentioned
- sensitive data
- intrusion detection
- electronic voting
- diffie hellman
- digital rights management
- key agreement
- unauthorized access
- network security
- secure multiparty computation
- computer systems
- rfid systems
- digital signature scheme
- protection schemes
- authentication scheme
- key management scheme
- academic researchers
- elliptic curve
- computing platform
- source code