Warn if Secure or How to Deal with Security by Default in Software Development?.
Peter Leo GorskiLuigi Lo IaconoStephan WieflingSebastian MöllerPublished in: HAISA (2018)
Keyphrases
- software development
- security requirements
- security issues
- security measures
- security level
- security mechanisms
- software architecture
- security management
- security analysis
- security properties
- security protocols
- data encryption
- information security
- key management
- cryptographic protocols
- data security
- sensitive data
- stream cipher
- security patterns
- security policies
- access control
- security services
- security architecture
- key agreement protocol
- authentication mechanism
- software engineering
- diffie hellman
- security model
- development process
- public key encryption
- integrity verification
- encryption scheme
- secure multiparty computation
- development lifecycle
- mobile agent system
- digital signature scheme
- key exchange protocol
- high security
- previously mentioned
- smart card
- user authentication
- public key cryptosystem
- key establishment
- secure communication
- electronic voting
- authentication scheme
- case study
- key distribution
- authentication protocol
- software projects
- software developers
- key management scheme
- private key
- digital rights management
- trusted computing
- privacy preserving
- resource constrained
- network security
- software systems
- key exchange
- electronic payment
- identity management
- key agreement
- requirements engineering
- secure routing
- wireless sensor networks
- intrusion detection
- factor authentication
- public key
- digital signature
- rfid systems
- road safety