Teaching secure software engineering: Writing secure code

被引:0
|
作者
Yu, Huiming [1 ]
Jones, Nadia [1 ]
Bullock, Gina [1 ]
Yuan, Xiaohong Yuan [1 ]
机构
[1] Computer Science Department, North Carolina A and T State University, Greensboro, NC, United States
来源
2011 7th Central and Eastern European Software Engineering Conference, CEE-SECR 2011 | 2011年
关键词
723 Computer Software; Data Handling and Applications - 723.1 Computer Programming - 723.2 Data Processing and Image Processing - 901.2 Education;
D O I
2011 7th Central and Eastern European Software Engineering Conference in Russia, CEE-SECR 2011
中图分类号
学科分类号
摘要
7
引用
收藏
相关论文
共 50 条
  • [21] A Common Body of Knowledge for Engineering Secure Software and Services
    Schwittek, Widura
    Schmidt, Holger
    Beckers, Kristian
    Eicker, Stefan
    Fassbender, Stephan
    Heisel, Maritta
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 499 - 506
  • [22] CS1 with a Side of AI: Teaching Software Verification for Secure Code in the Era of Generative AI
    Fernandez, Amanda S.
    Cornell, Kimberly A.
    PROCEEDINGS OF THE 55TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE 2024, VOL. 1, 2024, : 345 - 351
  • [23] Design of Secure Software Architectures with Secure Connectors
    Shin, Michael E.
    Gomaa, Hassan
    Pathirage, Don
    Baker, Chase
    Malhotra, Bhavya
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2016, 26 (05) : 769 - 805
  • [24] Secure spiral: A secure software development model
    Kaur, P., 1600, Academic Journals Inc., 244, 5th avenue, No. 2218, New City, NY 10001, United States (06):
  • [25] Reusable Secure Connectors for Secure Software Architecture
    Shin, Michael
    Gomaa, Hassan
    Pathirage, Don
    SOFTWARE REUSE: BRIDGING WITH SOCIAL-AWARENESS, 2016, 9679 : 181 - 196
  • [26] Secure Regenerating Code
    Li, Jian
    Li, Tongtong
    Ren, Jian
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 770 - 774
  • [27] Secure code distribution
    EIT
    Computer, 6 (76-79):
  • [28] Secure code distribution
    Zhang, XN
    COMPUTER, 1997, 30 (06) : 76 - &
  • [29] Secure Software Development Model: A Guide for Secure Software Life Cycle
    Daud, Malik Imran
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 724 - 728
  • [30] Evaluation of engineering approaches in the secure software development life cycle
    Busch, Marianne
    Koch, Nora
    Wirsing, Martin
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 234 - 265