Hardening COTS software with generic software wrappers

被引:0
|
作者
Fraser, Timothy [1 ]
Badger, Lee [1 ]
Feldman, Mark [1 ]
机构
[1] TIS Labs at Network Associates, Inc, Glenwood, United States
来源
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy | 1999年
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:2 / 16
相关论文
共 50 条
  • [21] USING COTS COMPONENTS IN SOFTWARE DEVELOPMENT
    Jilani, Abdul Khader
    INTERNATIONAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION, 2008, 1052 : 203 - 208
  • [22] Acquiring COTS software selection requirements
    Maiden, NA
    Ncube, C
    IEEE SOFTWARE, 1998, 15 (02) : 46 - +
  • [23] Qualifying the reliability of COTS software components
    Voas, J
    Howell, C
    Everett, B
    Laprie, JC
    EIGHTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 1997, : 144 - 144
  • [24] Problems with COTS software: A case study
    Beheshti, J
    Dupuis, J
    CANADIAN JOURNAL OF INFORMATION AND LIBRARY SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION ET DE BIBLIOTHECONOMIE, 1999, 24 (04): : 42 - 42
  • [25] COTS software in Science Operations, is it Worth it?
    O'Mullane, William
    Bach, Nana
    Hernandez, Jose
    Hutton, Alexander
    Messineo, Rosario
    ASTRONOMICAL DATA ANALYSIS SOFTWARE AND SYSTEMS XXVI, 2019, 521 : 153 - 156
  • [26] Estimating the cost of security for COTS software
    Reifer, DJ
    Boehm, BW
    Gangadharan, M
    COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS, 2003, 2580 : 178 - 186
  • [27] Acquiring COTS software selection requirements
    Maiden, NAM
    Ncube, C
    THIRD INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING - PROCEEDINGS, 1998, : 241 - 241
  • [28] GENERIC OR CANNED SOFTWARE
    FALANGA, R
    LIBRARY SOFTWARE REVIEW, 1985, 4 (02): : 97 - 98
  • [29] Constructing COTS-based software components with reusing COTS products
    Lee, SC
    Lin, JM
    Jiau, HJC
    INTERNATIONAL SYMPOSIUM ON MULTIMEDIA SOFTWARE ENGINEERING, PROCEEDINGS, 2000, : 289 - 296
  • [30] Detecting and countering system intrusions using software wrappers
    Ko, C
    Fraser, T
    Badger, L
    Kilpatrick, D
    USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 145 - 156