Back to Results
First PageMeta Content
Systems engineering / Software project management / Systems Modeling Language / Software Requirements Specification / Requirement / Functional requirement / Misuse case / Systems engineering process / Database / Software development / Software requirements / Software


Computer Science Technical Report Analysing Requirements to Detect Latent Security Vulnerabilities Curtis C.R. Busby-Earle
Add to Reading List

Document Date: 2013-11-14 19:35:05


Open Document

File Size: 370,36 KB

Share Result on Facebook

City

Innsbruck / New York / Washington / DC / Cambridge / London / /

Company

MIT Press / MITRE Corporation / /

Country

Belgium / Austria / United States / United Kingdom / /

/

Facility

Detect Latent Security Vulnerabilities Curtis C.R. Busby-Earle University / Robert B. France Colorado State University / Detect Latent Security Vulnerabilities Curtis C.R. Busby-Earle Robert B. France University / /

/

IndustryTerm

software engineering / prototype tool / software development projects / software engineering practitioners / secure systems / software development i.e. / software requirements specifications / software development / software systems / large systems / secure software requirements / secure software development / software engineering problems / software vulnerabilities / internet software / intended software system / european software / functions tool / loophole algorithm / secure software / security features into software / /

NaturalFeature

Indies / /

OperatingSystem

Linux / Android / Windows XP / Microsoft Windows / /

Organization

MIT / D. To / University of the West Indies / Detect Latent Security Vulnerabilities Curtis C.R. Busby-Earle Robert B. France University of the West Indies Mona / Colorado State University / Katholieke Universiteit Leuven / IEEE Computer Society / /

Person

E. Yu / B. Nixon / C. B. Haley / J. Mylopoulos / C LARIFIER / L. Chung / Curtis C.R. Busby-Earle Robert / /

/

Position

driver / local administrator / actor / RT / Secure Requirements Writer / engineer / requirements engineer / administrator / mis-actor / CFO / /

ProgrammingLanguage

SQL / DC / /

ProvinceOrState

Massachusetts / Colorado / /

PublishedMedium

Communications of the ACM / /

TVShow

SECREt / perform using the SECREt / /

Technology

Linux / Floyd-Warshall algorithm / Android / operating systems / loophole algorithm / technology of object / /

URL

http /

SocialTag