Academic literature on the topic 'Application security verification standard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Application security verification standard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Application security verification standard"
Hamdy, Safuat. "Der OWASP Application Security Verification Standard." Datenschutz und Datensicherheit - DuD 36, no. 11 (October 23, 2012): 797–800. http://dx.doi.org/10.1007/s11623-012-0274-4.
Full textBicaku, Ani, Markus Tauber, and Jerker Delsing. "Security standard compliance and continuous verification for Industrial Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772092273. http://dx.doi.org/10.1177/1550147720922731.
Full textJendrian, Kai. "Überprüfung von Webanwendungen mit dem „OWASP Application Security Verification Standard 2009“." Datenschutz und Datensicherheit - DuD 34, no. 3 (February 24, 2010): 138–42. http://dx.doi.org/10.1007/s11623-010-0022-6.
Full textGarmash, D. V., G. A. Maleeva, and S. O. Kandiy. "Draft of Rainbow electronic signature standard and its main properties and application possibilities." Radiotekhnika, no. 203 (December 23, 2020): 82–90. http://dx.doi.org/10.30837/rt.2020.4.203.07.
Full textRemlein, Piotr, and Urszula Stachowiak. "Security Verification in the Context of 5G Sensor Networks." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 107–19. http://dx.doi.org/10.26636/jtit.2021.153221.
Full textVikhe, Ms Prajakta. "Secured Application Environment using Enhanced Graphical Passwords." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1462–69. http://dx.doi.org/10.22214/ijraset.2021.35293.
Full textDewani, Amirita, Pirah Memon, Veena Kumari, Anum Arain, Ayaz Jiskani, and Sania Bhatti. "Keyless Smart Home: An application of Home Security and Automation." Oriental journal of computer science and technology 11, no. 2 (May 7, 2018): 107–14. http://dx.doi.org/10.13005/ojcst11.02.06.
Full textAdil Yazdeen, Abdulmajeed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, and Rizgar R. Zebari. "FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review." Qubahan Academic Journal 1, no. 2 (March 15, 2021): 8–16. http://dx.doi.org/10.48161/qaj.v1n2a38.
Full textKASHTANOV, Serhii F., Yury O. POLUKAROV, Oleksiy I. POLUKAROV, Liudmyla O. MITIUK, and Nataliia F. KACHYNSKA. "Specifics of modern security requirements for software of electronic machine control systems." INCAS BULLETIN 13, S (August 3, 2021): 87–97. http://dx.doi.org/10.13111/2066-8201.2021.13.s.9.
Full textPan, Mingming, Shiming Tian, Jindou Yuan, and Songsong Chen. "Simulation of Dynamic User Network Connection Anti-Interference and Security Authentication Method Based on Ubiquitous Internet of Things." Mathematical Problems in Engineering 2021 (June 21, 2021): 1–8. http://dx.doi.org/10.1155/2021/5687208.
Full textDissertations / Theses on the topic "Application security verification standard"
Christiaens, Steven A. "Evaluating the Security of Smart Home Hubs." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5631.
Full textFrazier, Edward Snead. "Assessing Security Vulnerabilities: An Application of Partial and End-Game Verification and Validation." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/31849.
Full textMaster of Science
Shaffer, Alan B. "An application of Alloy to static analysis for secure information flow and verification of software systems." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/dissert/2008/Dec/08Dec%5FShaffer_PhD.pdf.
Full textDissertation Supervisor: Auguston, Mikhail. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 87-93). Also available in print.
Tarigopula, Mohan Krishna. "Integrity Verification of Applications on RADIUM Architecture." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804915/.
Full textDebant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Full textThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Full textIn today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.
However, an already developed, well structured and considered security approach – with proper implementation of security services and mechanisms – different security models can be used to apply security
within the security perimeter of an organization. It can range from built into the application to the edge of a private network, e.g. an appliance. No matter the choice, the involved people must possess security expertise to deploy the proposed security models in this paper, that have the soul purpose to secure applications.
By using the Recommendation X.800 as a comparison framework, the proposed models will be analyzed in detail and evaluated of how they provide the security services concerned in X.800. By reasoning about what security services that ought to be implemented in order to prevent or detect diverse security attacks, the organization needs to carry out a security plan and have a common understanding of the defined security policies.
An interesting finding during our work was that, using a methodology that leads to low KLOC-values results in high security, though low KLOC-values and high security go hand-in-hand.
Yang, Xiaokun. "A High Performance Advanced Encryption Standard (AES) Encrypted On-Chip Bus Architecture for Internet-of-Things (IoT) System-on-Chips (SoC)." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2477.
Full textHamdi, Hedi. "Une architecture logicielle et un langage métier pour la sécurité à base de politiques dans les systèmes distribués." Thesis, Bordeaux 1, 2009. http://www.theses.fr/2009BOR13764.
Full textDistributed systems support the execution of a large number of applications that have different performance constraints. Security for these systems has a decisive influence on the performance and quality of service of such applications. The use of security-based policies to secure these systems is particularly attractive. However, this approach involves the specification and the deployment of policies, which remains a laborious task, often conducive to error, and requires a thorough knowledge of security mechanisms. In this thesis we propose a framework for specification, verification and implementation of security policies for distributed systems. This framework is based on a policy specification language called PPL (Policy Programming Language) and an architecture of policies deployment. This architecture is based on PPL language and offers a support for the compilation of policies in different mechanisms of implementation, taking into account the requirements of the application or the underlying service. It also enables automatic distribution of security policies to their implementation components. The PPL language provides specific abstractions to allow the specification of security policies and facilitating their development and integration in the deployment support. It is declarative, robust, highly expressive, and allows several possibilities of verification. It also has a formal semantic, which allows you to validate, verify and prove the properties of a security policy
Daniel, Christy Sarmiento. "Development and application of quality standard procedures ((operation,, verification and maintenance)) for an LC--MS system." Master's thesis, 2010. http://hdl.handle.net/10400.1/10741.
Full textHolewa, Laura. "Angular Anisotropy of Correlated Neutrons in Lab Frame of Reference and Application to Detection and Verification." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-11211.
Full textBooks on the topic "Application security verification standard"
Helger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textUnited States. Environmental Protection Agency. Office of Research and Development., ed. Environmental technology verification statement: Technology type, rechargeable alkaline household battery : application, 1.5 volt batteries in standard sizes AAA, AA, C, and D : technology name, Renewal. Washington, D.C: U.S. Environmental Protection Agency, Office of Research and Development, 1999.
Find full textUnited States. Environmental Protection Agency. Office of Research and Development, ed. Environmental technology verification statement: Technology type, rechargeable alkaline household battery : application, 1.5 volt batteries in standard sizes AAA, AA, C, and D : technology name, Renewal. Washington, D.C: U.S. Environmental Protection Agency, Office of Research and Development, 1999.
Find full textKiayias, Aggelos, and Helger Lipmaa. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers. Springer, 2012.
Find full textBook chapters on the topic "Application security verification standard"
Karati, Sabyasachi, Abhijit Das, and Dipanwita Roychoudhury. "Randomized Batch Verification of Standard ECDSA Signatures." In Security, Privacy, and Applied Cryptography Engineering, 237–55. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12060-7_16.
Full textCamenisch, Jan, Manu Drijvers, Petr Dzurenda, and Jan Hajny. "Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards." In ICT Systems Security and Privacy Protection, 286–98. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0_20.
Full textGunawan, Linda Ariani, and Peter Herrmann. "Compositional Verification of Application-Level Security Properties." In Lecture Notes in Computer Science, 75–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_6.
Full textKarati, Sabyasachi, and Abhijit Das. "Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials." In Applied Cryptography and Network Security, 438–56. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07536-5_26.
Full textBettassa Copet, Piergiuseppe, and Riccardo Sisto. "Automated Formal Verification of Application-specific Security Properties." In Lecture Notes in Computer Science, 45–59. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04897-0_4.
Full textSalleh, Mazleena, and Teoh Chin Yew. "Application of 2D Barcode in Hardcopy Document Verification System." In Advances in Information Security and Assurance, 644–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_65.
Full textWu, Lijun, Kaile Su, and Qingliang Chen. "Model Checking Temporal Logics of Knowledge and Its Application in Security Verification." In Computational Intelligence and Security, 349–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596448_50.
Full textRao, Xue, Ning Xi, Jing Lv, and Pengbin Feng. "Compositional Information Flow Verification for Inter Application Communications in Android System." In Machine Learning for Cyber Security, 239–52. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9_17.
Full textGirol, Guillaume, Benjamin Farinier, and Sébastien Bardin. "Not All Bugs Are Created Equal, But Robust Reachability Can Tell the Difference." In Computer Aided Verification, 669–93. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_32.
Full textMantilla Blanco, Sebastián. "Scope of Application of the Customary Standard: Conceptual Framework." In Full Protection and Security in International Investment Law, 145–63. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24838-3_6.
Full textConference papers on the topic "Application security verification standard"
Elder, Sarah, Nusrat Zahan, Valeri Kozarev, Rui Shu, Tim Menzies, and Laurie Williams. "Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard." In 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). IEEE, 2021. http://dx.doi.org/10.1109/icse-seet52601.2021.00019.
Full textKulik, Tomas, Peter W. V. Tran-Jorgensen, and Jalil Boudjadar. "Compliance verification of a cyber security standard for Cloud-connected SCADA." In 2019 Global IoT Summit (GIoTS). IEEE, 2019. http://dx.doi.org/10.1109/giots.2019.8766363.
Full textAl-Shammari, Ali Fawzi Najm, Adolfo Villafiorita, and Komminist Weldemariam. "Towards an Open Standard Vote Verification Framework in Electronic Voting Systems." In 2012 Seventh International Conference on Availability, Reliability and Security (ARES). IEEE, 2012. http://dx.doi.org/10.1109/ares.2012.42.
Full textLi Chen and Xiaoxue Li. "Verification method of security protocols and its application." In 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). IEEE, 2010. http://dx.doi.org/10.1109/icicisys.2010.5658265.
Full textWashizaki, Hironori. "Security patterns: Research direction, metamodel, application and verification." In 2017 International Workshop on Big Data and Information Security (IWBIS). IEEE, 2017. http://dx.doi.org/10.1109/iwbis.2017.8275094.
Full textSun, Maoheng, and Yicheng Qian. "Study and Application of Security Based on ZigBee Standard." In 2011 3rd International Conference on Multimedia Information Networking and Security (MINES). IEEE, 2011. http://dx.doi.org/10.1109/mines.2011.79.
Full textAlouani, Ali T. "Application of computer vision to automatic prescription verification in pharmaceutical mail order." In Defense and Security, edited by Zia-ur Rahman, Robert A. Schowengerdt, and Stephen E. Reichenbach. SPIE, 2005. http://dx.doi.org/10.1117/12.603417.
Full textMorimoto, Shoichi, Shinjiro Shigematsu, Yuichi Goto, and Jingde Cheng. "A security specification verification technique based on the international standard ISO/IEC 15408." In the 2006 ACM symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141701.
Full textStuder, Thomas. "An Application of Justification Logic to Protocol Verification." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.177.
Full textPromyslov, Vitaly G. "Tool for I&C system security policy verification." In 2015 9th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2015. http://dx.doi.org/10.1109/icaict.2015.7338550.
Full textReports on the topic "Application security verification standard"
Saint-Andre, P., and J. Hodges. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS). RFC Editor, March 2011. http://dx.doi.org/10.17487/rfc6125.
Full text