Academic literature on the topic 'Software component based security (SCS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software component based security (SCS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software component based security (SCS)"
T., Rajani Devi, and Rama B. "Software reusabilitydevelopment through NFL approach For identifying security based innerrelationships of affectingfactors." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 333–45. https://doi.org/10.11591/ijece.v10i1.pp333-345.
Full textUeno, Rei, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Full textLavrischeva, Ekaterina Mikhailovna, and Sergey Vadimovich Zelenov. "Model-Based Approach to Ensuring Reliability and Security of Web-services." Proceedings of the Institute for System Programming of the RAS 32, no. 5 (2020): 153–66. http://dx.doi.org/10.15514/ispras-2020-32(5)-12.
Full textPalacios Chavarro, Sara, Pantaleone Nespoli, Daniel Díaz-López, and Yury Niño Roa. "On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering." Big Data and Cognitive Computing 7, no. 1 (2022): 1. http://dx.doi.org/10.3390/bdcc7010001.
Full textTerentiev, Oleksandr, Tetyana Prosyankina-Zharova, Valerii Diakon, and Roman Manuilenco. "Development of mathematical models to support decision-making regarding the functioning of critical infrastructure in the industry of energy supply." Technology audit and production reserves 6, no. 2(74) (2023): 44–49. http://dx.doi.org/10.15587/2706-5448.2023.293205.
Full textMir, Irshad Ahmad, and S. M. K. Quadri. "Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework." International Journal of Computer Network and Information Security 4, no. 11 (2012): 21–31. http://dx.doi.org/10.5815/ijcnis.2012.11.03.
Full textKahtan. "DEPENDABILITY ATTRIBUTES FOR INCREASED SECURITY IN COMPONENT-BASED SOFTWARE DEVELOPMENT." Journal of Computer Science 10, no. 7 (2014): 1298–306. http://dx.doi.org/10.3844/jcssp.2014.1298.1306.
Full textGuo, Xixi, Ruijie Cai, Xiaokang Yin, Wenqiang Shao, and Shengli Liu. "Searching Open-Source Vulnerability Function Based on Software Modularization." Applied Sciences 13, no. 2 (2023): 701. http://dx.doi.org/10.3390/app13020701.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.
Full textDissertations / Theses on the topic "Software component based security (SCS)"
Vorobiev, Artem. "An architectural approach to achieving higher-level security for component (service) based software systems." Swinburne Research Bank, 2008. http://hdl.handle.net/1959.3/47779.
Full textRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Full textRegateiro, Diogo José Domingues. "Dynamic and secure remote database access with soft access policies integration." Doctoral thesis, 2021. http://hdl.handle.net/10773/31633.
Full textBooks on the topic "Software component based security (SCS)"
Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textBook chapters on the topic "Software component based security (SCS)"
Greiner, Simon, Martin Mohr, and Bernhard Beckert. "Modular Verification of Information Flow Security in Component-Based Systems." In Software Engineering and Formal Methods. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66197-1_19.
Full textJha, Shambhu Kr, and R. K. Mishra. "Predicting and Accessing Security Features into Component-Based Software Development: A Critical Survey." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8848-3_28.
Full textBartocci, Ezio, Thomas Ferrère, Thomas A. Henzinger, Dejan Nickovic, and Ana Oliveira da Costa. "Information-flow Interfaces." In Fundamental Approaches to Software Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_1.
Full textWenckstern, Michael von. "Improving the Model-Based Systems Engineering Process." In Ernst Denert Award for Software Engineering 2020. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83128-8_12.
Full textPálhalmi, János, and Anna Mező. "AI-Powered Microscopy Platform for Airborne Biothreat Detection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_10.
Full textKirchhof, Jörg Christian. "From Design to Reality: An Overview of the MontiThings Ecosystem for Model-Driven IoT Applications." In Ernst Denert Award for Software Engineering 2022. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44412-8_3.
Full textGaedke, Martin, Martin Nussbaumer, and Emma Tonkin. "Software Contracts for Component-Based Web Engineering." In Encyclopedia of Information Science and Technology, First Edition. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch453.
Full textYoshioka R., Watanobe Y., and Mirenkov N. "Incorporating Security into Software Development Process." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2008. https://doi.org/10.3233/978-1-58603-916-5-99.
Full textKaur, Parminder, and Hardeep Singh. "Component Certification Process and Standards." In Designing, Engineering, and Analyzing Reliable and Efficient Software. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2958-5.ch002.
Full textUlbin, Miran, and Zoran Ren. "The Architecture of Heterogeneous Petascale HPC RIVR." In Parallel Computing: Technology Trends. IOS Press, 2020. http://dx.doi.org/10.3233/apc200046.
Full textConference papers on the topic "Software component based security (SCS)"
Gabštur, Peter, Martin Pollák, Marek Kočiško, and Jakub Kaščak. "Modification of Components Using Generative Design Tools." In Materials and Technologies for Defense and Security. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-7tgpug.
Full textSkandylas, Charilaos, Narges Khakpour, and Javier Cámara. "Security Countermeasure Selection for Component-Based Software-Intensive Systems." In 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2022. http://dx.doi.org/10.1109/qrs57517.2022.00017.
Full textGoertzel, Karen, and Theodore Winograd. "Safety and Security in Component-Based Software-Intensive Systems." In AIAA Infotech@Aerospace 2010. American Institute of Aeronautics and Astronautics, 2010. http://dx.doi.org/10.2514/6.2010-3332.
Full textZhu, Liming. "Session details: Security and safety." In Comparch '13: Federated Events on Component-Based Software Engineering and Software Architecture. ACM, 2013. http://dx.doi.org/10.1145/3246347.
Full textKhakpour, Narges, and Charilaos Skandylas. "Compositional Security Analysis of Dynamic Component-based Systems." In ASE '24: 39th IEEE/ACM International Conference on Automated Software Engineering. ACM, 2024. http://dx.doi.org/10.1145/3691620.3695499.
Full text"A COMPONENT-BASED SOFTWARE ARCHITECTURE FOR REALTIME AUDIO PROCESSING SYSTEMS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0001573002890294.
Full textLopez, Javier. "Session details: Evaluation of security issues." In Comparch '12: Federated Events on Component-Based Software Engineering and Software Architecture. ACM, 2012. http://dx.doi.org/10.1145/3245079.
Full textSelic, Bran. "Session details: ISARCS software architecture and security." In Comparch '11: Federated Events on Component-Based Software Engineering and Software Architecture. ACM, 2011. http://dx.doi.org/10.1145/3249134.
Full textMasood, A., S. Sedigh-Ali, and A. Ghafoor. "Efficiently managing security concerns in component based system design." In 29th Annual International Computer Software and Applications Conference (COMPSAC'05). IEEE, 2005. http://dx.doi.org/10.1109/compsac.2005.71.
Full textWei, Wang, and Li Tong. "An Approach for Dynamic Evolution of Component-based Software." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.69.
Full text