Academic literature on the topic 'Software component based security (SCS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software component based security (SCS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software component based security (SCS)"

1

T., Rajani Devi, and Rama B. "Software reusabilitydevelopment through NFL approach For identifying security based innerrelationships of affectingfactors." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (2020): 333–45. https://doi.org/10.11591/ijece.v10i1.pp333-345.

Full text
Abstract:
In component based software reusability development process, the software developers have to choose the best components which are self adaptive future to overcome the functional errors, framework mismatches, violation of user level privacy issues and data leakage feasibilities. The software developers can build high quality software applications by taking the consideration of the reusable components which are more suitable to provide high level data security and privacy. This paper has proposing the neural based fuzzy framework based approach to estimate the reusable components which are direc
APA, Harvard, Vancouver, ISO, and other styles
2

Ueno, Rei, Naofumi Homma, Akiko Inoue, and Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.

Full text
Abstract:
This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying scheme named LR Rekeying with Random oracle Repetition (LR4), along with a quantitative security evaluation methodology. Many existing LR primitives are based on a concept of leveled implementation, which still essentially require a leak-free sanctuary (i.e., differential power analysis (DPA)-resistant component(s)) for some parts. In addition, although several LR pseudorandom functions (PRFs) based on only bounded DPA-resistant components have been developed, their validity and effectiveness for rekeying
APA, Harvard, Vancouver, ISO, and other styles
3

Lavrischeva, Ekaterina Mikhailovna, and Sergey Vadimovich Zelenov. "Model-Based Approach to Ensuring Reliability and Security of Web-services." Proceedings of the Institute for System Programming of the RAS 32, no. 5 (2020): 153–66. http://dx.doi.org/10.15514/ispras-2020-32(5)-12.

Full text
Abstract:
In the paper, we analyze problems of reliability and security in the world practice and in Russia. We consider aspects of modeling software/hardware systems from service resources and ready-made reuses with ensuring reliability and security. We present the formed basic and theoretical foundations of the modeling problem, the experience of using modern service tools SOA, SCA, SOAP in software/hardware systems and Web systems to ensure their reliability and security on the Internet. We note that software/hardware systems and Web systems are created by the assembly build method in modern environm
APA, Harvard, Vancouver, ISO, and other styles
4

Palacios Chavarro, Sara, Pantaleone Nespoli, Daniel Díaz-López, and Yury Niño Roa. "On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering." Big Data and Cognitive Computing 7, no. 1 (2022): 1. http://dx.doi.org/10.3390/bdcc7010001.

Full text
Abstract:
Software is behind the technological solutions that deliver many services to our society, which means that software security should not be considered a desirable feature anymore but more of a necessity. Protection of software is an endless labor that includes the improvement of security controls but also the understanding of the sources that induce incidents, which in many cases are due to bad implementation or assumptions of controls. As traditional methods may not be efficient in detecting those security assumptions, novel alternatives must be attempted. In this sense, Security Chaos Enginee
APA, Harvard, Vancouver, ISO, and other styles
5

Terentiev, Oleksandr, Tetyana Prosyankina-Zharova, Valerii Diakon, and Roman Manuilenco. "Development of mathematical models to support decision-making regarding the functioning of critical infrastructure in the industry of energy supply." Technology audit and production reserves 6, no. 2(74) (2023): 44–49. http://dx.doi.org/10.15587/2706-5448.2023.293205.

Full text
Abstract:
The object of research is the energy supply company and the processes of generation and supply of electric energy. The paper examines the problems of building mathematical models for forecasting the operation of a critical infrastructure object in the conditions of a changing security environment, characterized by unpredictability, the presence of uncertainties of various types, the appearance of new threats, their combinations, changes in the form, duration, nature of their influence. In the work, the main attention is paid to the study of the functioning of critical infrastructure in the fie
APA, Harvard, Vancouver, ISO, and other styles
6

Mir, Irshad Ahmad, and S. M. K. Quadri. "Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework." International Journal of Computer Network and Information Security 4, no. 11 (2012): 21–31. http://dx.doi.org/10.5815/ijcnis.2012.11.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kahtan. "DEPENDABILITY ATTRIBUTES FOR INCREASED SECURITY IN COMPONENT-BASED SOFTWARE DEVELOPMENT." Journal of Computer Science 10, no. 7 (2014): 1298–306. http://dx.doi.org/10.3844/jcssp.2014.1298.1306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Xixi, Ruijie Cai, Xiaokang Yin, Wenqiang Shao, and Shengli Liu. "Searching Open-Source Vulnerability Function Based on Software Modularization." Applied Sciences 13, no. 2 (2023): 701. http://dx.doi.org/10.3390/app13020701.

Full text
Abstract:
Vulnerable open-source component reuse can lead to security problems. At present, open-source component detection for binary programs can only reveal whether open-source components with vulnerabilities are reused, which cannot determine the specific location of vulnerabilities. To address this problem, we propose BMVul, an open-source vulnerability function detection based on the software modularization method, which is oriented to binary programs. BMVul performs binary modularization by the overlapping clustering method DBM based on directed graph, then uses feature comparison technology to c
APA, Harvard, Vancouver, ISO, and other styles
9

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.

Full text
Abstract:
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
APA, Harvard, Vancouver, ISO, and other styles
10

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3532949.

Full text
Abstract:
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software component based security (SCS)"

1

Vorobiev, Artem. "An architectural approach to achieving higher-level security for component (service) based software systems." Swinburne Research Bank, 2008. http://hdl.handle.net/1959.3/47779.

Full text
Abstract:
Thesis (Ph.D) - Swinburne University of Technology, Faculty of Information & Communication Technologies, 2008.<br>Submitted in fulfillment of the requirements of for the degree of Doctor of Philosophy, Faculty of Information and Communication Technologies, Swinburne University of Technology, 2008. Typescript. Includes bibliographical references (p. 228-238)
APA, Harvard, Vancouver, ISO, and other styles
2

Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases
APA, Harvard, Vancouver, ISO, and other styles
3

Regateiro, Diogo José Domingues. "Dynamic and secure remote database access with soft access policies integration." Doctoral thesis, 2021. http://hdl.handle.net/10773/31633.

Full text
Abstract:
The amount of data being created and shared has grown greatly in recent years, thanks in part to social media and the growth of smart devices. Managing the storage and processing of this data can give a competitive edge when used to create new services, to enhance targeted advertising, etc. To achieve this, the data must be accessed and processed. When applications that access this data are developed, tools such as Java Database Connectivity, ADO.NET and Hibernate are typically used. However, while these tools aim to bridge the gap between databases and the object-oriented programming
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Software component based security (SCS)"

1

Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.

Full text
Abstract:
The book is devoted to the research and development of methods for combining computational structures for reconfigurable signature-based information protection tools for computer systems and networks in order to increase their efficiency. Network security tools based, among others, on such AI-based approaches as deep neural networking, despite the great progress shown in recent years, still suffer from nonzero recognition error probability. Even a low probability of such an error in a critical infrastructure can be disastrous. Therefore, signature-based recognition methods with their theoretic
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software component based security (SCS)"

1

Greiner, Simon, Martin Mohr, and Bernhard Beckert. "Modular Verification of Information Flow Security in Component-Based Systems." In Software Engineering and Formal Methods. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66197-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jha, Shambhu Kr, and R. K. Mishra. "Predicting and Accessing Security Features into Component-Based Software Development: A Critical Survey." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8848-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bartocci, Ezio, Thomas Ferrère, Thomas A. Henzinger, Dejan Nickovic, and Ana Oliveira da Costa. "Information-flow Interfaces." In Fundamental Approaches to Software Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_1.

Full text
Abstract:
AbstractContract-based design is a promising methodology for taming the complexity of developing sophisticated systems. A formal contract distinguishes between assumptions, which are constraints that the designer of a component puts on the environments in which the component can be used safely, and guarantees, which are promises that the designer asks from the team that implements the component. A theory of formal contracts can be formalized as an interface theory, which supports the composition and refinement of both assumptions and guarantees.Although there is a rich landscape of contract-ba
APA, Harvard, Vancouver, ISO, and other styles
4

Wenckstern, Michael von. "Improving the Model-Based Systems Engineering Process." In Ernst Denert Award for Software Engineering 2020. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83128-8_12.

Full text
Abstract:
AbstractModern embedded software systems are becoming more and more complex. Engineering embedded systems raise specific challenges that are rarely present in other software engineering disciplines due to the systems’ steady interactions with their environment. Research and industry often describe embedded systems as component and connector models (C&amp;C). C&amp;C models describe the logical architecture by focusing on software features and their logical communications. In C&amp;C models, hierarchical decomposed components encapsulate features, and connectors model the data flow between comp
APA, Harvard, Vancouver, ISO, and other styles
5

Pálhalmi, János, and Anna Mező. "AI-Powered Microscopy Platform for Airborne Biothreat Detection." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_10.

Full text
Abstract:
AbstractBecause Bacillus anthracis is one of the most lethal bioweapons, it is critical to create rapid, label-free screening and early warning systems to detect and classify anomalies in bacillus form vegetative cell and spore concentrations in the air. Even though significant effort has been invested in the development of various sensor solutions to detect, monitor, and identify airborne biological agents, no standard, interoperable, real-time or near-real-time optical sensor-based biothreat monitoring solution exists. Aside from the numerous advantages of genomic methods in microbe identifi
APA, Harvard, Vancouver, ISO, and other styles
6

Kirchhof, Jörg Christian. "From Design to Reality: An Overview of the MontiThings Ecosystem for Model-Driven IoT Applications." In Ernst Denert Award for Software Engineering 2022. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-44412-8_3.

Full text
Abstract:
AbstractThe Internet of Things (IoT) networks everyday objects that can perceive and influence their environment using sensors and actuators. Since IoT systems are inherently distributed systems, often built on fault-prone hardware and exposed to harsh environmental conditions such as vibration or humidity, developing such systems is challenging. In recent years, some DSLs for IoT system development have been introduced, yet they only slightly improve IoT system development. This chapter provides an overview of MontiThings, an ecosystem for model-driven development of IoT systems that covers t
APA, Harvard, Vancouver, ISO, and other styles
7

Gaedke, Martin, Martin Nussbaumer, and Emma Tonkin. "Software Contracts for Component-Based Web Engineering." In Encyclopedia of Information Science and Technology, First Edition. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch453.

Full text
Abstract:
As an emerging technology, the Web is full of unique challenges for developers, designers – and engineers. Its use for increasingly complex applications such as e-commerce and banking, involving connection to many data sources, highlighted a number of common difficulties. During the design phase, good modeling of complex sites is difficult; during implementation, the design models are often found to be difficult to translate into an implementation model; afterwards, maintenance and long-term management of the site’s evolution offer problems of their own. Qualities such as integrity, security,
APA, Harvard, Vancouver, ISO, and other styles
8

Yoshioka R., Watanobe Y., and Mirenkov N. "Incorporating Security into Software Development Process." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2008. https://doi.org/10.3233/978-1-58603-916-5-99.

Full text
Abstract:
A general scheme of software development process is considered and some aspects related to integrating security into this scheme are analyzed. In particular, semantic-based, defense-in-depth techniques embedded into system/component defense shields and data acquiring/monitoring kernels are considered. The defense shields are to semantically check data of every input before a software component may process them and also to check every output before sending it to other components. The kernels are to regularly perform semantic analysis of the internal status and local data of a component/system.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaur, Parminder, and Hardeep Singh. "Component Certification Process and Standards." In Designing, Engineering, and Analyzing Reliable and Efficient Software. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2958-5.ch002.

Full text
Abstract:
Component-based technology deals with the process of assembling existing software components in an application such that they interact to satisfy a predefined functionality. The success of component-based software depends on system integrator’s ability to select the most suitable software components for their intended application (Leavens and Sitaraman, 2000; Voas and Payne, 2000; Crnkovic et al., 2001). One persistent and largely unaddressed challenge is how the consumers of software components can obtain a meaningful level of trust in the runtime behaviour of software components. The most fr
APA, Harvard, Vancouver, ISO, and other styles
10

Ulbin, Miran, and Zoran Ren. "The Architecture of Heterogeneous Petascale HPC RIVR." In Parallel Computing: Technology Trends. IOS Press, 2020. http://dx.doi.org/10.3233/apc200046.

Full text
Abstract:
The EU has launched EuroHPC Joint Undertaking initiative plan to build an exascale HPC by 2025. A petascale HPC will be built in Slovenia in a concerted effort by 2020. The aim is to establish a national HPC system by own design with low maintenance and power consumption costs of the system. The HPC architecture will be unique, built from the off-the-shelf state-of-the-art components, and will operate using the open-source system software. A small HPC prototype system of about 200 TFLOP/s computing capability will be built in the first phase to test various computing nodes and components, whic
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software component based security (SCS)"

1

Gabštur, Peter, Martin Pollák, Marek Kočiško, and Jakub Kaščak. "Modification of Components Using Generative Design Tools." In Materials and Technologies for Defense and Security. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-7tgpug.

Full text
Abstract:
Parametric and generative design represent key elements of contemporary design, offering faster and more efficient ways of creating compared to traditional approaches. This article explores the use of generative design and parametric design in the field of industrial design, focusing on the application of generative design tools in Fusion 360 software for designing functional objects. Generative design, through algorithms and rules, enables the exploration of various design variants to find the optimal solution. It focuses on creating organic shapes and optimizing them based on specific criter
APA, Harvard, Vancouver, ISO, and other styles
2

Skandylas, Charilaos, Narges Khakpour, and Javier Cámara. "Security Countermeasure Selection for Component-Based Software-Intensive Systems." In 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2022. http://dx.doi.org/10.1109/qrs57517.2022.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goertzel, Karen, and Theodore Winograd. "Safety and Security in Component-Based Software-Intensive Systems." In AIAA Infotech@Aerospace 2010. American Institute of Aeronautics and Astronautics, 2010. http://dx.doi.org/10.2514/6.2010-3332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Liming. "Session details: Security and safety." In Comparch '13: Federated Events on Component-Based Software Engineering and Software Architecture. ACM, 2013. http://dx.doi.org/10.1145/3246347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khakpour, Narges, and Charilaos Skandylas. "Compositional Security Analysis of Dynamic Component-based Systems." In ASE '24: 39th IEEE/ACM International Conference on Automated Software Engineering. ACM, 2024. http://dx.doi.org/10.1145/3691620.3695499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"A COMPONENT-BASED SOFTWARE ARCHITECTURE FOR REALTIME AUDIO PROCESSING SYSTEMS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0001573002890294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lopez, Javier. "Session details: Evaluation of security issues." In Comparch '12: Federated Events on Component-Based Software Engineering and Software Architecture. ACM, 2012. http://dx.doi.org/10.1145/3245079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Selic, Bran. "Session details: ISARCS software architecture and security." In Comparch '11: Federated Events on Component-Based Software Engineering and Software Architecture. ACM, 2011. http://dx.doi.org/10.1145/3249134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Masood, A., S. Sedigh-Ali, and A. Ghafoor. "Efficiently managing security concerns in component based system design." In 29th Annual International Computer Software and Applications Conference (COMPSAC'05). IEEE, 2005. http://dx.doi.org/10.1109/compsac.2005.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, Wang, and Li Tong. "An Approach for Dynamic Evolution of Component-based Software." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!