Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Software Engineering (D.2) > General (D.2.0) > Protection Mechanisms (D.2.0...)  
 
Options:
 
  1-10 of 16 Reviews about "Protection Mechanisms (D.2.0...)": Date Reviewed
  Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Schrittwieser S., Katzenbeisser S., Kinder J., Merzdovnik G., Weippl E. ACM Computing Surveys 49(1): 1-37, 2016.  Type: Article

Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication has steadily increased since then. Commercial vendors obfuscate their software to bloc...

Jun 22 2016
  Putting together QoS and security in autonomic pervasive systems
Alia M., Lacoste M., He R., Eliassen F.  Q2SWinet 2010 (Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, Oct 20-21, 2010) 19-28, 2010.  Type: Proceedings

Quality of service (QoS) is the ability of a set of networked resources--such as network elements, infrastructure devices, host computers, or a myriad of applications--to deliver traffic with minimum delay and maximum...

Feb 14 2011
  Run-time enforcement of nonsafety policies
Ligatti J., Bauer L., Walker D. ACM Transactions on Information and System Security 12(3): 1-41, 2009.  Type: Article

I have always viewed digital security and protection as more of an art than a science, the art of staying only one step behind the ingenuity of the next kid trying to break into some system or release that small bit of code that will b...

Jun 9 2009
  Ajax security
Hoffman B., Sullivan B., Addison-Wesley Professional, 2007. 504 pp.  Type: Book

Ajax technology is increasingly being used to build Web sites. As the title suggests, this book treats various security aspects related to Ajax technology. It describes various types of attacks possible on Web applications using Ajax.<...

Sep 18 2008
  Geekonomics: the real cost of insecure software
Rice D., ADDISON WESLEY, Upper Saddle River, NJ, 2007. 384 pp.  Type: Book

As we become more and more dependent on computer systems, and in turn on the software code that runs them, the consequences of encountering bugs in that code are turning out to be very high. This book provides an in-depth look at the v...

Jun 30 2008
  Embedded Java security: security for mobile devices
Debbabi M., Saleh M., Talhi C., Zhioua S., Springer-Verlag New York, Inc., Secaucus, NJ, 2006. 220 pp.  Type: Book (9781846285905)

The widespread use of mobile and wireless devices, such as phones and personal digital assistants (PDA), offers great opportunities for deploying mobile applications. Whenever software is downloaded or shared, or when sensitive data is...

Feb 11 2008
  Integrating security and software engineering: advances and future vision
Mouratidis H., Giorgini P., IGI Global, 2006.  Type: Book (9781599041476)

Even though the title page states that “all work contributed to this book is new, previously unpublished material,” a more appropriate description of this book would be a collection of academic papers&am...

Feb 4 2008
  Software security: building security in
McGraw G., Addison-Wesley Professional, Boston, MA, 2006. 448 pp.  Type: Book (9780321356703), Reviews: (4 of 4)

Software errors are the most prominent source of security flaws. In both the design and implementation phases, there are typical errors that software engineers make. This book’s goal is to teach readers how these errors c...

Jan 24 2008
  Software security: building security in
McGraw G., Addison-Wesley Professional, Boston, MA, 2006. 448 pp.  Type: Book (9780321356703), Reviews: (3 of 4)

The field of software security is as old as the field of software itself, yet it is not nearly as well developed. The result is noticeable almost every single day when we either encounter software malfunctions ourselves or read about t...

Dec 21 2007
  Trust structures: denotational and operational semantics
Krukow K., Nielsen M. International Journal of Information Security 6(2): 153-181, 2007.  Type: Article

In computer science, the term trust is used in two distinct ways. First, the human notion of trust may be formalized so that the sociological concept can be expressed in a machine-readable form, and can be used for reasoning. Second, a...

Dec 13 2007
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy