Cost Effective Software Engineering for Security View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2006

AUTHORS

D. Randolph Johnson

ABSTRACT

In this talk I will discuss our experience with one particular development methodology for security related software. I will describe the general principles it follows, the tools used, and the resources needed. Then I will offer some opinions on why this approach is effective and practical for achieving even moderate levels of security. When the goal is a very high level security, I will explain why I believe that at least the general principles, if not the specific details, are probably essential. More... »

PAGES

607-611

Book

TITLE

FM 2006: Formal Methods

ISBN

978-3-540-37215-8
978-3-540-37216-5

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11813040_43

DOI

http://dx.doi.org/10.1007/11813040_43

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1036912863


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "National Security Agency", 
          "id": "https://www.grid.ac/institutes/grid.482831.4", 
          "name": [
            "National Security Agency, STE 6511, 9800 Savage Road, 20755-6511, Fort Meade, MD, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Johnson", 
        "givenName": "D. Randolph", 
        "id": "sg:person.014671060017.63", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014671060017.63"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2006", 
    "datePublishedReg": "2006-01-01", 
    "description": "In this talk I will discuss our experience with one particular development methodology for security related software. I will describe the general principles it follows, the tools used, and the resources needed. Then I will offer some opinions on why this approach is effective and practical for achieving even moderate levels of security. When the goal is a very high level security, I will explain why I believe that at least the general principles, if not the specific details, are probably essential.", 
    "editor": [
      {
        "familyName": "Misra", 
        "givenName": "Jayadev", 
        "type": "Person"
      }, 
      {
        "familyName": "Nipkow", 
        "givenName": "Tobias", 
        "type": "Person"
      }, 
      {
        "familyName": "Sekerinski", 
        "givenName": "Emil", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11813040_43", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-37215-8", 
        "978-3-540-37216-5"
      ], 
      "name": "FM 2006: Formal Methods", 
      "type": "Book"
    }, 
    "name": "Cost Effective Software Engineering for Security", 
    "pagination": "607-611", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1036912863"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11813040_43"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "afd6d8c4026b00a0e667c22f33034099f9cdd4ebc1bea620220ca7d25ffd13e5"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11813040_43", 
      "https://app.dimensions.ai/details/publication/pub.1036912863"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T07:30", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000356_0000000356/records_57874_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F11813040_43"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11813040_43'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11813040_43'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11813040_43'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11813040_43'


 

This table displays all metadata directly associated to this object as RDF triples.

75 TRIPLES      22 PREDICATES      27 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11813040_43 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author Na7ef383928314fb58571822acb6969af
4 schema:datePublished 2006
5 schema:datePublishedReg 2006-01-01
6 schema:description In this talk I will discuss our experience with one particular development methodology for security related software. I will describe the general principles it follows, the tools used, and the resources needed. Then I will offer some opinions on why this approach is effective and practical for achieving even moderate levels of security. When the goal is a very high level security, I will explain why I believe that at least the general principles, if not the specific details, are probably essential.
7 schema:editor Na9a468ef26fc4f23a2c69a0a1b05adbe
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N3783150bb3304ea2ba3dd4683abb4d15
12 schema:name Cost Effective Software Engineering for Security
13 schema:pagination 607-611
14 schema:productId N100aaffc53c243a7aa7aa48182b5c67b
15 N3c5e002c41784a2cb7827d39347f6772
16 Nf9234d13941d41d1a76fec1ec8fc0e2d
17 schema:publisher N8e71b85db7f2419c80b47fd4fea9dc4e
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036912863
19 https://doi.org/10.1007/11813040_43
20 schema:sdDatePublished 2019-04-16T07:30
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher N1e33a4e26b534a648a178c64c9e8361e
23 schema:url https://link.springer.com/10.1007%2F11813040_43
24 sgo:license sg:explorer/license/
25 sgo:sdDataset chapters
26 rdf:type schema:Chapter
27 N100aaffc53c243a7aa7aa48182b5c67b schema:name dimensions_id
28 schema:value pub.1036912863
29 rdf:type schema:PropertyValue
30 N1e33a4e26b534a648a178c64c9e8361e schema:name Springer Nature - SN SciGraph project
31 rdf:type schema:Organization
32 N3783150bb3304ea2ba3dd4683abb4d15 schema:isbn 978-3-540-37215-8
33 978-3-540-37216-5
34 schema:name FM 2006: Formal Methods
35 rdf:type schema:Book
36 N3c5e002c41784a2cb7827d39347f6772 schema:name readcube_id
37 schema:value afd6d8c4026b00a0e667c22f33034099f9cdd4ebc1bea620220ca7d25ffd13e5
38 rdf:type schema:PropertyValue
39 N436553dcf4354d4387c5a170a775c0d3 schema:familyName Nipkow
40 schema:givenName Tobias
41 rdf:type schema:Person
42 N83c312e115bf4f9796e520f88feb2671 rdf:first Ncf980ff59669415b90e4ec9a9ab420da
43 rdf:rest rdf:nil
44 N8e71b85db7f2419c80b47fd4fea9dc4e schema:location Berlin, Heidelberg
45 schema:name Springer Berlin Heidelberg
46 rdf:type schema:Organisation
47 Na7ef383928314fb58571822acb6969af rdf:first sg:person.014671060017.63
48 rdf:rest rdf:nil
49 Na9a468ef26fc4f23a2c69a0a1b05adbe rdf:first Nd8f972ce62504f4cb73ecdaf51a68d7f
50 rdf:rest Nccebf04c23c44622b87aff0ca42a62e0
51 Nccebf04c23c44622b87aff0ca42a62e0 rdf:first N436553dcf4354d4387c5a170a775c0d3
52 rdf:rest N83c312e115bf4f9796e520f88feb2671
53 Ncf980ff59669415b90e4ec9a9ab420da schema:familyName Sekerinski
54 schema:givenName Emil
55 rdf:type schema:Person
56 Nd8f972ce62504f4cb73ecdaf51a68d7f schema:familyName Misra
57 schema:givenName Jayadev
58 rdf:type schema:Person
59 Nf9234d13941d41d1a76fec1ec8fc0e2d schema:name doi
60 schema:value 10.1007/11813040_43
61 rdf:type schema:PropertyValue
62 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
63 schema:name Information and Computing Sciences
64 rdf:type schema:DefinedTerm
65 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
66 schema:name Computer Software
67 rdf:type schema:DefinedTerm
68 sg:person.014671060017.63 schema:affiliation https://www.grid.ac/institutes/grid.482831.4
69 schema:familyName Johnson
70 schema:givenName D. Randolph
71 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014671060017.63
72 rdf:type schema:Person
73 https://www.grid.ac/institutes/grid.482831.4 schema:alternateName National Security Agency
74 schema:name National Security Agency, STE 6511, 9800 Savage Road, 20755-6511, Fort Meade, MD, USA
75 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...