:facetid:toc:\"db/journals/ijsse/ijsse1.bht\"OK:facetid:toc:db/journals/ijsse/ijsse1.bhtAderemi O. AdenijiSeok-Won LeeAssimilating and Optimizing Software Assurance in the SDLC: A Framework and Step-Wise Approach.Int. J. Secur. Softw. Eng.1462-802010Journal Articlesclosedjournals/ijsse/AdenijiL1010.4018/JSSE.2010100104https://doi.org/10.4018/jsse.2010100104https://dblp.org/rec/journals/ijsse/AdenijiL10URL#4821996Yun BaiA Formal Approach for Securing XML Document.Int. J. Secur. Softw. Eng.1141-532010Journal Articlesclosedjournals/ijsse/Bai1010.4018/JSSE.2010102003https://doi.org/10.4018/jsse.2010102003https://dblp.org/rec/journals/ijsse/Bai10URL#4821997Joseph BarjisSoftware Engineering Security Based on Business Process Modeling.Int. J. Secur. Softw. Eng.121-172010Journal Articlesclosedjournals/ijsse/Barjis1010.4018/JSSE.2010040101https://doi.org/10.4018/jsse.2010040101https://dblp.org/rec/journals/ijsse/Barjis10URL#4821998Sergey BratusJames OakleyAshwin RamaswamySean W. SmithMichael E. LocastoKatana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain.Int. J. Secur. Softw. Eng.131-172010Journal Articlesclosedjournals/ijsse/BratusORSL1010.4018/JSSE.2010070101https://doi.org/10.4018/jsse.2010070101https://dblp.org/rec/journals/ijsse/BratusORSL10URL#4821999Huning DaiChristian MurphyGail E. KaiserCONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection.Int. J. Secur. Softw. Eng.1341-552010Journal Articlesclosedjournals/ijsse/DaiMK1010.4018/JSSE.2010070103https://doi.org/10.4018/jsse.2010070103https://dblp.org/rec/journals/ijsse/DaiMK10URL#4822000Thuong DoanSteven A. DemurjianLaurent MichelSolomon BerheIntegrating Access Control into UML for Secure Software Modeling and Analysis.Int. J. Secur. Softw. Eng.111-192010Journal Articlesclosedjournals/ijsse/DoanDMB1010.4018/JSSE.2010102001https://doi.org/10.4018/jsse.2010102001https://dblp.org/rec/journals/ijsse/DoanDMB10URL#4822001Shamal FailyIvan FlechaisTowards Tool-Support for Usable Secure Requirements Engineering with CAIRIS.Int. J. Secur. Softw. Eng.1356-702010Journal Articlesclosedjournals/ijsse/FailyF1010.4018/IJSSE.2010070104https://doi.org/10.4018/IJSSE.2010070104https://dblp.org/rec/journals/ijsse/FailyF10URL#4822002Frédéric GirardBertrand MeunierDuan HuaEric Dubois 0001A Rigorous Approach to the Definition of an International Vocational Master's Degree in Information Security Management.Int. J. Secur. Softw. Eng.141-172010Journal Articlesclosedjournals/ijsse/GirardMHD1010.4018/JSSE.2010100101https://doi.org/10.4018/jsse.2010100101https://dblp.org/rec/journals/ijsse/GirardMHD10URL#4822003Khaled M. KhanJun Han 0004A Tool Support for Secure Software Integration.Int. J. Secur. Softw. Eng.1235-562010Journal Articlesclosedjournals/ijsse/KhanH1010.4018/JSSE.2010040103https://doi.org/10.4018/jsse.2010040103https://dblp.org/rec/journals/ijsse/KhanH10URL#4822004Nancy R. MeadBenefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods.Int. J. Secur. Softw. Eng.1174-912010Journal Articlesclosedjournals/ijsse/Mead1010.4018/JSSE.2010102005https://doi.org/10.4018/jsse.2010102005https://dblp.org/rec/journals/ijsse/Mead10URL#4822005Nancy R. MeadJulia H. AllenMark A. ArdisThomas B. HilburnAndrew J. KorneckiRichard C. LingerJames McDonaldDevelopment of a Master of Software Assurance Reference Curriculum.Int. J. Secur. Softw. Eng.1418-342010Journal Articlesclosedjournals/ijsse/MeadAAHKLM1010.4018/JSSE.2010100102https://doi.org/10.4018/jsse.2010100102https://dblp.org/rec/journals/ijsse/MeadAAHKLM10URL#4822006Armstrong NhlabatsiBashar NuseibehYijun YuSecurity Requirements Engineering for Evolving Software Systems: A Survey.Int. J. Secur. Softw. Eng.1154-732010Journal Articlesclosedjournals/ijsse/NhlabatsiNY1010.4018/JSSE.2010102004https://doi.org/10.4018/jsse.2010102004https://dblp.org/rec/journals/ijsse/NhlabatsiNY10URL#4822007Torstein NicolaysenRichard SassonMaria B. LineMartin Gilje JaatunAgile Software Development: The Straight and Narrow Path to Secure Software?Int. J. Secur. Softw. Eng.1371-852010Journal Articlesclosedjournals/ijsse/NicolaysenSLJ1010.4018/JSSE.2010070105https://doi.org/10.4018/jsse.2010070105https://dblp.org/rec/journals/ijsse/NicolaysenSLJ10URL#4822008Hossain ShahriarMohammad ZulkernineMonitoring Buffer Overflow Attacks: A Perennial Task.Int. J. Secur. Softw. Eng.1318-402010Journal Articlesclosedjournals/ijsse/ShahriarZ1010.4018/JSSE.2010070102https://doi.org/10.4018/jsse.2010070102https://dblp.org/rec/journals/ijsse/ShahriarZ10URL#4822009Joseph J. SimpsonMary J. SimpsonBarbara Endicott-PopovskyViatcheslav PopovskySecure Software Education: A Contextual Model-Based Approach.Int. J. Secur. Softw. Eng.1435-612010Journal Articlesclosedjournals/ijsse/SimpsonSEP1010.4018/JSSE.2010100103https://doi.org/10.4018/jsse.2010100103https://dblp.org/rec/journals/ijsse/SimpsonSEP10URL#4822010San-Tsai SunKonstantin BeznosovRetrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks.Int. J. Secur. Softw. Eng.1120-402010Journal Articlesclosedjournals/ijsse/SunB1010.4018/JSSE.2010102002https://doi.org/10.4018/jsse.2010102002https://dblp.org/rec/journals/ijsse/SunB10URL#4822011George O. M. YeeTowards Designing E-Services that Protect Privacy.Int. J. Secur. Softw. Eng.1218-342010Journal Articlesclosedjournals/ijsse/Yee1010.4018/JSSE.2010040102https://doi.org/10.4018/jsse.2010040102https://dblp.org/rec/journals/ijsse/Yee10URL#4822012Yves YounanWouter JoosenFrank PiessensHans Van den EyndenImproving Memory Management Security for C and C++.Int. J. Secur. Softw. Eng.1257-822010Journal Articlesclosedjournals/ijsse/YounanJPE1010.4018/JSSE.2010040104https://doi.org/10.4018/jsse.2010040104https://dblp.org/rec/journals/ijsse/YounanJPE10URL#4822013