期刊文献+
共找到304篇文章
< 1 2 16 >
每页显示 20 50 100
Review of Techniques for Integrating Security in Software Development Lifecycle
1
作者 Hassan Saeed Imran Shafi +3 位作者 Jamil Ahmad Adnan Ahmed Khan Tahir Khurshaid Imran Ashraf 《Computers, Materials & Continua》 SCIE EI 2025年第1期139-172,共34页
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq... Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists. 展开更多
关键词 software development lifecycle systematic literature review critical software security risks national institute of standards and technology DevSecOps open web application security project McGraw’s touch points
在线阅读 下载PDF
Security Threat and Vulnerability Assessment and Measurement in Secure Software Development 被引量:1
2
作者 Mamoona Humayun NZ Jhanjhi +1 位作者 Maram Fahhad Almufareh Muhammad Ibrahim Khalil 《Computers, Materials & Continua》 SCIE EI 2022年第6期5039-5059,共21页
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T... Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications. 展开更多
关键词 security secure software development software development life cycle(sdlC) CONFIDENTIALITY INTEGRITY AVAILABILITY
在线阅读 下载PDF
Organization of pattern information in the pattern based software development:A POMSDP model
3
作者 唐勇 刘日光 王岩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第6期752-756,共5页
Foeused on the lack of proper organization for patterns in the development of pattern based software, a POMSDP model with layered tree structure for organizing patterns during the process of development was put torwar... Foeused on the lack of proper organization for patterns in the development of pattern based software, a POMSDP model with layered tree structure for organizing patterns during the process of development was put torward. The model and its interrelated eoneepts were strictly defined and introduced by applying the theory of set, symbolie logic and pattern, which ensures the correctness, maturity and expansibility of the model. The expansibility of the model was discussed mainly. The basic realization and the application in the automatic query system were presented. Based on the existing software development methods, the POMSDP model resolves the problem of chaos in the application of patterns, strengthens the controllability of the system, and facilitates the improvement, maintenance, expansion, and especially the reengineering of the software system. 展开更多
关键词 software development based on pattern pattern organization POMSDP model
在线阅读 下载PDF
Soil Database Management Software Development for Optimizing Land Resource Information Utilization to Support National Food Security
4
作者 Rizatus Shofiyati Saefoel Bachri 《Journal of Geographic Information System》 2011年第3期211-216,共6页
Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to ... Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to manage such a large amount of data, i.e.: Side & Horizon (SHDE4), Soil Sample Analysis (SSA), and Land Unit in dbf file, while Site and Horizon is in DataEase formats. The database contains soil physics and chemical property data of each soil horizon from surface to effective soil depth, climate, land surface condi- tions, and other parameters required for soil classification. Currently, database management software for land resources is still based on DOS and is stand alone. The system is not efficient and effectively used as Agri- cultural Land Resource Information System. At present, as a key component of this system requires review and development of new database software is compatible with the development of information technology. This paper explains about development of interactive agricultural land resources information system for op- timizing land resources data utilization. Hopefully, the software can give contributions in national Agricul- tural Land Resources System Information development for supporting food security. 展开更多
关键词 SOIL DATABASE software development LAND RESOURCES Information FOOD security
暂未订购
Analysis of Software Development and Operation Measures from the Perspective of Security Technology
5
作者 Yan Gao 《Journal of Electronic Research and Application》 2024年第6期145-151,共7页
Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business... Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data. 展开更多
关键词 security technology software development Operation and maintenance
在线阅读 下载PDF
Secure Development Methodology for Full Stack Web Applications:Proof of the Methodology Applied to Vue.js,Spring Boot and MySQL
6
作者 Kevin Santiago Rey Rodriguez Julián David Avellaneda Galindo +3 位作者 Josep Tárrega Juan Juan Ramón Bermejo Higuera Javier Bermejo Higuera Juan Antonio Sicilia Montalvo 《Computers, Materials & Continua》 2025年第10期1807-1858,共52页
In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementi... In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js,Spring Boot,and MySQL architecture.The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication,fine-grained authorization controls,sophisticated session management,data confidentiality and integrity protection,secure logging mechanisms,comprehensive error handling,high availability strategies,advanced input validation,and security headers implementation.Significant contributions are made to the field of web application security.First,a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats,backed by rigorous analysis and industry best practices.Second,the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment,demonstrating the practical effectiveness of the security measures.The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection,ensuring robust security coverage.The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology.A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle(SSDLC),creating a security-first mindset from initial design to deployment.By combining proactive secure coding practices with defensive security approaches,a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams.This hybrid approach ensures that security considerations are woven into every aspect of the development process,rather than being treated as an afterthought. 展开更多
关键词 Web security methodology secure software development lifecycle DevSecOps security requirements secure development Full Stack Web applications
在线阅读 下载PDF
Redefining the Programmer:Human-AI Collaboration,LLMs,and Security in Modern Software Engineering
7
作者 Elyson De La Cruz Hanh Le +2 位作者 Karthik Meduri Geeta Sandeep Nadella Hari Gonaygunta 《Computers, Materials & Continua》 2025年第11期3569-3582,共14页
The rapid integration of artificial intelligence(AI)into software development,driven by large language models(LLMs),is reshaping the role of programmers from traditional coders into strategic collaborators within Indu... The rapid integration of artificial intelligence(AI)into software development,driven by large language models(LLMs),is reshaping the role of programmers from traditional coders into strategic collaborators within Industry 4.0 ecosystems.This qualitative study employs a hermeneutic phenomenological approach to explore the lived experiences of Information Technology(IT)professionals as they navigate a dynamic technological landscape marked by intelligent automation,shifting professional identities,and emerging ethical concerns.Findings indicate that developers are actively adapting to AI-augmented environments by engaging in continuous upskilling,prompt engineering,interdisciplinary collaboration,and heightened ethical awareness.However,participants also voiced growing concerns about the reliability and security of AI-generated code,noting that these tools can introduce hidden vulnerabilities and reduce critical engagement due to automation bias.Many described instances of flawed logic,insecure patterns,or syntactically correct but contextually inappropriate suggestions,underscoring the need for rigorous human oversight.Additionally,the study reveals anxieties around job displacement and the gradual erosion of fundamental coding skills,particularly in environments where AI tools dominate routine development tasks.These findings highlight an urgent need for educational reforms,industry standards,and organizational policies that prioritize both technical robustness and the preservation of human expertise.As AI becomes increasingly embedded in software engineering workflows,this research offers timely insights into how developers and organizations can responsibly integrate intelligent systems to promote accountability,resilience,and innovation across the software development lifecycle. 展开更多
关键词 Human-AI collaboration large language models AI security developer identity ethical AI in software development AI-assisted programming
在线阅读 下载PDF
以发展和安全统筹推进边疆地区现代化——深入学习领会“十五五”规划建议
8
作者 孙久文 《西北民族大学学报(哲学社会科学版)》 北大核心 2026年第1期7-11,共5页
边疆地区在基础设施建设、特色产业培育(如新能源、旅游业)以及对外开放等领域取得了显著成就,但仍面临经济水平偏低、人才短缺、生态压力大、安全形势复杂等多重挑战。基于总体国家安全观,该区域要以发展和安全统筹推进现代化:健全边... 边疆地区在基础设施建设、特色产业培育(如新能源、旅游业)以及对外开放等领域取得了显著成就,但仍面临经济水平偏低、人才短缺、生态压力大、安全形势复杂等多重挑战。基于总体国家安全观,该区域要以发展和安全统筹推进现代化:健全边疆治理体系、强化风险防控、深化“兴边富民”战略;同时挖掘边疆独特优势(区位、资源储备、特色经济、政策倾斜),将其转化为发展动能。“十五五”时期,边疆地区需发挥“双循环”枢纽功能:建设国际物流与供应链枢纽、扩大跨境数字金融服务、打造能源资源基地、发展特色文旅经济,实现从地理边缘区到双向开放增长极的转变,筑牢发展和安全屏障。 展开更多
关键词 “十五五”规划 边疆地区 中国式现代化 新安全格局 新发展格局
在线阅读 下载PDF
融入安全的软件开发方法SDL的研究 被引量:4
9
作者 任地成 王丽君 潘瑞 《计算机应用与软件》 CSCD 2010年第7期280-282,293,共4页
将SDL(Security Development Lifecycle)的开发过程的13个活动划分成了5个过程,并对5个过程中的各个活动作了详细描述,同时对每个过程的安全性作了分析。通过与传统的开发模式的对比,体现出SDL在软件开发方面更高的安全性,最后引入了微... 将SDL(Security Development Lifecycle)的开发过程的13个活动划分成了5个过程,并对5个过程中的各个活动作了详细描述,同时对每个过程的安全性作了分析。通过与传统的开发模式的对比,体现出SDL在软件开发方面更高的安全性,最后引入了微软在实践中成功应用SDL的案例来说明SDL较高的实际应用价值。 展开更多
关键词 软件开发 安全 开发模式 sdl
在线阅读 下载PDF
基于生态系统健康的川滇生态屏障区生态安全格局构建
10
作者 刘娇 杨爱霞 +1 位作者 李帅锋 苏建荣 《林业科学》 北大核心 2026年第1期42-56,共15页
【目的】构建生态系统健康评估框架与综合阻力面,识别川滇生态屏障区生态源地和关键节点,为研究区生态安全格局优化奠定基础,为生态保护与修复提供科学依据。【方法】基于2021年多源基础数据和“生态活力-组织力-恢复力-生态系统服务”... 【目的】构建生态系统健康评估框架与综合阻力面,识别川滇生态屏障区生态源地和关键节点,为研究区生态安全格局优化奠定基础,为生态保护与修复提供科学依据。【方法】基于2021年多源基础数据和“生态活力-组织力-恢复力-生态系统服务”框架,利用InVEST、Fragstats和TerrSet等软件,评估研究区生态系统健康空间分布,确定最优生态源保护方案;采用随机森林模型计算未来土地利用发展概率,结合自然和社会因子构建综合生态阻力面,应用电路理论模型构建研究区生态安全格局。【结果】2021年,研究区生态系统物理健康指数、活力、组织力和恢复力均呈现明显的空间分异。生态系统物理健康指数和活力平均值分别为0.533和0.546,呈南高北低分布,高值区主要分布在生态系统类型多样、野生生物资源丰富、植被覆盖率较高及水资源充足的南部、西南部、中部和北部;西北部和东部的生态系统物理健康和活力水平较低。组织力平均值为0.583,受地形阻隔影响,高值区多分布在地势平坦、交通连通性较好、植被覆盖度高、有河流穿越的区域;低值区集中于岷山、米仓山、邛崃山、大凉山和高黎贡山等地形复杂地区。恢复力平均值高达0.667,西部和西北部因过度放牧引发草地退化、盐碱化和沙化等问题而呈低值,城镇发达、耕地密集和湖泊所在地也为低值区。生态系统健康分布呈西部、西北部、东部和东南部较低,东北部、中部和南部较高的格局。综合生态阻力面平均值为32.716,与生态系统健康分布趋势相反。生态安全格局共包含210块生态源地,面积66990.64 km^(2),占总面积的28.28%;生态廊道511条,总长度达5951.475 km;在空间分布上呈现出西部密集、东部稀疏的特征。一般生态廊道(250条)长且分散,连接较远生态源;重要生态廊道(178条)短而密集,与一般廊道形成廊道网络;核心生态廊道(83条)连接面积较大源地。共识别出143个生态夹点和248个生态障碍点,主要分布于一般生态廊道上,以草地、其他用地和耕地为主。【结论】本研究揭示出川滇生态屏障区生态系统物理健康的区域差异,生态系统健康整体呈南北高、东西低分布格局。东北部、中部和南部是生态源地和夹点的集中分布区,应优先保护自然植被的完整性;阿坝州、甘孜州和香格里拉地区受自然与人为活动的影响显著,应重点修复;应进一步优化东北部和南部地区的空间规划,协调生态与经济的可持续发展。 展开更多
关键词 生态系统服务 生态系统健康 土地发展概率 电路理论 生态安全格局
在线阅读 下载PDF
新型城镇化视角下生态脆弱区城市群土地景观适宜性评价——以西部地区呼包鄂榆城市群为例
11
作者 杨丰玮 崔秀萍 单菁菁 《国土资源科技管理》 2026年第1期91-103,共13页
景观适宜性评价关联地域功能属性与特定开发方式需求之间的匹配度,是开展区域国土空间生态安全格局优化的先决条件之一。为把握新型城镇化的生态宜居理念,围绕自然地理禀赋、社会经济发展态势和区位可达性特征三维视角,构建西部生态脆... 景观适宜性评价关联地域功能属性与特定开发方式需求之间的匹配度,是开展区域国土空间生态安全格局优化的先决条件之一。为把握新型城镇化的生态宜居理念,围绕自然地理禀赋、社会经济发展态势和区位可达性特征三维视角,构建西部生态脆弱区城市群景观适宜性评价体系,并以呼包鄂榆城市群为例进行验证。基于ROC检验训练演绎得到最优尺度,综合运用GIS-Logistic以揭示研究区景观布局的驱动机理及国土空间开发潜力。结果表明:(1)呼包鄂榆城市群林地、草地、水域的分布受自然地理因子影响较大,耕地和未利用地的布局受自然地理与区位因子双重驱动,建设用地多从经济活跃、交通网密集地区向外扩展;(2)6类土地景观的适宜度高值区与2020年的分布方位较一致,但仅耕地具备继续扩张潜力,其高度适宜区面积占比45.873%,远大于基期的17.821%,其余景观的分布结构均已超出高度适宜区阈值;(3)30 m最优尺度下耕地、林地、草地、水域、建设用地和未利用地的ROC曲线下的面积AUC值分别为0.755、0.824、0.688、0.747、0.811和0.810,Logistic回归模型整体拟合度较高。开展土地景观适宜性评价,摸底生态安全格局的构建基础,以期为呼包鄂榆城市群的新型城镇化空间治理提出差异化的响应策略。 展开更多
关键词 景观适宜性评价 LOGISTIC回归 呼包鄂榆城市群 生态安全格局 国土空间开发
在线阅读 下载PDF
2025年国内外油气资源形势分析及展望
12
作者 王彧嫣 郑志红 +3 位作者 韩志强 李文博 白羽 樊大磊 《中国矿业》 北大核心 2026年第1期30-40,共11页
在国际博弈加剧与供需矛盾叠加的背景下,保障油气资源安全的重要性日益凸显。我国油气供需缺口长期存在,外采度持续处于高位,2025年石油外采度超过70%,天然气超过40%,因此,加快国内油气勘查开采技术突破与产能提升成为维护能源安全的关... 在国际博弈加剧与供需矛盾叠加的背景下,保障油气资源安全的重要性日益凸显。我国油气供需缺口长期存在,外采度持续处于高位,2025年石油外采度超过70%,天然气超过40%,因此,加快国内油气勘查开采技术突破与产能提升成为维护能源安全的关键。本文基于“全球地缘政治-经济周期-能源转型”三维分析框架,结合对国际重大事件与能源热点的持续跟踪,依托国际货币基金组织(IMF)、国际能源署(IEA)、美国能源信息署(EIA)、欧佩克(OPEC)等权威机构的公开报告,系统分析2025年国内外油气市场格局与发展趋势,并与2020年“双碳”目标提出初期及2021年“十四五”开局阶段的核心指标进行纵向对比;同时,与美国、印度等主要油气消费国2025年数据开展横向比较。研究结果表明:全球地缘格局演变与贸易政策不确定性共同强化了经济放缓预期,叠加OPEC+增产与非OPEC国家高产量,国际石油市场供需趋于宽松,油价呈宽幅震荡下行;全球天然气市场呈现区域分化、供需趋松、波动收窄的特征,价格受地缘政治、供需关系及天气因素共同驱动。我国经济稳中有进,能源消费“稳中有增”,油气勘探在主要盆地和近海取得重要突破,产量保持“油稳气增”并创历史新高,非常规油气占比显著提升,天然气消费进一步向民生领域倾斜,但原油进口来源集中、自给率偏低等问题依然突出。展望2026年,全球石油市场将延续宽松态势,油价预计震荡下行;天然气价格呈分化走势,美国均价回升,全球市场受欧洲库存与亚洲需求制约难现大涨。国内油气产量将继续增长,原油保持稳产,天然气年产量有望再增百亿立方米,为国家能源安全和新型能源体系建设提供坚实支撑。 展开更多
关键词 油气资源 石油 天然气 油价 供需格局 勘探开发 油气资源安全
在线阅读 下载PDF
Utilization effect of water-land resources under the evolution of Chinese dietary patterns 被引量:5
13
作者 ZHU Yuanyuan WANG Ziwei ZHU Xiaohua 《Journal of Geographical Sciences》 SCIE CSCD 2023年第4期741-759,共19页
Exploring the utilization effect of water-land resources under the evolution of dietary patterns is of great significance in achieving sustainable global food consumption and the effective allocation of national resou... Exploring the utilization effect of water-land resources under the evolution of dietary patterns is of great significance in achieving sustainable global food consumption and the effective allocation of national resources.Our selected study area was China,a country with rapidly changing dietary consumption patterns,and the research period was between 1987 and 2020.Based on the material called Chinese Dietary Guidelines 2021,this study introduced the“virtual water”and the“virtual land”to quantify the utilization effect of water-land resources under the evolution of Chinese dietary patterns.Results showed that the dietary patterns gradually changed from“cereal-vegetable-based consumption”to“diversified consumption”.Food consumption’s total water footprint(WF)increased from 471.1 Gm3in 1987 to 848.8 Gm3in 2020,with a growth rate of 80.2%.Moreover,the total land requirement for food(LRF)increased from 88.8 Mha in 1987 to 129.9 Mha in 2020,with a growth rate of 46.3%.Furthermore,the meat consumption was the major contributor to the increase in total WF(104.0%)and LRF(102.1%).In contrast to the balanced diet pattern,there was no waste of water-land resources consumption for the food consumption of urban-rural residents in China between 1987 and 2020.However,the consumption of water resources would gradually approach the resource cost under the balanced diet patterns.It would eventually break through the critical value and reach the state of resource waste.In addition,the findings showed that urban residents’waste rate of water-land resources for meat consumption increased by 142.3%compared with that in 1987.The research results can provide scientific guidance for resolving the food crisis under the supply of water-land resources in China and have an essential reference for national food security and sustainable development of resources and environment. 展开更多
关键词 dietary patterns water-land resource utilization food security sustainable development China
原文传递
Systematic Review of Web Application Security Vulnerabilities Detection Methods 被引量:2
14
作者 Sajjad Rafique Mamoona Humayun +2 位作者 Zartasha Gul Ansar Abbas Hasan Javed 《Journal of Computer and Communications》 2015年第9期28-40,共13页
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed eit... In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards. 展开更多
关键词 software development LIFECYCLE Web Applications security VULNERABILITIES Systematic LITERATURE REVIEW
在线阅读 下载PDF
SDL安全开发流程在软件开发中的应用 被引量:2
15
作者 李晓蕴 刘海峰 《软件》 2023年第5期104-106,共3页
无论是航天飞机、人造卫星等尖端科技,还是煤炭、电力、港口等传统行业都离不开软件开发的建设,软件安全问题也是广泛存在,并且造成的影响有时候不可估量。软件安全问题究其根本在于软件本身存在安全漏洞并面临外部安全威胁,为了应对严... 无论是航天飞机、人造卫星等尖端科技,还是煤炭、电力、港口等传统行业都离不开软件开发的建设,软件安全问题也是广泛存在,并且造成的影响有时候不可估量。软件安全问题究其根本在于软件本身存在安全漏洞并面临外部安全威胁,为了应对严峻的软件安全问题,国内外一直在研究软件安全管理、全开发流程等。本文通过在传统的软件项目开发流程中,引入SDL安全开发流程,提高软件产品安全质量,降低软件安全隐患。 展开更多
关键词 sdl 软件开发 应用
在线阅读 下载PDF
Evaluating the Impacts of Security-Durability Characteristic:Data Science Perspective
16
作者 Abdullah Alharbi Masood Ahmad +5 位作者 Wael Alosaimi Hashem Alyami Alka Agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期557-567,共11页
Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps ha... Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps have been found to be less durable in recent years;thus reducing their business continuity.High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability.Hence,there is a necessity to link in the gap between durability and security of the web application.Indeed,security mechanisms must be used to enhance durability as well as the security of the web application.Although durability and security are not related directly,some of their factors influence each other indirectly.Characteristics play an important role in reducing the void between durability and security.In this respect,the present study identifies key characteristics of security and durability that affect each other indirectly and directly,including confidentiality,integrity availability,human trust and trustworthiness.The importance of all the attributes in terms of their weight is essential for their influence on the whole security during the development procedure of web application.To estimate the efficacy of present study,authors employed the Hesitant Fuzzy Analytic Hierarchy Process(H-Fuzzy AHP).The outcomes of our investigations and conclusions will be a useful reference for the web application developers in achieving a more secure and durable web application. 展开更多
关键词 software security DURABILITY durability of security services web application development process
在线阅读 下载PDF
Mobile Software Assurance Informed through Knowledge Graph Construction: The OWASP Threat of Insecure Data Storage
17
作者 Suzanna Schmeelk Lixin Tao 《Journal of Computer Science Research》 2020年第2期17-29,共13页
Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologi... Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data. 展开更多
关键词 CYBERsecurity Secure software development Penetration testing Risk assessment
在线阅读 下载PDF
提升我国粮食供应链韧性:理论内涵、风险外溢与逻辑思路 被引量:8
18
作者 张锦华 石帅伟 《学术论坛》 北大核心 2025年第1期125-137,共13页
粮食安全是“国之大者”,提升粮食供应链韧性和安全水平是增强我国粮食产业抗风险能力的必然要求。文章从新发展格局角度出发,厘清粮食供应链韧性的理论内涵,基于“双链”之间的相互作用,分析国内粮食供应链和国际粮食供应链存在的风险... 粮食安全是“国之大者”,提升粮食供应链韧性和安全水平是增强我国粮食产业抗风险能力的必然要求。文章从新发展格局角度出发,厘清粮食供应链韧性的理论内涵,基于“双链”之间的相互作用,分析国内粮食供应链和国际粮食供应链存在的风险外溢,并进一步探讨提升粮食供应链韧性的核心逻辑和基本思路。研究表明,粮食供应链韧性强调化解各种对链条的不利冲击,并确保粮食产业体系中各参与主体的正常运营,进而维护粮食产业供需网络生态系统的稳定。国内粮食供应链和国际粮食供应链存在的风险具有明显差异,且风险会在“双链”的相互作用过程中互相传导,形成双向风险外溢机制。提升粮食供应链韧性,可从微观逻辑、本土逻辑和政策逻辑三个层面考量,即推进居民“需粮可获”和农户“种粮稳收”的供需保障机制;以粮食物流企业为核心形成“低成本、信息化”的粮食物流网络;构建以国内粮食供应链为主、国际粮食供应链为辅的粮食供应链协同体系。提升粮食供应链韧性的基本思路具体包括构建居民自发参与的家庭粮食储备体系、试点农户粮食抗灾品种种植补贴、提高物联网和区块链技术在粮食“收储运”中的应用率以及鼓励大型农业企业实施大豆跨国种植等。 展开更多
关键词 新发展格局 粮食供应链 供应链韧性 粮食安全 总体国家安全观
在线阅读 下载PDF
Moving From Traditional Software Engineering to Componentware
19
作者 Faisal Nabi Roisin Mullins 《Journal of Software Engineering and Applications》 2011年第5期283-292,共10页
The field of software engineering and software technology is developing very fast. Perhaps as a consequence, there is seldom enough interest or opportunity for systematic investigation of how the underlying technology... The field of software engineering and software technology is developing very fast. Perhaps as a consequence, there is seldom enough interest or opportunity for systematic investigation of how the underlying technology will actually perform. That is, we introduce new concepts, methods, techniques and tools – or change existing ones and emphasize their value. A major turn in software engineering leading to Componentware has dramatically changed the shape of software development and introduced interesting methods for the design and rapid development of systems which may provide cost-effective benefits. In this paper we will discuss Componentware, process model, architecture, principles and the drivers, advantages, disadvantage and reveal profound changes from the traditional software engineering approaches. 展开更多
关键词 software COMPONENT Componentware COMPONENT INFRASTRUCTURE software pattern software Architecture Component-Based-development
在线阅读 下载PDF
软件开发中SDL安全开发流程运用分析
20
作者 张莉 《信息与电脑》 2024年第7期115-118,共4页
本文简要介绍了软件安全开发生命周期模型(Security Development Lifecycle,SDL)安全开发用于软件开发体系的具体方法:建立软件整体架构、明确安全设计方法;以安卓安全卫士为开发视角,给出SDL安全开发的技术流程,总结SDL安全开发的技术... 本文简要介绍了软件安全开发生命周期模型(Security Development Lifecycle,SDL)安全开发用于软件开发体系的具体方法:建立软件整体架构、明确安全设计方法;以安卓安全卫士为开发视角,给出SDL安全开发的技术流程,总结SDL安全开发的技术优势;从本地化角度对比分析本地化工具,指出客户端使用SDL安全开发的积极意义,以此简化开发流程,缩短开发时间。 展开更多
关键词 软件 sdl 开发
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部