Results 201 to 210 of about 193,653 (266)

Mainzelliste: Ten years of pseudonymization, record linkage, and informed consent management. [PDF]

open access: yesPatterns (N Y)
Tremper G   +4 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Software Security: Building Security In

2006 17th International Symposium on Software Reliability Engineering, 2006
Summary form only given. Software security has come a long way in the last few years, but we've really only just begun. I will present a detailed approach to getting past theory and putting software security into practice. The three pillars of software security are applied risk management, software security best practices (which I call touchpoints ...
openaire   +1 more source

Software Security

First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE '07), 2007
Security vulnerabilities are increasingly due to software. While we focus much of our attention today on code-level vulnerabilities, such as buffer overflows, we should be paying more attention to design-level vulnerabilities. Independently designed and implemented components may individually behave properly, but when put together, unanticipated ...
openaire   +1 more source

Home - About - Disclaimer - Privacy