咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 电气工程
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 2 篇 insecure coding ...
  • 1 篇 jslint
  • 1 篇 data security
  • 1 篇 security vulnera...
  • 1 篇 security hole
  • 1 篇 static scanning
  • 1 篇 security of data
  • 1 篇 java code
  • 1 篇 software tools
  • 1 篇 java
  • 1 篇 scanning
  • 1 篇 spring security
  • 1 篇 program bug prev...
  • 1 篇 program diagnost...
  • 1 篇 source code scan...
  • 1 篇 security anti pa...
  • 1 篇 analysis program...
  • 1 篇 common problems
  • 1 篇 java programming...
  • 1 篇 existing securit...

机构

  • 1 篇 oracle labs bris...
  • 1 篇 princeton univ d...
  • 1 篇 cigital dulles v...
  • 1 篇 virginia tech bl...
  • 1 篇 rochester inst t...

作者

  • 1 篇 islam mazharul
  • 1 篇 felten ew
  • 1 篇 viega j
  • 1 篇 mutdosch t
  • 1 篇 rahaman sazzadur
  • 1 篇 krishnan padmana...
  • 1 篇 hassanshahi behn...
  • 1 篇 mcgraw g
  • 1 篇 meng na
  • 1 篇 yao danfeng (dap...

语言

  • 2 篇 英文
检索条件"主题词=insecure coding practices"
2 条 记 录,以下是1-10 订阅
排序:
Statically scanning Java Code: Finding security vulnerabilities
收藏 引用
IEEE SOFTWARE 2000年 第5期17卷 68-+页
作者: Viega, J McGraw, G Mutdosch, T Felten, EW Cigital Dulles VA 20166 USA Rochester Inst Technol Dept Comp Sci Rochester NY 14623 USA Princeton Univ Dept Comp Sci Princeton NJ 08544 USA
Developers and users require some degree of assurance in their applications' security vulnerabilities. The authors have designed a prototype tool, Jslint, to help programmers automatically use existing security kn... 详细信息
来源: 评论
coding practices and Recommendations of Spring Security for Enterprise Applications
Coding Practices and Recommendations of Spring Security for ...
收藏 引用
IEEE Secure Development (IEEE SecDev) Conference
作者: Islam, Mazharul Rahaman, Sazzadur Meng, Na Hassanshahi, Behnaz Krishnan, Padmanabhan Yao, Danfeng (Daphne) Virginia Tech Blacksburg VA 24061 USA Oracle Labs Brisbane Qld Australia
Spring security is tremendously popular among practitioners for its ease of use to secure enterprise applications. In this paper, we study the application framework misconfiguration vulnerabilities in the light of Spr... 详细信息
来源: 评论