Loading…
Technology Transfer: A Software Security Marketplace Case Study
This paper presents the software security (application security) solutions. It is an idea of engineering software so that it continues to function correctly under malicious attack. Although as a discipline software security is relatively young, much progress has been made on ways to integrate securi...
Saved in:
Published in: | IEEE software 2011-09, Vol.28 (5), p.9-11 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703 |
---|---|
cites | cdi_FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703 |
container_end_page | 11 |
container_issue | 5 |
container_start_page | 9 |
container_title | IEEE software |
container_volume | 28 |
creator | McGraw, G. |
description | This paper presents the software security (application security) solutions. It is an idea of engineering software so that it continues to function correctly under malicious attack. Although as a discipline software security is relatively young, much progress has been made on ways to integrate security best practices into the software development life cycle. Microsoft, for example, has helped spearhead soft ware security through its Trustworthy Computing Initiative and the resulting Security Development Lifecycle (SDL). Cigital has also been instrumental in bringing software security to the wider market through its professional services. |
doi_str_mv | 10.1109/MS.2011.110 |
format | article |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_24426395</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5984788</ieee_id><sourcerecordid>1671343975</sourcerecordid><originalsourceid>FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703</originalsourceid><addsrcrecordid>eNqFkE1LAzEQhoMoWKsnj14WQRBkNZ-bxIuU4hdYPLSel5hMdHXbrckusv_eLC0evMgchmGeeWfmReiY4EtCsL6azS8pJmQodtCIaCZzTjTfRSMsOc4lF3ofHcT4gTEWhOERulmAfV81dfPWZ4tgVtFDuM4m2bzx7bcJkM3BdqFq-2xmwie069pYyKYmpk7buf4Q7XlTRzja5jF6ubtdTB_yp-f7x-nkKbdMFm3uOQhBvMQpGPACqBVceVMopYQTShjsnPPCUiedIUpzrA0G5yjY4lViNkbnG911aL46iG25rKKFujYraLpYkkISxpmW4n8UJ6sIpWlgjE7_oB9NF1bpkVIpRotCsmH1xQayoYkxgC_XoVqa0CelcrC9nM3LwfahSPTZVtJEa2qfPLVV_B2hnNOC6eHKkw1XAcBvW2jFZVr9A1gkiDU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>883266730</pqid></control><display><type>article</type><title>Technology Transfer: A Software Security Marketplace Case Study</title><source>ABI/INFORM Global</source><source>IEEE Xplore (Online service)</source><creator>McGraw, G.</creator><creatorcontrib>McGraw, G.</creatorcontrib><description>This paper presents the software security (application security) solutions. It is an idea of engineering software so that it continues to function correctly under malicious attack. Although as a discipline software security is relatively young, much progress has been made on ways to integrate security best practices into the software development life cycle. Microsoft, for example, has helped spearhead soft ware security through its Trustworthy Computing Initiative and the resulting Security Development Lifecycle (SDL). Cigital has also been instrumental in bringing software security to the wider market through its professional services.</description><identifier>ISSN: 0740-7459</identifier><identifier>EISSN: 1937-4194</identifier><identifier>DOI: 10.1109/MS.2011.110</identifier><identifier>CODEN: IESOEG</identifier><language>eng</language><publisher>Los Alamitos, CA: IEEE</publisher><subject>Alliances ; Applied sciences ; Best practice ; Best practices ; Case studies ; code review ; Computer programs ; Computer science; control theory; systems ; Computer security ; Cybersecurity ; Data encryption ; Engineering ; Exact sciences and technology ; Government grants ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Network security ; R&D ; Research & development ; Risk assessment ; Security ; Software ; Software engineering ; Software industry ; software security ; Technology transfer ; Venture capital</subject><ispartof>IEEE software, 2011-09, Vol.28 (5), p.9-11</ispartof><rights>2015 INIST-CNRS</rights><rights>Copyright IEEE Computer Society Sep/Oct 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703</citedby><cites>FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/883266730?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,777,781,11669,27905,27906,36041,36042,44344,54777</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=24426395$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>McGraw, G.</creatorcontrib><title>Technology Transfer: A Software Security Marketplace Case Study</title><title>IEEE software</title><addtitle>S-M</addtitle><description>This paper presents the software security (application security) solutions. It is an idea of engineering software so that it continues to function correctly under malicious attack. Although as a discipline software security is relatively young, much progress has been made on ways to integrate security best practices into the software development life cycle. Microsoft, for example, has helped spearhead soft ware security through its Trustworthy Computing Initiative and the resulting Security Development Lifecycle (SDL). Cigital has also been instrumental in bringing software security to the wider market through its professional services.</description><subject>Alliances</subject><subject>Applied sciences</subject><subject>Best practice</subject><subject>Best practices</subject><subject>Case studies</subject><subject>code review</subject><subject>Computer programs</subject><subject>Computer science; control theory; systems</subject><subject>Computer security</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Engineering</subject><subject>Exact sciences and technology</subject><subject>Government grants</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Network security</subject><subject>R&D</subject><subject>Research & development</subject><subject>Risk assessment</subject><subject>Security</subject><subject>Software</subject><subject>Software engineering</subject><subject>Software industry</subject><subject>software security</subject><subject>Technology transfer</subject><subject>Venture capital</subject><issn>0740-7459</issn><issn>1937-4194</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNqFkE1LAzEQhoMoWKsnj14WQRBkNZ-bxIuU4hdYPLSel5hMdHXbrckusv_eLC0evMgchmGeeWfmReiY4EtCsL6azS8pJmQodtCIaCZzTjTfRSMsOc4lF3ofHcT4gTEWhOERulmAfV81dfPWZ4tgVtFDuM4m2bzx7bcJkM3BdqFq-2xmwie069pYyKYmpk7buf4Q7XlTRzja5jF6ubtdTB_yp-f7x-nkKbdMFm3uOQhBvMQpGPACqBVceVMopYQTShjsnPPCUiedIUpzrA0G5yjY4lViNkbnG911aL46iG25rKKFujYraLpYkkISxpmW4n8UJ6sIpWlgjE7_oB9NF1bpkVIpRotCsmH1xQayoYkxgC_XoVqa0CelcrC9nM3LwfahSPTZVtJEa2qfPLVV_B2hnNOC6eHKkw1XAcBvW2jFZVr9A1gkiDU</recordid><startdate>20110901</startdate><enddate>20110901</enddate><creator>McGraw, G.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M1Q</scope><scope>M2O</scope><scope>M2P</scope><scope>M2T</scope><scope>M7S</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110901</creationdate><title>Technology Transfer: A Software Security Marketplace Case Study</title><author>McGraw, G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Alliances</topic><topic>Applied sciences</topic><topic>Best practice</topic><topic>Best practices</topic><topic>Case studies</topic><topic>code review</topic><topic>Computer programs</topic><topic>Computer science; control theory; systems</topic><topic>Computer security</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Engineering</topic><topic>Exact sciences and technology</topic><topic>Government grants</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Network security</topic><topic>R&D</topic><topic>Research & development</topic><topic>Risk assessment</topic><topic>Security</topic><topic>Software</topic><topic>Software engineering</topic><topic>Software industry</topic><topic>software security</topic><topic>Technology transfer</topic><topic>Venture capital</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>McGraw, G.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Military Database (Proquest)</collection><collection>Research Library</collection><collection>ProQuest Science Journals</collection><collection>Telecommunications Database</collection><collection>Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>McGraw, G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Technology Transfer: A Software Security Marketplace Case Study</atitle><jtitle>IEEE software</jtitle><stitle>S-M</stitle><date>2011-09-01</date><risdate>2011</risdate><volume>28</volume><issue>5</issue><spage>9</spage><epage>11</epage><pages>9-11</pages><issn>0740-7459</issn><eissn>1937-4194</eissn><coden>IESOEG</coden><abstract>This paper presents the software security (application security) solutions. It is an idea of engineering software so that it continues to function correctly under malicious attack. Although as a discipline software security is relatively young, much progress has been made on ways to integrate security best practices into the software development life cycle. Microsoft, for example, has helped spearhead soft ware security through its Trustworthy Computing Initiative and the resulting Security Development Lifecycle (SDL). Cigital has also been instrumental in bringing software security to the wider market through its professional services.</abstract><cop>Los Alamitos, CA</cop><pub>IEEE</pub><doi>10.1109/MS.2011.110</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0740-7459 |
ispartof | IEEE software, 2011-09, Vol.28 (5), p.9-11 |
issn | 0740-7459 1937-4194 |
language | eng |
recordid | cdi_pascalfrancis_primary_24426395 |
source | ABI/INFORM Global; IEEE Xplore (Online service) |
subjects | Alliances Applied sciences Best practice Best practices Case studies code review Computer programs Computer science control theory systems Computer security Cybersecurity Data encryption Engineering Exact sciences and technology Government grants Memory and file management (including protection and security) Memory organisation. Data processing Network security R&D Research & development Risk assessment Security Software Software engineering Software industry software security Technology transfer Venture capital |
title | Technology Transfer: A Software Security Marketplace Case Study |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T21%3A04%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Technology%20Transfer:%20A%20Software%20Security%20Marketplace%20Case%20Study&rft.jtitle=IEEE%20software&rft.au=McGraw,%20G.&rft.date=2011-09-01&rft.volume=28&rft.issue=5&rft.spage=9&rft.epage=11&rft.pages=9-11&rft.issn=0740-7459&rft.eissn=1937-4194&rft.coden=IESOEG&rft_id=info:doi/10.1109/MS.2011.110&rft_dat=%3Cproquest_pasca%3E1671343975%3C/proquest_pasca%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c376t-f4e551f707073e46e2c548fa68885d585a0dddf5c2d7da189409a0edd2ec6b703%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=883266730&rft_id=info:pmid/&rft_ieee_id=5984788&rfr_iscdi=true |