Show simple item record

dc.creatorJetly, Prateeken_US
dc.date.accessioned2012-06-07T23:05:30Z
dc.date.available2012-06-07T23:05:30Z
dc.date.created2001en_US
dc.date.issued2001
dc.identifier.urihttp://hdl.handle.net/1969.1/ETD-TAMU-2001-THESIS-J47en_US
dc.descriptionDue to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the item.en_US
dc.descriptionIncludes bibliographical references (leaves 43-47).en_US
dc.descriptionIssued also on microfiche from Lange Micrographics.en_US
dc.description.abstractIn recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.en_US
dc.format.mediumelectronicen_US
dc.format.mimetypeapplication/pdfen_US
dc.language.isoen_USen_US
dc.publisherTexas A&M Universityen_US
dc.rightsThis thesis was part of a retrospective digitization project authorized by the Texas A&M University Libraries in 2008. Copyright remains vested with the author(s). It is the user's responsibility to secure permission from the copyright holder(s) for re-use of the work beyond the provision of Fair Use.en_US
dc.subjectcomputer science.en_US
dc.subjectMajor computer science.en_US
dc.titleEngineering secure softwareen_US
dc.typeThesisen_US
thesis.degree.disciplinecomputer scienceen_US
thesis.degree.nameM.S.en_US
thesis.degree.levelMastersen_US
dc.type.genrethesis
dc.type.materialtexten_US
dc.format.digitalOriginreformatted digitalen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

This item and its contents are restricted. If this is your thesis or dissertation, you can make it open-access. This will allow all visitors to view the contents of the thesis.

Request Open Access