面向安全等级的安全需求工程方法与环境

61272106
2012
F0203.软件理论、软件工程与服务
李晓红
面上项目
教授
天津大学
80万元
等级化安全需求;15408;模型检测;安全知识库;安全需求工程;ISO/IEC
2013-01-01到2016-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 J2EE应用软件的架构安全评估方法 期刊论文 杜长霄|李晓红|石红|冯志勇|
2 API-level Multi-policy Access Control Enforcement for Android Middleware 会议论文 Xiaohong Li|Jing Hu|Guangquan Xu|Zhiyong Feng|
3 Universal Analysis and Detection Framework for Location Aided Routing 会议论文 Xin Zhang|Xiaohong Li|Zhiyong Feng|Guangquan Xu|
4 Improving android security with layered structure instrumentation and Technology 期刊论文 Zhang Qianqian|Li Xiaohong|Yu Xiaofei|Feng Zhiyong|
5 OOPN-SRAM: A Novel Method for Software Risk Assessment 会议论文 Ruitao Feng|Guangquan Xu|Jing Hu|Zhiyong Feng|
6 Eliciting security requirements method based on safety knowledge base 期刊论文 Yu Xiaofei|Li Xiaohong|Zhang Qianqian|
7 Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols 期刊论文 Li, Xiaohong|Hu, Jing|Feng, Zhiyong|Song, Jiaojiao|
8 Automatic Verification for Later-Correspondence of Security Protocols 会议论文 Liu, Yang|Li, Li|Feng, Ruitao|Feng, Zhiyong|
9 Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3 会议论文 Kunding Fang|Xiaohong Li|Jianye Hao|Zhiyong Feng|
10 A threat model-driven security testing approach for web application 期刊论文 Yan Bobo|Li Xiaohong|Du Zhijie|
11 Model checking with fairness assumptions using PAT 期刊论文 Dong, Jin Song|Pang, Jun|Zhang, Shao Jie|Yang, Xiaohu|
12 Unified threat model for analyzing and evaluating software threats 期刊论文 Xiaohong Li|Ke He|Zhiyong Feng|Guangquan Xu|
13 An Extended UML Method for the Verification of Security Protocols 会议论文 Ruitao Feng|Guangquan Xu|Jing Hu|Zhiyong Feng|
14 Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol 期刊论文 Li, Xiaohong|Xu, Guangquan|Hu, Jing|Feng, Zhiyong|
15 Web Application Architecture Security Evaluation Method based on AADL 会议论文 Shaoguang Geng|Xiaohong Li|Zhiyong Feng;Dazhi Sun|
16 Socially-aware Multiagent Learning towards Socially Optimal Outcomes 会议论文 Xiaohong Li|Chengwei Zhang|Jianye Hao|
17 E-SSL:An SSL Security-Enhanced Metho d for Bypassing MITM Attacks in Mobile Internet 会议论文 Xiaohong Li|Guangquan Xu|Zhiyong Feng|Jianye Hao|
18 MPOID: Multi-Protocol Oriented Intrusion Detection Method for Wireless Sensor Networks 会议论文 Qi Guo|Xiaohong Li|Zhiyong Feng|Guangquan Xu|
19 Personalized Recommendation Based on Information Flow in Data Intensive Services 期刊论文 Guangquan Xu|Xiaohong Li|Zhiyong Feng|Dazhi Sun,|
20 Evolutionary Analysis of Access Control Models: A Formal Concept Analysis Method 会议论文 Zhuobing Han|Mathieu Mérineau|Xiaohong Li|Ettore Merlo|
21 Hybrid Detection using Permission Analysis for Android Malware 会议论文 Xiaohong Li|Lei Zhang|Guangquan Xu|Zhiyong Feng|
22 Mining Specification of Insecure Browser Extension Behavior 会议论文 Hongbin Pei|Xiaohong Li|Guangquan Xu|
23 HyCPK: Securing Identity Authentication in ubiquitous computing 会议论文 Gaoxu Zhang|Bin Liu|Xiaohong Li|Zhiyong Feng|
24 Proteus:Computing Disjunctive Loop Summary via Path Dependency Analysis 会议论文 Bihuan Chen|Yang Liu|Wei Le|Xiaohong Li|
25 MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection Method for Wireless Sensor Networks 期刊论文 Qi Guo|Xiaohong Li|Guangquan Xu|Zhiyong Feng|
26 A Hierarchical Security-Auditing Methodology for Cloud Computing 会议论文 Zhuobing Han|Xiaohong Li|Eleni Stroulia|
27 A Three-Dimensional Model for Software Security Evaluation 会议论文 Ruitao Feng|Jing Hu|Guangquan Xu|Zhiyong Feng|
28 Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor 会议论文 Xiaohong Li|Jing Hu|Guangquan Xu|Zhiyong Feng|
29 Detection method of the second-order SQL injection in web applications 会议论文 Xiaohong Li|Ruitao Feng|Zhiyong Feng|Jing Hu|
30 Architecture Security Evaluation Method based on Security of the Components 会议论文 Shi Hong|Hu Jing|Feng Ruitao|Feng Zhiyong|
31 S-Looper: Automatic Summarization for Multipath String Loops 会议论文 Yang Liu|Wei Le|Xiaohong Li|Hongxu Chen|
32 Approach to Security Attack Pattern Networks on the Basis of Bayesian Networks 期刊论文 Xu, Guangquan|Li, Xiaohong|Feng, Zhiyong|Meng, Zhaopeng|
33 Attack Tree Based Android Malware Detection with Hybrid Analysis 会议论文 Shuai Zhao|Xiaohong Li|
34 A MIH and SDN based Framework for Optimizing Vertical Handover Performance 会议论文 Feng Liu|Xiaohong Li|Guangquan Xu|
35 Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service 期刊论文 Hao, Jianye|Li, Xiaoru|Feng, Zhiyong|Gao, Honghao|
查看更多信息请先登录或注册