Security architecture and framework Design and pilot implementation
|
|
|
- Michael Patterson
- 10 years ago
- Views:
Transcription
1 WP 5 Work Package Meeting Security architecture and framework Design and pilot implementation 3 rd AGM in Munich, 17 February 2015 TUM: Raffael Bild, Florian Kohlmayer, Helmut Spengler EBI: Olga Melnichuk, Marco Brandizi, Ugis Sarkans Session moderation: Wolfgang Kuchinke
2 Security architecture and framework Guideline for secure, privacy preserving, ethically and legally sound data bridges between RIs Builds upon results from WT 5, 6, D5.1, and D5.2: Usage scenarios developed for D5.1 Legal and ethical groundwork performed for D5.1 and D5.2 Two security and privacy related surveys carried out in WT5 A threat and risk analysis performed in WT6 Designed in WT7 Reported in D5.3 Is laying the foundation for D5.4
3 Threat and risk analysis - Methodology o Based on surveys, a threat and risk analysis was performed in WT6, using a variant of the STRIDE [1] methodology (security threats), LINDDUN [2] methodology (privacy threats), and NIST Guide for Conducting Risk Assessments [3] [1] M. Howard und S. Lipner, The security development lifecycle: SDL, a process for developing demonstrably more secure software, Microsoft Press, [2] M. Deng, K. Wuyts, R. Scandariato, B. Preneel und W. Joosen, A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements, Requirements Engineering, Bd. 16, Nr. 1, pp. 3-32, March [3] NIST Special Publication , Guide for Conducting Risk Assessments, September 2012.
4 Threat and risk analysis - Methodology o The threat and risk analysis comprised 7 process steps which were applied to the use case WPs: 1. Define usage scenarios 2. Gather a list of external dependencies, as-is state of security measures, and security assumptions 3. Create one or more Data Flow Diagrams (DFDs) of the application being modeled 4. Determine threat types 5. Identify the threats to the system 6. Determine risk 7. Plan mitigation usage scenarios from D5.1 based on the surveys by suggesting countermeasures based on literature review
5 Threat and risk analysis - Results Privacy Threat (LINDDUN) Example Risk WP6 WP7 WP8 WP9 WP10 Countermeasure Linkability Identifiability Possibility to detect that different data items are related to the same entity Possibility to relate a set of data to a specific entity / person; to recognize a person by characteristics of data Anonymization - Pseudonymization - Encryption - Access Control Content unawareness A patient is unaware of the information used/shared by the system Informed Consent Management Policy/ consent noncompliance Lack of evidence that data shared by the system meets applicable legal, policy or consent requirements Legal regulations - Informed Consent Mgmt. - Data Provider Forms - Ethics Committee approval - Data Access Comm. approval - Data Use Agreement - Material Transfer Agreement - (not relevant), + (low), ++ (medium), +++ (high)
6 Security architecture - Overview Based on requirements collected in WT 5 and on the threat and risk analysis performed in WT 6 Countermeasures against threats identified in the risk analysis For each countermeasure: Definition of measure Description of threats addressed Options for implementation and deployment Specification of three access tiers Open Restricted Restricted & committee-controlled Activity diagrams describe actions for each access tier
7 Security architecture - Elements o Specific countermeasures presented and discussed in detail include Authentication Authorization Secure data communication Encryption of data Anonymization Pseudonymization Auditing and provenance management Regulatory elements, such as Data Use Agreements (DUAs), Material Transfer Agreements (MTAs), Informed Consent (IC) management, Data Access Committee (DAC) approval, and Ethics Committee (EC) approval.
8 Security architecture - Workflow e.g. activity diagram for the restricted & committe-controlled access tier:
9 Pilot for the security framework Demonstrates feasibility and usefulness of the security architecture by implementing it for a concrete WP4 use case Constitutes a collaborative implementation of secure access to biobank data involving ELIXIR and BBMRI Based on results of WT 5, 6, 7, and D5.3 Integrates and extends already existing results of WP4 Integrates the policy administration repository from D5.2 Is being implemented in WT8 Lead: EMBL-EBI Will be reported in D5.4
10 Use case Pilot - Overview Researcher wants to obtain microdata / samples Researcher looks for biobanks focusing on disease group x, containing at least y samples of material type z The pilot will implement a complete research workflow To answer such queries in a secure, privacy preserving, legally and ethically sound manner Instantiating the security architecture with all access tiers
11 Pilot - Central elements BioSamples Database from ELIXIR A prototype instance of the BBMRI catalogue (bbmri.eu, bbmri-lpc) comprising a MIABIS [1] layer and a data cube layer in order to provide a realistic environment Single Sign On service Resource Entitlement Management System Legal Assessment Tool built for D5.2 [1]
12 Pilot - Workflow specification
13 Pilot - Detailed progress Work performed: Adaptation of the BBMRI software Implementation of SSO using Shibboleth Integration of REMS Remaining tasks: Integration of (mockup) biobanks Integration of the LAT
14 Pilot - SSO login
15 Pilot - SSO login
16 Pilot - Refinement of the request
17 Pilot - REMS application form
18 Pilot - Provision of the requested data
19 Lessons learned All three access tiers are helpful regarding concrete use cases A risk analysis provided valuable input for the security architecture The BBMRI node can be integrated into a secure workflow
20 Thank you! Any questions?
A home healthcare system in the cloud addressing security and privacy challenges
A home healthcare system in the cloud addressing security and privacy challenges Mina Deng, Milan Petković, Marco Nalin and Ilaria Baroni Philips Research Europe, The Netherlands Email: [email protected],
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP [email protected]. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP [email protected] May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
Wealth Management Formula
AP = WE + WT +WP + CG RM = CRM + ENRM WE = Wealth Enhancement (tax and cashflow planning) Historical Portfolio Performance Analysis Risk Evaluations Asset Allocation Investment Policy Statement Building
ADVANCED CLOUD PRIVACY THREAT MODELING
ADVANCED CLOUD PRIVACY THREAT MODELING ABSTRACT Ali Gholami and Erwin Laure HPCViz Department, KTH Royal Institute of Technology, Stockholm, Sweden {gholami,[email protected]} Privacy-preservation for
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
Report of the DTL focus meeting on Life Science Data Repositories
Report of the DTL focus meeting on Life Science Data Repositories Goal The goal of the meeting was to inform and discuss research data repositories for life sciences. The big data era adds to the complexity
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5. No. 8, November-December 2006 Requirements Engineering Tasks Donald Firesmith,
ECRIN (European Clinical Research Infrastructures Network)
ECRIN (European Clinical Research Infrastructures Network) Wolfgang Kuchinke University of Duesseldorf (HHU) and ECRIN EUDAT 1st User Forum 7 March 2012 8 March 2012, Barcelona 1 What is ECRIN? European
Leveraging New Business Models with Identity Management An e-learning case study
Leveraging New Business Models with Identity Management An e-learning case study José M. del Álamo DIT, Universidad Politécnica de Madrid, Ciudad Universitaria s/n, 28040 Madrid, Spain [email protected],
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I
IT Management Advisory A Privacy Officer s Guide to Providing Enterprise De-Identification Services Ki Consulting has helped several large healthcare organizations to establish de-identification services
CloudCERT (Testbed framework to exercise critical infrastructure protection)
WP2. CONCEPTUAL MODELLING AND ARCHITECTURE CloudCERT (Testbed framework to exercise critical infrastructure protection) With the financial support of the Prevention, Preparedness and Consequence Management
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
White Paper Strengthening Information Assurance in Healthcare
White Paper Strengthening Information Assurance in Healthcare Date: April, 2011 Provided by: Concurrent Technologies Corporation (CTC) 100 CTC Drive Johnstown, PA 15904-1935 wwwctccom Business Point of
Accountability by Design for Privacy
Accountability by Design for Privacy Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 17 Introduction ICT growth adds to concern about sensitive data use Individuals share more & more PII Stronger
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Trust and Dependability in Cloud Computing
Trust and Dependability in Cloud Computing Claus Pahl IC4 Principal Investigator November 7 th, 2013 Research Philosophy design for growth design for best service provision design for widest acceptance
Secure Software Design in Practice ARES SECSE Workshop
Secure Software Design in Practice ARES SECSE Workshop Per Håkon Meland and Jostein Jensen SINTEF Information and Communication Technology Department of Security, Safety and System Development {Per.H.Meland,
IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11
Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
HIT Workflow & Redesign Specialist: Curriculum Overview
HIT Workflow & Redesign Specialist: Curriculum Overview Component - Description Units - Description Appx. Time 1: Introduction to Health Care and Public Health in the U.S. Survey of how healthcare and
Good metrics aggregate both objective and quantitative
Editors: John Steven, [email protected] Gunnar Peterson, [email protected] Introduction to Identity Management Risk Metrics GUNNAR PETERSON Arctec Group Good metrics aggregate both objective and
Building Reference Security Architecture
Information Security, Privacy and Compliance Building Reference Security Architecture Bob Steadman, Sr. Director Predrag Zivic, Sr. Security Architect Information Security Too many organizations still
"Data Manufacturing: A Test Data Management Solution"
W14 Concurrent Session 5/4/2011 3:00 PM "Data Manufacturing: A Test Data Management Solution" Presented by: Fariba Alim-Marvasti Aetna Healthcare Brought to you by: 340 Corporate Way, Suite 300, Orange
Privacy Impact Assessment
MAY 24, 2012 Privacy Impact Assessment matters management system Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220 [email protected] DOCUMENT
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Defending against modern threats Kruger National Park ICCWS 2015
Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
Certified Information Security Manager (CISM)
Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security
INFORMATION TECHNOLOGY STANDARD
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE INFORMATION TECHNOLOGY STANDARD Name Of Standard: Data Warehouse Standards Domain: Enterprise Knowledge Management Number: Category: STD-EKMS001
Identity Management Overview. Bill Nelson [email protected] Vice President of Professional Services
Identity Management Overview Bill Nelson [email protected] Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
Request for Proposal for Application Development and Maintenance Services for XML Store platforms
Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...
Security and Your SAP System When Working with Winshuttle Products
Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
Data Management for Biobanks
Data Management for Biobanks JOHANN EDER CLAUS DABRINGER MICHAELA SCHICHO KONRAD STARK University of Klagenfurt and University of Vienna Data Management for Biobanks Local Integration Project Support Anonymization
Cloud Security: Is It Safe To Go In Yet?
Cloud Security: Is It Safe To Go In Yet? Execu1ve Breakfast Roundtable June 22, 2011 Boston Chapter WAY TO GO BRUINS! Welcome, Introduc4ons AGENDA Legal Perspec4ve, Bingham McCutchen Break Featured Speakers
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Fujitsu Enterprise Security Architecture
Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Consolidated Audit Trail. Copyright 2014 FINRA
Consolidated Audit Trail The FINRA Team s Strengths We Know the Business Decades of experience building, operating and using audit trails Decades of experience processing customer and account data Operator
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Contextual cloud-based service oriented architecture for clinical workflow
592 Digital Healthcare Empowering Europeans R. Cornet et al. (Eds.) 2015 European Federation for Medical Informatics (EFMI). This article is published online with Open Access by IOS Press and distributed
Basic Unified Process: A Process for Small and Agile Projects
Basic Unified Process: A Process for Small and Agile Projects Ricardo Balduino - Rational Unified Process Content Developer, IBM Introduction Small projects have different process needs than larger projects.
Using Enterprise Content Management Principles to Manage Research Assets. Kelly Mannix, Manager Deloitte Consulting Perth, WA.
Using Enterprise Content Management Principles to Manage Research Assets Kelly Mannix, Manager Deloitte Consulting Perth, WA November 2010 Agenda Introduction Defining ECM Understanding the Challenges
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
10231B: Designing a Microsoft SharePoint 2010 Infrastructure
10231B: Designing a Microsoft SharePoint 2010 Infrastructure Course Number: 10231B Course Length: 5 Days Course Overview This 5 day course teaches IT Professionals to design and deploy Microsoft SharePoint
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
how can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston
Protecting Official Records as Evidence in the Cloud Environment Anne Thurston Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after
JOB DESCRIPTION APPLICATION LEAD
JOB DESCRIPTION APPLICATION LEAD The Application Lead will provide functional support and to expand capabilities in the area of systems configuration. This function provides the initial step in the process
Announcements. Project status demo in class
Web Design cs465 Announcements Project status demo in class Why? You will likely be involved in Web design You have many of the skills necessary Understand similarities and differences between GUI design
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
Deliverable D1.1. Building data bridges between biological and medical infrastructures in Europe. Grant agreement no.: 284209
Deliverable D1.1 Project Title: Building data bridges between biological and medical infrastructures in Europe Project Acronym: BioMedBridges Grant agreement no.: 284209 Research Infrastructures, FP7 Capacities
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
SECURITY AND RISK MANAGEMENT
SECURITY AND RISK MANAGEMENT IN AGILE SOFTWARE DEVELOPMENT SATURN 2012 Conference (#SATURN2012) Srini Penchikala (@srinip) 05.10.12 #WHOAMI Security Architect @ Financial Services Organization Location:
IoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]
W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010
W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation
The ISDF Framework: Towards Secure Software Development
Journal of Information Processing Systems, Vol.6, No.1, March 2010 DOI : 10.3745/JIPS.2010.6.1.091 The ISDF Framework: Towards Secure Software Development Abdulaziz Alkussayer* and William H. Allen* Abstract
