Back to Results
First PageMeta Content
Software testing / Software quality / Hacking / Computer network security / Vulnerability / Software assurance / Veracode / Web application security / CWE / Computing / Computer security / Cyberwarfare


Software Security Being Explicit About Security Weaknesses Robert A. Martin MITRE Corporation
Add to Reading List

Document Date: 2007-03-02 12:21:16


Open Document

File Size: 416,62 KB

Share Result on Facebook

City

Washington D.C. / Vancouver / Applications San Diego / San Diego / Long Beach / Bedford / /

Company

Cigital Inc. / AppSIC LLC / IBM / Aspect Security Cenzic Inc. / Palamida Parasoft Corporation / proServices Coverity Inc. / MIT’s Lincoln Labs / Palamida Code Labs / Whitehat Security Inc. / Ounce Labs Inc. / Parasoft Corporation / Innovation Inc. / SofCheck Inc. / Software Assurance (SwA) Special Interest Group / transiPhysics Laboratory / Secure Inc. / Security Weaknesses Robert A. Martin MITRE Corporation / SPI Dynamics Inc. / National Security Agency Cenzic Inc. / Security University Semantic Designs Inc. / Oracle Corporation / Secure Software Inc. / Fortify Software Inc. / Concurrent Technologies Corporation / Microsoft Corporation / Physics Laboratory KDM Analytics Kestrel Technology Klocwork Inc. / Object Management Group / proServices Corporation / Unisys VERACODE Watchfire Corporation / MITRE Corporation / Security Innovation Inc. / CoreKick-Starting Security Technologies / /

Country

Canada / /

/

Event

Business Partnership / /

Facility

National Institute of Standards and Technology / Rensselaer Polytechnic Institute / Carnegie Mellon University / Inc. Microsoft Corporation Massachusets Institute of Technology Lincoln Labs Table / Institute of Electrical / Security Institute / Babson College / Semantic Jamestified Madison University / North Carolina State University / /

/

IndustryTerm

cross-site / software-based technologies / site / particular tool / software product assessment industry / Web Application / Web• site / software developers / technology approach / risk management / Software purchasers / software systems / given tool / test applications / /

Organization

Institute of Electrical and Electronics Engineers / OMG SwA / Security Institute / SwA SIG / U.S. Patent and Trademark Office / Semantic Jamestified Madison University / MIT / NCSD SwA / Security University / Johns Hopkins University / Carnegie Mellon / North State University Center / Purdue University / Babson College / Association for Computing Machinery / National Institute of Standards and Technology / Purdue University Computer Emergency Response Team/ Coordination Center / Computing Machinery / Armed Forces Communications and Electronics Association / MITRE Corporation NIST National Security Agency / DHS SwA / Rensselaer Polytechnic Institute / National Cyber Security Division / Institute of Technology / Enabling government / James Madison University / Carnegie Mellon University / Department of Homeland Security / Department of Defense / NIST SAMATE / DHS NCSD / Center for Education and Research / IEEE Computer Society / North Carolina State University / /

Person

Conor Harris / Steve Christey / David Harris / Sean Barnum / Janis Kenderdine / /

/

Position

Author / principal engineer / /

Product

Microsoft Corporation Portable Audio Device / CWEs / Semantics / CWEfor WebEducation / /

ProgrammingLanguage

FL / C / C++ / /

ProvinceOrState

British Columbia / California / Massachusetts / /

Technology

XML / Software Technology / GIF / software-based technologies / /

URL

www.sstc-online.org / www.isaca.org / www.ifpug.org/conferences / www.stsc.hill.af.mil / www.conferencehome.com/iccsa.htm / www.usasymposium.com / /

SocialTag