Share Email Print

Proceedings Paper

The study on network security based on software engineering
Author(s): Shande Jia; Qian Ao
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.

Paper Details

Date Published: 8 June 2012
PDF: 7 pages
Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 833428 (8 June 2012); doi: 10.1117/12.954159
Show Author Affiliations
Shande Jia, ShangRao Normal Univ. (China)
Qian Ao, ShangRao Normal Univ. (China)

Published in SPIE Proceedings Vol. 8334:
Fourth International Conference on Digital Image Processing (ICDIP 2012)
Mohamed Othman; Sukumar Senthilkumar; Xie Yi, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?