000 | 03255nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-319-07076-6 | ||
003 | DE-He213 | ||
005 | 20200421112551.0 | ||
007 | cr nn 008mamaa | ||
008 | 140709s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319070766 _9978-3-319-07076-6 |
||
024 | 7 |
_a10.1007/978-3-319-07076-6 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aRisk Assessment and Risk-Driven Testing _h[electronic resource] : _bFirst International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers / _cedited by Thomas Bauer, J�urgen Gro�mann, Fredrik Seehusen, Ketil St�len, Marc-Florian Wendland. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aIX, 137 p. 35 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8418 |
|
505 | 0 | _aRisk Analysis -- Dynamic risk model of money laundering -- Assessing privacy risks in Android: A user-centric approach -- Security Risk Analysis by Logic Programming Risk Modeling -- Utilizing Security Risk Analysis and Security Testing in the Legal Domain -- A Graph-based Approach for Analysis of Software Security -- Towards Attribute-based Access Control Policy Engineering Using Risk -- Risk-Based Testing -- A Systematic Method for Risk-driven Test Case Design Using Annotated Sequence Diagrams -- Towards Integration of Compositional Risk Analysis Using Monte Carlo Simulation and Security Testing -- A Trace Management Platform for Risk-Based Security Testing. | |
520 | _aThis book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013. The  revised full papers were carefully reviewed and selected from 13 submissions. The papers are organized in topical sections on Risk Analysis, Risk Modeling, and Risk-Based Testing. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aSystems and Data Security. |
700 | 1 |
_aBauer, Thomas. _eeditor. |
|
700 | 1 |
_aGro�mann, J�urgen. _eeditor. |
|
700 | 1 |
_aSeehusen, Fredrik. _eeditor. |
|
700 | 1 |
_aSt�len, Ketil. _eeditor. |
|
700 | 1 |
_aWendland, Marc-Florian. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319070759 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8418 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-07076-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58884 _d58884 |