Advanced Search
MyIDEAS: Login

The Impact Of Programming Languages On The Software’S Security

Contents:

Author Info

  • Alexandru Gavril Bardas

    (James Madison University)

Registered author(s):

    Abstract

    Security is usually defined as the ability of a system to protect itself against accidental or deliberate intrusion1. Ensuring integrity, confidentiality, availability, and accountability requirements even in the presence of a determined, malicious opponent is essential for computer security. Sensitive data has to be manipulated and consulted by authorized users only (integrity, confidentiality). Furthermore, the system should resist “denial of service” attacks that attempt to render it unusable (availability). Also the system has to ensure the inability to deny the ownership of prior actions (accountability).

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.rebe.rau.ro/RePEc/rau/jisomg/SU09/JISOM-SU09-A5.pdf
    Download Restriction: no

    Bibliographic Info

    Article provided by Romanian-American University in its journal Journal of Information Systems and Operations Management.

    Volume (Year): 3 (2009)
    Issue (Month): 1 (July)
    Pages: 80-92

    as in new window
    Handle: RePEc:rau:jisomg:v:3:y:2009:i:1:p:80-92

    Contact details of provider:
    Postal: Bd.Expozitiei 1B, Bucuresti, Sector 1, Etaj 5, 012101
    Phone: +4-0372-120.140
    Fax: +4-021-202.91.51
    Email:
    Web page: http://www.rau.ro/
    More information through EDIRC

    Related research

    Keywords: security;

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:rau:jisomg:v:3:y:2009:i:1:p:80-92. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alex Tabusca).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.