Signcryption for Biometric Security
Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology…
Just a few short months ago on July 1st, 2012 the new Cyber Security and Information Systems Information Analysis Center…
This paper summarizes the progress various industries have made in software productivity during the first decade of the 21st century….
The role of software acquisition ecosystems in the development and evolution of secure open architecture systems has received insufficient consideration….
In this article, we discuss the development and transition of the Software Engineering Institute’s (SEI’s) Software Assurance Curriculum. The Master…
The Defense Technical Information Center (DTIC) provides a host of products and services to the DoD and to users in…
The answer to the question is NO – as noted in the DoD Director, Operational Test and Evaluation FY 2016…
The frequency and complexity of attacks upon the software assets of the United States Military is increasing at a rate…
Over the last 30 years, the DoD has struggled to adapt to the ever-changing world of software development. Of these…
Software is inherent in today’s complex systems and is often the primary cost, schedule, and technical performance driver in Department…
The use of manual methods to monitor system controls has essentially become impractical due to the growing number of applicable…
Analyzing risk is critical throughout the software acquisition lifecycle. System risk is assessed by conducting a penetration test, where ethical…