메뉴 건너뛰기




Volumn 11, Issue 1, 2001, Pages 45-78

Managing Software Development for Survivable Systems

Author keywords

Software life cycle; Software management; System survivability

Indexed keywords


EID: 0035563807     PISSN: 10227091     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1012587001946     Document Type: Article
Times cited : (7)

References (24)
  • 1
    • 0041610463 scopus 로고    scopus 로고
    • RAND Studies of Cyberspace Security Issues and the Concept of a U.S. Minimum Essential Information Infrastructure
    • CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
    • Anderson, R.H., A.C. Hearn and R.O. Hundley (1997), "RAND Studies of Cyberspace Security Issues and the Concept of a U.S. Minimum Essential Information Infrastructure," In Proceedings of the 1997 Information Survivability Workshop, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
    • (1997) Proceedings of the 1997 Information Survivability Workshop
    • Anderson, R.H.1    Hearn, A.C.2    Hundley, R.O.3
  • 2
    • 0003427441 scopus 로고
    • IEEE Computer Society Press, Los Alamitos, CA
    • Boehm, B.W. (1989), Software Risk Management, IEEE Computer Society Press, Los Alamitos, CA.
    • (1989) Software Risk Management
    • Boehm, B.W.1
  • 4
    • 0003969635 scopus 로고
    • DoD 5200.28-STD, National Computer Security Center, Department of Defense Computer Security Center
    • Department of Defense (DoD) (1985), "Department of Defense Trusted Computer System Evaluation Criteria," DoD 5200.28-STD, National Computer Security Center, Department of Defense Computer Security Center.
    • (1985) Department of Defense Trusted Computer System Evaluation Criteria
  • 5
    • 0031503094 scopus 로고    scopus 로고
    • Dealing with Nonfunctional Requirements in Large Software Systems
    • Ebert, C. (1997), "Dealing with Nonfunctional Requirements in Large Software Systems," Annals of Software Engineering 3, 367-395.
    • (1997) Annals of Software Engineering , vol.3 , pp. 367-395
    • Ebert, C.1
  • 6
    • 0003449736 scopus 로고    scopus 로고
    • Survivable Network Systems: An Emerging Discipline
    • November 1997, revised May 1999, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
    • Ellison, R., D. Fisher, R.C. Linger, H.F. Lipson, T. Longstaff and N.R. Mead (1999), "Survivable Network Systems: An Emerging Discipline," Technical Report CMU/SEI-97-TR-013 (November 1997, revised May 1999), Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
    • (1999) Technical Report CMU/SEI-97-TR-013
    • Ellison, R.1    Fisher, D.2    Linger, R.C.3    Lipson, H.F.4    Longstaff, T.5    Mead, N.R.6
  • 7
    • 0032667966 scopus 로고    scopus 로고
    • Survivable Network System Analysis: A Case Study
    • Ellison, R., R.C. Linger, T. Longstaff and N. R. Mead (1999), "Survivable Network System Analysis: A Case Study," IEEE Software 16, 4, 70-77.
    • (1999) IEEE Software , vol.16 , Issue.4 , pp. 70-77
    • Ellison, R.1    Linger, R.C.2    Longstaff, T.3    Mead, N.R.4
  • 9
    • 0026260664 scopus 로고
    • Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
    • Kemmerer, R.A. and P.A. Porras (1991), "Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels," IEEE Transactions on Software Engineering 17, 11, 1166-1185.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.11 , pp. 1166-1185
    • Kemmerer, R.A.1    Porras, P.A.2
  • 10
    • 0032740068 scopus 로고    scopus 로고
    • Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software
    • IEEE Computer Society Press, Los Alamitos, CA
    • Linger, R.C. (1999), "Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software," In Proceedings of 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), IEEE Computer Society Press, Los Alamitos, CA; available at: http://www.cert. org/research/.
    • (1999) Proceedings of 32nd Annual Hawaii International Conference on System Sciences (HICSS-32)
    • Linger, R.C.1
  • 12
    • 0042111273 scopus 로고    scopus 로고
    • Cleanroom Software Engineering Theory and Practice
    • M.G. Hinchey and J.P. Bowen, Eds., Springer, London, UK
    • Linger, R.C. and C.J. Trammell (1999), "Cleanroom Software Engineering Theory and Practice," In Industrial Strength Formal Methods in Practice, M.G. Hinchey and J.P. Bowen, Eds., Springer, London, UK.
    • (1999) Industrial Strength Formal Methods in Practice
    • Linger, R.C.1    Trammell, C.J.2
  • 13
    • 0033489670 scopus 로고    scopus 로고
    • Survivability: A New Technical and Business Perspective on Security
    • Association for Computing Machinery, New York
    • Lipson, H.F. and D.A. Fisher (1999), "Survivability: A New Technical and Business Perspective on Security," In Proceedings of the 1999 New Security Paradigms Workshop, Association for Computing Machinery, New York.
    • (1999) Proceedings of the 1999 New Security Paradigms Workshop
    • Lipson, H.F.1    Fisher, D.A.2
  • 15
    • 84888912012 scopus 로고
    • Issues in Process Models and Integrated Environments for Trusted Systems Development
    • National Institute of Standards and Technology, Gaithersburg, MD
    • Marmor-Squires, A.B. and P.A. Rougeau (1988), "Issues in Process Models and Integrated Environments for Trusted Systems Development," In Proceedings of the 11th National Computer Security Conference, National Institute of Standards and Technology, Gaithersburg, MD.
    • (1988) Proceedings of the 11th National Computer Security Conference
    • Marmor-Squires, A.B.1    Rougeau, P.A.2
  • 24
    • 0023207669 scopus 로고
    • Coding for a Believable Specification to Implementation Mapping
    • IEEE Computer Society Press, Los Alamitos, CA
    • Young, W.D. and J. McHugh (1987), "Coding for a Believable Specification to Implementation Mapping," In Proceedings of 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.
    • (1987) Proceedings of 1987 IEEE Symposium on Security and Privacy
    • Young, W.D.1    McHugh, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.