-
1
-
-
0041610463
-
RAND Studies of Cyberspace Security Issues and the Concept of a U.S. Minimum Essential Information Infrastructure
-
CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
-
Anderson, R.H., A.C. Hearn and R.O. Hundley (1997), "RAND Studies of Cyberspace Security Issues and the Concept of a U.S. Minimum Essential Information Infrastructure," In Proceedings of the 1997 Information Survivability Workshop, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
(1997)
Proceedings of the 1997 Information Survivability Workshop
-
-
Anderson, R.H.1
Hearn, A.C.2
Hundley, R.O.3
-
2
-
-
0003427441
-
-
IEEE Computer Society Press, Los Alamitos, CA
-
Boehm, B.W. (1989), Software Risk Management, IEEE Computer Society Press, Los Alamitos, CA.
-
(1989)
Software Risk Management
-
-
Boehm, B.W.1
-
4
-
-
0003969635
-
-
DoD 5200.28-STD, National Computer Security Center, Department of Defense Computer Security Center
-
Department of Defense (DoD) (1985), "Department of Defense Trusted Computer System Evaluation Criteria," DoD 5200.28-STD, National Computer Security Center, Department of Defense Computer Security Center.
-
(1985)
Department of Defense Trusted Computer System Evaluation Criteria
-
-
-
5
-
-
0031503094
-
Dealing with Nonfunctional Requirements in Large Software Systems
-
Ebert, C. (1997), "Dealing with Nonfunctional Requirements in Large Software Systems," Annals of Software Engineering 3, 367-395.
-
(1997)
Annals of Software Engineering
, vol.3
, pp. 367-395
-
-
Ebert, C.1
-
6
-
-
0003449736
-
Survivable Network Systems: An Emerging Discipline
-
November 1997, revised May 1999, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
-
Ellison, R., D. Fisher, R.C. Linger, H.F. Lipson, T. Longstaff and N.R. Mead (1999), "Survivable Network Systems: An Emerging Discipline," Technical Report CMU/SEI-97-TR-013 (November 1997, revised May 1999), Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
(1999)
Technical Report CMU/SEI-97-TR-013
-
-
Ellison, R.1
Fisher, D.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.5
Mead, N.R.6
-
7
-
-
0032667966
-
Survivable Network System Analysis: A Case Study
-
Ellison, R., R.C. Linger, T. Longstaff and N. R. Mead (1999), "Survivable Network System Analysis: A Case Study," IEEE Software 16, 4, 70-77.
-
(1999)
IEEE Software
, vol.16
, Issue.4
, pp. 70-77
-
-
Ellison, R.1
Linger, R.C.2
Longstaff, T.3
Mead, N.R.4
-
8
-
-
84985008410
-
The Architecture Tradeoff Analysis Method
-
IEEE Computer Society Press, Los Alamitos, CA
-
Kazman, R., M. Klein, M. Barbacci, T. Longstaff, H.F. Lipson and S.J. Carriere (1998), "The Architecture Tradeoff Analysis Method," In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, IEEE Computer Society Press, Los Alamitos, CA; available at: http: //www.sei.emu.edu/ata/.
-
(1998)
Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems
-
-
Kazman, R.1
Klein, M.2
Barbacci, M.3
Longstaff, T.4
Lipson, H.F.5
Carriere, S.J.6
-
9
-
-
0026260664
-
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
-
Kemmerer, R.A. and P.A. Porras (1991), "Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels," IEEE Transactions on Software Engineering 17, 11, 1166-1185.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1166-1185
-
-
Kemmerer, R.A.1
Porras, P.A.2
-
10
-
-
0032740068
-
Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software
-
IEEE Computer Society Press, Los Alamitos, CA
-
Linger, R.C. (1999), "Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software," In Proceedings of 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), IEEE Computer Society Press, Los Alamitos, CA; available at: http://www.cert. org/research/.
-
(1999)
Proceedings of 32nd Annual Hawaii International Conference on System Sciences (HICSS-32)
-
-
Linger, R.C.1
-
11
-
-
0031673593
-
Requirements Definition for Survivable Network Systems
-
IEEE Computer Society Press, Los Alamitos, CA, 14-23
-
Linger, R.C., N.R. Mead and H.F. Lipson (1998), "Requirements Definition for Survivable Network Systems," In Proceedings of the International Conference on Requirements Engineering, IEEE Computer Society Press, Los Alamitos, CA, 14-23; available at: http://www.cert.org/research/.
-
(1998)
Proceedings of the International Conference on Requirements Engineering
-
-
Linger, R.C.1
Mead, N.R.2
Lipson, H.F.3
-
12
-
-
0042111273
-
Cleanroom Software Engineering Theory and Practice
-
M.G. Hinchey and J.P. Bowen, Eds., Springer, London, UK
-
Linger, R.C. and C.J. Trammell (1999), "Cleanroom Software Engineering Theory and Practice," In Industrial Strength Formal Methods in Practice, M.G. Hinchey and J.P. Bowen, Eds., Springer, London, UK.
-
(1999)
Industrial Strength Formal Methods in Practice
-
-
Linger, R.C.1
Trammell, C.J.2
-
13
-
-
0033489670
-
Survivability: A New Technical and Business Perspective on Security
-
Association for Computing Machinery, New York
-
Lipson, H.F. and D.A. Fisher (1999), "Survivability: A New Technical and Business Perspective on Security," In Proceedings of the 1999 New Security Paradigms Workshop, Association for Computing Machinery, New York.
-
(1999)
Proceedings of the 1999 New Security Paradigms Workshop
-
-
Lipson, H.F.1
Fisher, D.A.2
-
14
-
-
0024883946
-
A Risk Driven Process Model for the Development of Trusted Systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
Marmor-Squires, A., J. McHugh, M. Branstad, B. Danner, L. Nagy, P. Rougeau and D. Sterne (1989), "A Risk Driven Process Model for the Development of Trusted Systems," In Proceedings of the 1989 Computer Security Applications Conference, IEEE Computer Society Press, Los Alamitos, CA, pp. 184-192.
-
(1989)
Proceedings of the 1989 Computer Security Applications Conference
, pp. 184-192
-
-
Marmor-Squires, A.1
McHugh, J.2
Branstad, M.3
Danner, B.4
Nagy, L.5
Rougeau, P.6
Sterne, D.7
-
15
-
-
84888912012
-
Issues in Process Models and Integrated Environments for Trusted Systems Development
-
National Institute of Standards and Technology, Gaithersburg, MD
-
Marmor-Squires, A.B. and P.A. Rougeau (1988), "Issues in Process Models and Integrated Environments for Trusted Systems Development," In Proceedings of the 11th National Computer Security Conference, National Institute of Standards and Technology, Gaithersburg, MD.
-
(1988)
Proceedings of the 11th National Computer Security Conference
-
-
Marmor-Squires, A.B.1
Rougeau, P.A.2
-
16
-
-
84862870930
-
-
Ph.D. Dissertation, The University of Texas at Austin, Austin, TX
-
McHugh, J. (1983), "Towards the Generation of Efficient Code from Verified Programs," Ph.D. Dissertation, The University of Texas at Austin, Austin, TX.
-
(1983)
Towards the Generation of Efficient Code from Verified Programs
-
-
McHugh, J.1
-
17
-
-
0041610461
-
Assurance Mappings
-
Center for High Assurance Computing Systems, Naval Research Laboratory, Washington, DC
-
McHugh, J., C.N. Payne and C. Martin (1994), "Assurance Mappings," In Handbook for the Computer Security Certification of Trusted Systems, Center for High Assurance Computing Systems, Naval Research Laboratory, Washington, DC.
-
(1994)
Handbook for the Computer Security Certification of Trusted Systems
-
-
McHugh, J.1
Payne, C.N.2
Martin, C.3
-
20
-
-
0022667615
-
A Rational Design Process: How and Why to Fake It
-
Parnas, D.L. and P.C. Clements (1986), "A Rational Design Process: How and Why to Fake It," IEEE Transactions on Software Engineering 12, 2, 251-257.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.2
, pp. 251-257
-
-
Parnas, D.L.1
Clements, P.C.2
-
21
-
-
0006290403
-
-
Addison-Wesley, Reading, MA
-
Prowell, S.J., C.J. Trammell, R.C. Linger and J.H. Poore (1999), Cleanroom Software Engineering: Technology and Process, Addison-Wesley, Reading, MA.
-
(1999)
Cleanroom Software Engineering: Technology and Process
-
-
Prowell, S.J.1
Trammell, C.J.2
Linger, R.C.3
Poore, J.H.4
-
24
-
-
0023207669
-
Coding for a Believable Specification to Implementation Mapping
-
IEEE Computer Society Press, Los Alamitos, CA
-
Young, W.D. and J. McHugh (1987), "Coding for a Believable Specification to Implementation Mapping," In Proceedings of 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.
-
(1987)
Proceedings of 1987 IEEE Symposium on Security and Privacy
-
-
Young, W.D.1
McHugh, J.2
|