-
1
-
-
0002846126
-
-
West Yarmouth, MA: The Standish Group
-
Standish Group, The Chaos Report, West Yarmouth, MA: The Standish Group, 1995.
-
(1995)
The Chaos Report
-
-
-
3
-
-
29244456856
-
Extreme security engineering: On employing XP practices to achieve 'good enough security' without defining it
-
Fairfax, VA, USA
-
K. Beznosov, "Extreme Security Engineering: On Employing XP Practices to Achieve 'Good Enough Security' without Defining It," presented at First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, USA, 2003.
-
(2003)
First ACM Workshop on Business Driven Security Engineering (BizSec)
-
-
Beznosov, K.1
-
6
-
-
0034224238
-
Strengthening the case for pair-programming
-
L. Williams, R. R. Kessler, W. Cunningham, and R. Jeffries, "Strengthening the Case for Pair-Programming," IEEE Software, vol. 17, pp. 19-25, 2000.
-
(2000)
IEEE Software
, vol.17
, pp. 19-25
-
-
Williams, L.1
Kessler, R.R.2
Cunningham, W.3
Jeffries, R.4
-
7
-
-
33244478562
-
A pair programming experience
-
R. W. Jensen, "A Pair Programming Experience," in CrossTalk, 2003.
-
(2003)
CrossTalk
-
-
Jensen, R.W.1
-
11
-
-
0011759755
-
Property based testing: A new approach to testing for assurance
-
G. Fink and M. Bishop, "Property Based Testing: A New Approach to Testing for Assurance," in ACM SIGSOFT Software Engineering Notes, vol. 22, 1997.
-
(1997)
ACM SIGSOFT Software Engineering Notes
, vol.22
-
-
Fink, G.1
Bishop, M.2
-
12
-
-
0038348212
-
Secure systems development based on the common criteria: The PalME project
-
Charleston, South Carolina, USA
-
M. Vetterling, G. Wimmel, and A. Wisspeintner, "Secure Systems Development Based on the Common Criteria: The PalME Project," presented at the Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering, Charleston, South Carolina, USA, 2002.
-
(2002)
Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering
-
-
Vetterling, M.1
Wimmel, G.2
Wisspeintner, A.3
-
13
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, G. Wimmel, and V. Lotz, "Key Issues of a Formally Based Process Model for Security Engineering," presented at 16th International Conference on Software & Systems Engineering & their Applications (ICSSEA), 2003.
-
(2003)
16th International Conference on Software & Systems Engineering & Their Applications (ICSSEA)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
17
-
-
1942521935
-
Software development and proofs of multi-level security
-
P. G. Neumann, R. J. Feiertag, K. N. Levitt, and L. Robinson, "Software Development and Proofs of Multi-level Security," presented at International Conference on Software Engineering, 1976.
-
(1976)
International Conference on Software Engineering
-
-
Neumann, P.G.1
Feiertag, R.J.2
Levitt, K.N.3
Robinson, L.4
-
19
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
D. Evans and D. Larochelle, "Improving Security Using Extensible Lightweight Static Analysis," in IEEE Software, vol. 19, 2002, pp. 42-51.
-
(2002)
IEEE Software
, vol.19
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
21
-
-
0034270432
-
Statically scanning java code: Finding security vulnerabilities
-
J. Viega, G. McGraw, T. Mutdosch, and E. W. Feiten, "Statically Scanning Java Code: Finding Security Vulnerabilities," in IEEE Software, vol. 17, 2000, pp. 68-77.
-
(2000)
IEEE Software
, vol.17
, pp. 68-77
-
-
Viega, J.1
McGraw, G.2
Mutdosch, T.3
Feiten, E.W.4
-
22
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
New Orleans, Louisiana, USA
-
J. Viega, J. T. Bloch, Y. Kohno, and G. McGraw, "ITS4: A Static Vulnerability Scanner for C and C++ Code," presented at Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, 2000.
-
(2000)
Annual Computer Security Applications Conference
-
-
Viega, J.1
Bloch, J.T.2
Kohno, Y.3
McGraw, G.4
-
27
-
-
0032595618
-
Embracing change with extreme programming
-
K. Beck, "Embracing Change with Extreme Programming," IEEE Computer, vol. 32, pp. 70-77, 1999.
-
(1999)
IEEE Computer
, vol.32
, pp. 70-77
-
-
Beck, K.1
-
28
-
-
35048816560
-
Security engineering and eXtreme programming: An impossible marriage?
-
C. Zannier, H. Erdogmus, and L. Lindstrom, Eds. LNSC3134, Berlin: Springer-Verlag
-
J. Wäyrynen, M. Bodén, and G. Boström, "Security Engineering and eXtreme Programming: an Impossible marriage?," in Extreme programming and agile methods-XP/Agile Universe 2004, C. Zannier, H. Erdogmus, and L. Lindstrom, Eds. LNSC3134, Berlin: Springer-Verlag, 2004, pp. 117-128.
-
(2004)
Extreme Programming and Agile Methods-XP/Agile Universe 2004
, pp. 117-128
-
-
Wäyrynen, J.1
Bodén, M.2
Boström, G.3
-
29
-
-
0346043242
-
Using XP for safety-critical software
-
M. Poppendieck and R. Morsicato, "Using XP for Safety-Critical Software," Cutter IT Journal, vol. 15, no. 9, 2002, pp. 12-16.
-
(2002)
Cutter IT Journal
, vol.15
, Issue.9
, pp. 12-16
-
-
Poppendieck, M.1
Morsicato, R.2
-
30
-
-
29244448120
-
Security engineering in an evolutionary acquisition environment
-
Charlottsville, VA
-
M. D. Abrams, "Security Engineering in an Evolutionary Acquisition Environment," in Proceedings of New Security Paradigms Workshop, Charlottsville, VA, 1998, pp. 11-20.
-
(1998)
Proceedings of New Security Paradigms Workshop
, pp. 11-20
-
-
Abrams, M.D.1
-
31
-
-
70450274755
-
-
Software Process Subgroup of the Task Force on Security across the Software Development Lifecycle National Cyber Security Summit
-
S. T. Redwine and N. Davis, ed., Processes to Produce Secure Software Towards more Secure Software, Software Process Subgroup of the Task Force on Security across the Software Development Lifecycle National Cyber Security Summit, 2004.
-
(2004)
Processes to Produce Secure Software Towards More Secure Software
-
-
Redwine, S.T.1
Davis, N.2
-
32
-
-
18944376105
-
Static verification and extreme programming
-
San Diego, CA, USA, 2003, ACM Press
-
P. Amey and R. Chapman, "Static verification and extreme programming," in Proceedings of 2003 annual international conference on Ada, San Diego, CA, USA, 2003, ACM Press, pp. 4-9.
-
Proceedings of 2003 Annual International Conference on Ada
, pp. 4-9
-
-
Amey, P.1
Chapman, R.2
-
34
-
-
29244454074
-
-
USA House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities, Testimony July 24
-
E. H. Spafford, "Cyber Terrorism: The New Asymmetrie Threat," USA House Armed Services Committee, Subcommittee on Terrorism, Unconventional Threats and Capabilities, Testimony July 24 2003.
-
(2003)
Cyber Terrorism: the New Asymmetrie Threat
-
-
Spafford, E.H.1
|