-
2
-
-
0035339048
-
COTS-based systems top 10 list
-
V. R. Basili and B. Boehm. COTS-based systems top 10 list. IEEE Software, 34(5):91–93, May 2001.
-
(2001)
IEEE Software
, vol.34
, Issue.5
, pp. 91-93
-
-
Basili, V.R.1
Boehm, B.2
-
5
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
Hilton Head, SC, January, IEEE Computer Society
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Expo (DISCEX), Hilton Head, SC, January 2000. IEEE Computer Society.
-
(2000)
DARPA Information Survivability Conference and Expo (DISCEX)
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
6
-
-
84944130546
-
Survivable systems: An emerging discipline
-
Ottawa, Ontario, May 1999. Communications Security Establishment, Government of Canada. See, additionalp apers on this topic
-
R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. A. Longstaff, and N. R. Mead. Survivable systems: An emerging discipline. In Proceedings of the 11th Canadian Information Technology Security Symposium (CITSS’99), Ottawa, Ontario, May 1999. Communications Security Establishment, Government of Canada. See: http://www.cert.org/research/ for additionalp apers on this topic.
-
Proceedings of the 11Th Canadian Information Technology Security Symposium (CITSS’99)
-
-
Ellison, R.J.1
Fisher, D.A.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.A.5
Mead, N.R.6
-
7
-
-
84944130547
-
A client-server architecture supporting MLS interoperability with COTS components
-
Monterey, CA, November
-
J. Froscher and M. Kang. A client-server architecture supporting MLS interoperability with COTS components. In Proc. MILCOM 97, Monterey, CA, November 1997.
-
(1997)
Proc. MILCOM 97
-
-
Froscher, J.1
Kang, M.2
-
8
-
-
84885926665
-
DoD Security Needs and COTS-Based Systems
-
Carnegie Mellon University, Pittsburgh, PA, September
-
S. A. Hissam, D. Carney, and D. Plakosh. DoD Security Needs and COTS-Based Systems. SEI Monographs on the Use of CommercialS oftware in Government Systems. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, September 1998. See: http://www.sei.cmu.edu/cbs/papers/monographs/dodsecurity-needs.htm.
-
(1998)
SEI Monographs on the Use of Commercials Oftware in Government Systems. Software Engineering Institute
-
-
Hissam, S.A.1
Carney, D.2
Plakosh, D.3
-
9
-
-
84985008410
-
The architecture tradeoff analysis method
-
Monterey, CA, August , IEEE Computer Society. See
-
R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. F. Lipson, and S. J. Carriere. The architecture tradeoff analysis method. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, Monterey, CA, August 1998. IEEE Computer Society. See: http://www.sei.cmu.edu/ata/ for additionalp apers on this topic.
-
(1998)
Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems
-
-
Kazman, R.1
Klein, M.2
Barbacci, M.3
Longstaff, T.4
Lipson, H.F.5
Carriere, S.J.6
-
10
-
-
0032097883
-
A map of security risks associated with using COTS
-
June
-
U. Lindqvist and E. Johnson. A map of security risks associated with using COTS. IEEE Computer, pages 60–66, June 1998.
-
(1998)
IEEE Computer
, pp. 60-66
-
-
Lindqvist, U.1
Johnson, E.2
-
12
-
-
0347143061
-
Towards survivable COTS-based systems
-
February
-
N. R. Mead, H. F. Lipson, and C. A. Sledge. Towards survivable COTS-based systems. Cutter IT Journal, 14(2):4–11, February 2001.
-
(2001)
Cutter IT Journal
, vol.14
, Issue.2
, pp. 4-11
-
-
Mead, N.R.1
Lipson, H.F.2
Sledge, C.A.3
|