-
1
-
-
84936873422
-
Model-based risk assessment to improve enterprise security
-
Lausanne, Switzerland, Sept 17
-
Aagedal JO, den Braber F, Dimitrakos T, Gran BA, Raptis D, Stolen K. 2002. Model-based risk assessment to improve enterprise security. In Proceedings of the 6th International Enterprise Distributed Object Computing Conference, Lausanne, Switzerland, Sept 17, 51-62.
-
(2002)
Proceedings of the 6th International Enterprise Distributed Object Computing Conference
, pp. 51-62
-
-
Aagedal, J.O.1
den Braber, F.2
Dimitrakos, T.3
Gran, B.A.4
Raptis, D.5
Stolen, K.6
-
2
-
-
34247509714
-
-
SM Criteria, Version 2.0. CMU/SEI-2001-TR-016 ESC-TR-2001-016
-
SM Criteria, Version 2.0. CMU/SEI-2001-TR-016 ESC-TR-2001-016.
-
-
-
-
3
-
-
0024031604
-
The TAME project: Towards improvement-oriented software environments
-
Basili VR, Rombach HD. 1988. The TAME project: towards improvement-oriented software environments. IEEE Transactions on Software Engineering 14(6): 758-773.
-
(1988)
IEEE Transactions on Software Engineering
, vol.14
, Issue.6
, pp. 758-773
-
-
Basili, V.R.1
Rombach, H.D.2
-
4
-
-
34247515552
-
-
BS 7799.1999. Information Security Management.
-
BS 7799.1999. Information Security Management.
-
-
-
-
5
-
-
34247510151
-
-
Carr MJ, Konda SL, Monarch I, Ulrich FC, Walker CF. 1993. Taxonomy-based risk identification. Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
Carr MJ, Konda SL, Monarch I, Ulrich FC, Walker CF. 1993. Taxonomy-based risk identification. Technical Report CMU/SEI-93-TR-6 ESC-TR-93-183. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.
-
-
-
-
6
-
-
84941152376
-
Jena: Implementing the semantic web recommendations
-
New York, USA, May 17-22
-
Carroll JJ, Dickinson I, Dollin C, Reynolds D, Seaborne A, Wilkinson K. 2004. Jena: implementing the semantic web recommendations. In Proceedings of the 13th International World Wide Web Conference, New York, USA, May 17-22, 74-83.
-
(2004)
Proceedings of the 13th International World Wide Web Conference
, pp. 74-83
-
-
Carroll, J.J.1
Dickinson, I.2
Dollin, C.3
Reynolds, D.4
Seaborne, A.5
Wilkinson, K.6
-
7
-
-
0031628515
-
OKBC: A programmatic foundation for knowledge base interoperability
-
Menlo Park, CA
-
Chaudhri VK, Farquhar A, Fikes R, Karp PD, Rice JP. 1998. OKBC: a programmatic foundation for knowledge base interoperability. In Proceedings of the 15th National Conference on Artificial Intelligence, AAAI, Menlo Park, CA, 600-607.
-
(1998)
Proceedings of the 15th National Conference on Artificial Intelligence, AAAI
, pp. 600-607
-
-
Chaudhri, V.K.1
Farquhar, A.2
Fikes, R.3
Karp, P.D.4
Rice, J.P.5
-
8
-
-
34247540391
-
-
Common Criteria. 1999. Common Criteria for Information Technology Security Evaluation. Parts 1, 2 & 3. Version 2.1. ISO/IEC 15408-1:1999E
-
Common Criteria. 1999. Common Criteria for Information Technology Security Evaluation. Parts 1, 2 & 3. Version 2.1. ISO/IEC 15408-1:1999(E).
-
-
-
-
10
-
-
34247488775
-
-
DoD 8510.1-M. 2000. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP) Application Manual.
-
DoD 8510.1-M. 2000. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP) Application Manual.
-
-
-
-
11
-
-
34247468428
-
-
DoDI 5200.40. 1997. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP).
-
DoDI 5200.40. 1997. Department of Defense Information Technology Security Certification and Accreditation (DITSCAP).
-
-
-
-
13
-
-
0031336279
-
Risk assessment for large heterogeneous systems
-
San Diego, CA
-
Freeman JW, Darr TC, Neely RB. 1997. Risk assessment for large heterogeneous systems. In Proceedings of the 13th Annual Computer Security Applications Conference, San Diego, CA, 44.
-
(1997)
Proceedings of the 13th Annual Computer Security Applications Conference
, pp. 44
-
-
Freeman, J.W.1
Darr, T.C.2
Neely, R.B.3
-
14
-
-
0003752445
-
Information Technology - Software Life Cycle Processes
-
ISO/IEC 12207
-
ISO/IEC 12207. 1995. Information Technology - Software Life Cycle Processes.
-
(1995)
-
-
-
15
-
-
11844271802
-
Guidelines for the management of IT security. Technical Report BS ISO/IEC TR 13335-1:1996, ISBN
-
ISO/IEC 13335, 0580303918
-
ISO/IEC 13335. 1996. Guidelines for the management of IT security. Technical Report BS ISO/IEC TR 13335-1:1996, ISBN: 0580303918.
-
(1996)
-
-
-
16
-
-
34247485845
-
-
ISO/IEC 15504. 1998. Software Process Assessment (SPICE). Technical Report, http://www.isospice.type-pad.com/isospice_s15504/.
-
ISO/IEC 15504. 1998. Software Process Assessment (SPICE). Technical Report, http://www.isospice.type-pad.com/isospice_s15504/.
-
-
-
-
17
-
-
1842668349
-
Life Cycle Management - System Life Cycle Processes
-
ISO/IEC 15288 CD2
-
ISO/IEC 15288 CD2.2000. Life Cycle Management - System Life Cycle Processes.
-
(2000)
-
-
-
18
-
-
34247537508
-
Information Technology - Security Techniques - A Framework for IT Security Assurance
-
ISO/IEC 15443
-
ISO/IEC 15443. 2001. Information Technology - Security Techniques - A Framework for IT Security Assurance.
-
(2001)
-
-
-
20
-
-
0031483502
-
The meaning of requirements
-
Baltzer Science Publishers
-
Jackson M. 1997. The meaning of requirements. Annals of Software Engineering, Vol. 3. Baltzer Science Publishers: 5-21.
-
(1997)
Annals of Software Engineering
, vol.3
, pp. 5-21
-
-
Jackson, M.1
-
21
-
-
0033328454
-
On integrating assessment and measurement: Towards continuous assessment of software engineering processes
-
IEEE Computer Society: Boca Raton, Florida, USA, Nov 4-6, 22
-
Järvinen J, Hamann D, Van Solingen R. 1999. On integrating assessment and measurement: towards continuous assessment of software engineering processes. In Proceedings of the 6th International Symposium on Software Metrics METRICS. IEEE Computer Society: Boca Raton, Florida, USA, Nov 4-6, 22.
-
(1999)
Proceedings of the 6th International Symposium on Software Metrics METRICS
-
-
Järvinen, J.1
Hamann, D.2
Van Solingen, R.3
-
24
-
-
33846560895
-
Life cycle security and DITSCAP
-
Kimbell J, WalrathM. 2001. Life cycle security and DITSCAP. IANewsletter. 4(2): 16-26. http://iac.dtic.mil/iatac.
-
(2001)
IANewsletter
, vol.4
, Issue.2
, pp. 16-26
-
-
Kimbell, J.1
WalrathM2
-
30
-
-
33846616118
-
Engineering dependability requirements for software-intensive systems through the definition of a common language
-
Software Engineering Institute SEI, Carnegie Mellon University & IEEE Press: Paris, France
-
th IEEE International RE Conference, Workshop on Requirements Engineering for High-Availability Systems (RHAS). Software Engineering Institute (SEI), Carnegie Mellon University & IEEE Press: Paris, France, 40-48.
-
(2005)
th IEEE International RE Conference, Workshop on Requirements Engineering for High-Availability Systems (RHAS)
, pp. 40-48
-
-
Lee, S.W.1
Gandhi, R.A.2
-
31
-
-
34247543888
-
-
th IEEE International Conference on Software Engineering (ICSE '05), Workshop on Software Engineering for Secure Systems (SESS)., 30(4). Also appeared in ACM SIGSOFT Software Engineering Notes, ACM Press: St. Louis, MO, 43-49.
-
th IEEE International Conference on Software Engineering (ICSE '05), Workshop on Software Engineering for Secure Systems (SESS)., Vol. 30(4). Also appeared in ACM SIGSOFT Software Engineering Notes, ACM Press: St. Louis, MO, 43-49.
-
-
-
-
32
-
-
33846591672
-
Security requirements driven risk assessment for critical infrastructure information systems
-
IEEE Computer Society: Paris, France, August
-
Lee SW, Gandhi RA, Ahn G. 2005b. Security requirements driven risk assessment for critical infrastructure information systems. In Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 05), Requirements Engineering (RE'05). IEEE Computer Society: Paris, France, August.
-
(2005)
Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 05), Requirements Engineering (RE'05)
-
-
Lee, S.W.1
Gandhi, R.A.2
Ahn, G.3
-
33
-
-
34247502770
-
GenOM User's Guide V2.0
-
Technical Report TR-NiSE-05-05, Knowledge Intensive Software Engineering Research Group, Department of Software and Information Systems, UNC, Charlotte
-
Lee SW, Yavagal D. 2005. GenOM User's Guide V2.0. Technical Report TR-NiSE-05-05, Knowledge Intensive Software Engineering Research Group, Department of Software and Information Systems, UNC, Charlotte.
-
(2005)
-
-
Lee, S.W.1
Yavagal, D.2
-
34
-
-
24344470236
-
Handling and reporting security advisories: A scorecard approach
-
Lekkas D, Spinellis D. 2005. Handling and reporting security advisories: a scorecard approach. IEEE Security and Privacy 3(4): 32-41.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.4
, pp. 32-41
-
-
Lekkas, D.1
Spinellis, D.2
-
35
-
-
1842550305
-
-
McGuinness D, van Harmelen F eds, Recommendation
-
McGuinness D, van Harmelen F (eds). 2004. OWL Web Ontology Language Overview. W3C Recommendation: http://www.w3.org/TR/owl-features/.
-
(2004)
OWL Web Ontology Language Overview
-
-
-
36
-
-
4444369345
-
Domain understanding is key to successful to system development
-
Springer-Verlag: London, UK
-
Offen R. 2002. Domain understanding is key to successful to system development. Requirements Engineering Journal, Vol. 7(3). Springer-Verlag: London, UK, 172-175.
-
(2002)
Requirements Engineering Journal
, vol.7
, Issue.3
, pp. 172-175
-
-
Offen, R.1
-
37
-
-
33645709202
-
-
NIST Special Publication #800-37, Gaithersburg, MD, USA
-
Ross R, Swanson M, Stoneburner G, Katzke S, Johnson A. 2004. Guide for the Security Certification and Accreditation of Federal Information Systems. NIST Special Publication #800-37, Gaithersburg, MD, USA.
-
(2004)
Guide for the Security Certification and Accreditation of Federal Information Systems
-
-
Ross, R.1
Swanson, M.2
Stoneburner, G.3
Katzke, S.4
Johnson, A.5
-
38
-
-
34247525528
-
-
SSE-CMM. 2003. System Security Engineering Capability Maturity Model (SSE CMM) Model Description Document, Version 3.0
-
SSE-CMM. 2003. System Security Engineering Capability Maturity Model (SSE CMM) Model Description Document, Version 3.0. http://www.sse-cmm.org.
-
-
-
-
39
-
-
0003618149
-
Scenario-based requirements analysis
-
Springer-Verlag: New York, USA
-
Sutcliffe A. 1998. Scenario-based requirements analysis. Requirements Engineering Journal, Vol. 3(1). Springer-Verlag: New York, USA, 48-65.
-
(1998)
Requirements Engineering Journal
, vol.3
, Issue.1
, pp. 48-65
-
-
Sutcliffe, A.1
-
41
-
-
12244283592
-
-
NIST Special Publication #800-55, Gaithersburg, MD, USA
-
Swanson M, Bartol N, Sabato J, Hash J, Graffo L. 2003. Security Metrics Guide for Information Technology Systems. NIST Special Publication #800-55, Gaithersburg, MD, USA.
-
(2003)
Security Metrics Guide for Information Technology Systems
-
-
Swanson, M.1
Bartol, N.2
Sabato, J.3
Hash, J.4
Graffo, L.5
-
42
-
-
84969544889
-
Information assurance measures and Metrics-state of practice and proposed taxonomy
-
Hawaii, USA
-
Vaughn RB, Henning R, Siraj A. 2003. Information assurance measures and Metrics-state of practice and proposed taxonomy. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Hawaii, USA, 331-340.
-
(2003)
Proceedings of the 36th Annual Hawaii International Conference on System Sciences
, pp. 331-340
-
-
Vaughn, R.B.1
Henning, R.2
Siraj, A.3
-
43
-
-
34247489732
-
Web C&A™ Reference Manual
-
Version 4.0
-
Xacta. 2004. Web C&A™ Reference Manual, Version 4.0. Service Pack 2. http://www.xacta.com/.
-
(2004)
Service Pack
, vol.2
-
-
Xacta1
|