-
5
-
-
67349252121
-
-
Information technology security techniques evaluation criteria for it security, standard ISO/IEC 15408 (2005).
-
Information technology security techniques evaluation criteria for it security, standard ISO/IEC 15408 (2005).
-
-
-
-
6
-
-
85008523798
-
Weaving together requirements and architectures
-
Nuseibeh B. Weaving together requirements and architectures. IEEE Computer 34 3 (2001) 115-117. URL://citeseer.ist.psu.edu/nuseibeh01weaving.html
-
(2001)
IEEE Computer
, vol.34
, Issue.3
, pp. 115-117
-
-
Nuseibeh, B.1
-
7
-
-
67349241496
-
-
Microsoft threat modeling tool 2.1.2, http://www.microsoft.com/downloads/details.aspx?familyid=59888078-9daf- 4e96-b7d1-944703479451, 2007.
-
(2007)
Microsoft threat modeling tool 2.1.2
-
-
-
11
-
-
67349110005
-
-
Systems security engineering capability maturity model (SSE-CMM), standard ISO/IEC 21827, 2006.
-
Systems security engineering capability maturity model (SSE-CMM), standard ISO/IEC 21827, 2006.
-
-
-
-
13
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J.H., and Schroeder M.D. The protection of information in computer systems. Proceedings of the IEEE 63 9 (1975) 1278-1308
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
15
-
-
35048897235
-
-
G. Stoneburner, C. Hayden, A. Feringa, Engineering principles for information technology security, NIST Special Publication 800-27, Revision A, 2004.
-
(2004)
Engineering principles for information technology security, NIST Special Publication 800-27, Revision A
-
-
Stoneburner, G.1
Hayden, C.2
Feringa, A.3
-
16
-
-
38549180044
-
-
Build security in, http://buildsecurityin.us-cert.gov/, 2007.
-
(2007)
Build security in
-
-
-
18
-
-
0036149234
-
Correctness by construction: developing a commercial secure system
-
Hall A., and Chapman R. Correctness by construction: developing a commercial secure system. IEEE Software 19 1 (2002) 18-25. URL://citeseer.ist.psu.edu/hall02correctness.html
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
19
-
-
49049107220
-
A state-of-art report (soar)
-
Software security assurance:, Tech. rep, Information Assurance Technology Analysis Center IATAC
-
K. Goertzel, T. Winograd, H. McKinley, L. Oh, M. Colon, T. McGibbon, E. Fedchak, R. Vienneau, Software security assurance: A state-of-art report (soar), Tech. rep., Information Assurance Technology Analysis Center (IATAC), 2007.
-
(2007)
-
-
Goertzel, K.1
Winograd, T.2
McKinley, H.3
Oh, L.4
Colon, M.5
McGibbon, T.6
Fedchak, E.7
Vienneau, R.8
-
20
-
-
0010729284
-
-
Microsoft Press, Redmond, WA, USA
-
Howard M., and Leblanc D.E. Writing Secure Code (2002), Microsoft Press, Redmond, WA, USA
-
(2002)
Writing Secure Code
-
-
Howard, M.1
Leblanc, D.E.2
-
22
-
-
67349179766
-
Similarities and differences between clasp, sdl, and touchpoints: The activity-matrix
-
Tech. rep, K.U. Leuven, Department of Computer Science October
-
K. Buyens, J. Gregoire, B.D. Win, R. Scandariato, W. Joosen, Similarities and differences between clasp, sdl, and touchpoints: the activity-matrix, Tech. rep., K.U. Leuven, Department of Computer Science (October 2007).
-
(2007)
-
-
Buyens, K.1
Gregoire, J.2
Win, B.D.3
Scandariato, R.4
Joosen, W.5
|