-
1
-
-
29244448120
-
Security engineering in an evolutionary acquisition environment
-
Charlottsville, VA
-
Abrams, M. D., Security Engineering in an Evolutionary Acquisition Environment, in Proceedings of New Security Paradigms Workshop, Charlottsville, VA, 1998, pp. 11-20.
-
(1998)
Proceedings of New Security Paradigms Workshop
, pp. 11-20
-
-
Abrams, M.D.1
-
5
-
-
29244456856
-
EXtreme security engineering: On employing xp practices to achieve "good enough security" without defining it
-
Fairfax, VA, USA, Oct. 31
-
Beznosov, K., eXtreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security" without Defining It, in Proc. of First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, USA, Oct. 31, 2003.
-
(2003)
Proc. of First ACM Workshop on Business Driven Security Engineering (BizSec)
-
-
Beznosov, K.1
-
6
-
-
29244436687
-
Towards agile security assurance
-
White Point Beach, NS, , ACM
-
Beznosov, K. and Kruchten, P., Towards Agile Security Assurance, Proc. of the New Security Paradigm Workshop, White Point Beach, NS, 2004, ACM, pp. 47-54.
-
(2004)
Proc. of the New Security Paradigm Workshop
, pp. 47-54
-
-
Beznosov, K.1
Kruchten, P.2
-
8
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
Breu R., Burger K., Hafner M., Jürens J., Popp G., Wimmel G. and Lotz V., Key Issues of a Formally Based Process Model for Security Engineering, 16th International Conference on Software & System Engineering & Their Applications (ICSSEA), 2003.
-
(2003)
16th International Conference on Software & System Engineering & Their Applications (ICSSEA)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
9
-
-
84953420396
-
-
CC, ISO 15408 Common Criteria for Information Technology Sec. Evaluation Version 2.1, August 1999
-
CC, ISO 15408 Common Criteria for Information Technology Sec. Evaluation Version 2.1, August 1999.
-
-
-
-
10
-
-
84953420397
-
Agile security using an incremental security architecture
-
Sheffield, UK
-
Chivers, H. Paige, R., Ge, X., Agile Security Using an Incremental Security Architecture. Proceedings of Extreme Programming and Agile Processes in Software Engineering 6th International Conference, XP 2005, Sheffield, UK, 2005.
-
(2005)
Proceedings of Extreme Programming and Agile Processes in Software Engineering 6th International Conference, XP 2005
-
-
Chivers, H.1
Paige, R.2
Ge, X.3
-
11
-
-
84953420398
-
-
accessed in Jan
-
CORAS, http://www2.nr.no/coras/, accessed in Jan. 2006
-
(2006)
-
-
-
13
-
-
0006705483
-
-
Accessed in January
-
Fowler M. and Foemmel M., Continuous Integration. URL:http://www.martinfowler.com/articles/continuousInte gration.html. Accessed in January 2006.
-
(2006)
Continuous Integration
-
-
Fowler, M.1
Foemmel, M.2
-
15
-
-
2342576368
-
Does the Common Criteria paradigm have a future?
-
Hearn, J., Does the Common Criteria paradigm have a future?, IEEE Security and Privacy, Vol. 2, Issue 1, 2004
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
-
-
Hearn, J.1
-
18
-
-
84953420400
-
-
ISO/IEC, 4th WD 13335-2-Information Technology-Security Techniques-Management of information and communications technology security-Part 2: Techniques for information and communications technology security risk management
-
ISO/IEC, 4th WD 13335-2-Information Technology-Security Techniques-Management of information and communications technology security-Part 2: Techniques for information and communications technology security risk management.
-
-
-
-
22
-
-
84953420401
-
-
Presented at the Symposium on Requirements Engineering for Information Security
-
Peeters J. Agile Security Requirements Engineering. Presented at the Symposium on Requirements Engineering for Information Security, 2005.
-
(2005)
Agile Security Requirements Engineering
-
-
Peeters, J.1
-
23
-
-
0346043242
-
Using xp for safety-critical software
-
Poppendieck M. and Morsicato R, Using XP for Safety-Critical Software, Cutter IT Journal, 15 (9), 2002, 12-16.
-
(2002)
Cutter IT Journal
, vol.15
, Issue.9
, pp. 12-16
-
-
Poppendieck, M.1
Morsicato, R.2
-
24
-
-
27544492875
-
Integrating security into agile development methods
-
Siponen M., Baskerville, R., Kuivalainen, T., Integrating Security into Agile Development Methods, Proc. of the 38th Hawaii International Conference on System Science, 2005
-
(2005)
Proc. of the 38th Hawaii International Conference on System Science
-
-
Siponen, M.1
Baskerville, R.2
Kuivalainen, T.3
-
25
-
-
84953420402
-
-
SSE-CMM, Systems Security Engineering Capability Maturity Model, Model Description Document Version 3.0.. Accessed in January 2004
-
SSE-CMM, Systems Security Engineering Capability Maturity Model, Model Description Document Version 3.0. URL: www.sse-cmm.org/model/ssecmmv2final.pdf. Accessed in January 2004.
-
-
-
-
26
-
-
84953420403
-
-
Standish Group, The Chaos Report: Extreme Chaos, West Yarmouth, MA: The Standish Group, 2001
-
Standish Group, The Chaos Report: Extreme Chaos, West Yarmouth, MA: The Standish Group, 2001.
-
-
-
-
27
-
-
84953420404
-
-
ST-Lite V 1.1, July 2002 accessed 2006-02-01
-
ST-Lite V 1.1, July 2002 http://www.commoncriteriaportal.org/public/expert/in dex.php?menu=6 accessed 2006-02-01
-
-
-
-
28
-
-
84953420405
-
-
Fast Track, Fast Track Assessment Methodology, Information Assurance and Certification Services (IACS), CESG. Accessed August 25
-
Fast Track, Fast Track Assessment Methodology, Information Assurance and Certification Services (IACS), CESG. http://www.cesg.gov.uk/site/iacs/index.cfm?menuSelected =3&displayPage=31 Accessed August 25 2005
-
(2005)
-
-
-
29
-
-
0038348212
-
-
presented at Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering, Charleston, South Carolina, USA
-
Vetterling M. and Wimmel G., Secure Systems Development Based on the PalME project, presented at Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering, Charleston, South Carolina, USA, 2002.
-
(2002)
Secure Systems Development Based on the PalME Project
-
-
Vetterling, M.1
Wimmel, G.2
-
30
-
-
4344569744
-
Risk analysis in software design
-
Verdon D, McGraw, G., Risk Analysis in Software Design. IEEE Security and Privacy, 2(4), 2004, pp.79-84.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 79-84
-
-
Verdon, D.1
McGraw, G.2
-
31
-
-
35048816560
-
-
XP/Agile Universe 2004, C. Zannier, H. Erdogmus, and L. Lindstrom, Eds. LNSC3134, Berlin: Springer-Verlag
-
Wäyrynen J., Bodén M. and Boström G., Security Engineering and eXtreme Programming: an Impossible marriage?, XP/Agile Universe 2004, C. Zannier, H. Erdogmus, and L. Lindstrom, Eds. LNSC3134, Berlin: Springer-Verlag, 2004, pp. 117-128.
-
(2004)
Security Engineering and EXtreme Programming: An Impossible Marriage?
, pp. 117-128
-
-
Wäyrynen, J.1
Bodén, M.2
Boström, G.3
-
32
-
-
84953420407
-
-
XP, Extreme Programming: A Gentle Introduction., Accessed in September
-
XP, Extreme Programming: A Gentle Introduction. URL: http://www.extremeprogramming.org, Accessed in September 2005
-
(2005)
-
-
|