-
1
-
-
84892049375
-
A look at software security engineering: a guide for project managers
-
Allen, J. H. et al. (2010) A look at software security engineering: a guide for project managers, http://www.stsc.hill.af.mil/crosstalk/2010/03/1003 allenellisonmeadbarnummcgraw.html.
-
(2010)
-
-
Allen, J.H.1
-
2
-
-
57649151414
-
Software security engineering: A guide for project managers
-
Addison Wesley, SEI series, USA
-
Allen, J. et al. (2008) Software security engineering: A guide for project managers, Addison Wesley, SEI series, USA.
-
(2008)
-
-
Allen, J.1
-
3
-
-
84892099860
-
-
Ashford, W. (2009) http://www.computerweekly.com/Articles/2009/07/14/236875/on-demand-service-aims-to-cut-cost-of-fixing-softwaresecurity. htm.
-
(2009)
-
-
Ashford, W.1
-
4
-
-
84892011677
-
Vulnerability cause graphs, Design of a Process for Software Security
-
Second International Conference on Availability, Reliability and Security (ARES'07)
-
Byers, D. and Shahmehri, N. (2007) Vulnerability cause graphs, Design of a Process for Software Security, Second International Conference on Availability, Reliability and Security (ARES'07).
-
(2007)
-
-
Byers, D.1
Shahmehri, N.2
-
5
-
-
84892008144
-
-
BCS Security
-
BCS Security (2009) http://www.bcs.org/server.php?show=ConWebDoc. 25668andchangeNav=8265.
-
(2009)
-
-
-
6
-
-
84892121297
-
Software security touchpoints
-
Cigital Touchpoints
-
Cigital Touchpoints (2009) Software security touchpoints http://www. cigital.com/training/touchpoints/.
-
(2009)
-
-
-
7
-
-
37349131994
-
Comprehensive lightweight application security process
-
CLASP
-
CLASP (2006) Comprehensive lightweight application security process, http://www.owasp.org.
-
(2006)
-
-
-
8
-
-
0002543106
-
Software Engineering for Security: a Roadmap, The future of Software Engineering
-
Finkelstein, A (ed.), ACM press, as part of 22nd Intl. conference on Software Engineering, Limerick, Ireland
-
Devanbu, P. T. and Stubblebine, S. (2000) Software Engineering for Security: a Roadmap, The future of Software Engineering, Finkelstein, A (ed.), ACM press, as part of 22nd Intl. conference on Software Engineering, Limerick, Ireland.
-
(2000)
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
9
-
-
47849113405
-
S2D-ProM: A Strategy Oriented Process Model for Secure Software Development
-
International Conference on Software Engineering Advances (ICSEA, 2007)
-
Essafi, M., Labed, L. and Ghezala, H. B. (2007) S2D-ProM: A Strategy Oriented Process Model for Secure Software Development, International Conference on Software Engineering Advances (ICSEA, 2007).
-
(2007)
-
-
Essafi, M.1
Labed, L.2
Ghezala, H.B.3
-
11
-
-
84892029227
-
The Silent Battlefield: Government's Alarming Vulnerability to Cyber Attack
-
Foritfy report, white paper
-
Foritfy report (2009) The Silent Battlefield: Government's Alarming Vulnerability to Cyber Attack, white paper, www.fortify.com.
-
(2009)
-
-
-
12
-
-
84892018980
-
Taxonomy of security
-
Gonzalez-Castillo, Y. O. (2004) Taxonomy of security, (http://www. europeanbiometrics.info/images/resources/66_470_file.pdf.
-
(2004)
-
-
Gonzalez-Castillo, Y.O.1
-
13
-
-
33747259074
-
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software
-
Microsoft Press
-
Howard, M. and Lipner, S. (2006) The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software, Microsoft Press.
-
(2006)
-
-
Howard, M.1
Lipner, S.2
-
14
-
-
7744243916
-
Secure Systems Development with UML (UMLsec)
-
Springer- Verlog, Germany
-
Jurjen, J. (2005) Secure Systems Development with UML (UMLsec), Springer- Verlog, Germany.
-
(2005)
-
-
Jurjen, J.1
-
15
-
-
84892017952
-
Security principles: identity, authentication, authorization, Current ISandT
-
Nov/Dec
-
Logan, C. (2004) Security principles: identity, authentication, authorization, Current ISandT, Issue 2, Vol 20, Nov/Dec, http://web.mit.edu/ist/isnews/v20/n02/200206.html.
-
(2004)
, vol.20
, Issue.2
-
-
Logan, C.1
-
16
-
-
2342469291
-
Software Security: Building Security
-
March/April
-
McGraw, G. (2004) Software Security: Building Security In, IEEE Security and Privacy, March/April.
-
(2004)
IEEE Security and Privacy
-
-
McGraw, G.1
-
17
-
-
33144456824
-
Software security: building security
-
in, Addison Wesley, USA
-
McGraw, G. (2006) Software security: building security in, Addison Wesley, USA.
-
(2006)
-
-
McGraw, G.1
-
18
-
-
84932090691
-
Software components: guidelines and applications
-
Ramachandran, M. (2008) Software components: guidelines and applications, https://www.novapublishers.com/catalog/product_info.php?products_id=7 577.
-
(2008)
-
-
Ramachandran, M.1
-
19
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G. and A. L. Opdahl (2005) Eliciting security requirements with misuse cases, Requirements Eng (2005) 10: 34-44.
-
(2005)
Requirements Eng
, vol.10
, Issue.2005
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
21
-
-
79960616059
-
On the Secure Software Development Process: CLASP, SDL and Touchpoints Compared
-
Elsevier
-
Win, de B et al. (2008) On the Secure Software Development Process: CLASP, SDL and Touchpoints Compared, Elsevier.
-
(2008)
-
-
Win de, B.1
-
22
-
-
57649151414
-
Software security engineering: a guide for project managers
-
Addison Wesley, 2008
-
Allen, J. H., et al. (2008) Software security engineering: a guide for project managers, Addison Wesley, 2008.
-
(2008)
-
-
Allen, J.H.1
-
23
-
-
78349247421
-
Distributed system security: issues, processes and solutions
-
Wiley
-
Belapurkar, A., et al. (2009) Distributed system security: issues, processes and solutions, Wiley.
-
(2009)
-
-
Belapurkar, A.1
-
24
-
-
84892099337
-
Security engineering for software (SES), CS996-CISM
-
Chen, A. Jia (2004) Security engineering for software (SES), CS996-CISM, isis.poly.edu/courses/cs996-management/Lectures/SES.pdf.
-
(2004)
-
-
Chen, A.J.1
-
25
-
-
84891962794
-
OWASP CLASP Version 1.2
-
CLASP
-
CLASP (2006) OWASP CLASP Version 1.2, http://www.lulu.com/items/volume_62/1401000/1401307/3/print/OWASP_CLASP_v1.2_for_print_L ULU.pdf.
-
(2006)
-
-
-
26
-
-
84892075010
-
Building Security In
-
Graham, D. (2006) Building Security In, https://buildsecurityin.uscert. gov/bsi/articles/best-practices/requirements/548-BSI.html.
-
(2006)
-
-
Graham, D.1
-
27
-
-
2642566896
-
Trustworthy Refinement through Intrusion-Aware Design
-
CMU/SEI-2003-TR-002, ADA414865
-
Ellison, R.J. and Moore, A. P. (2003) Trustworthy Refinement through Intrusion-Aware Design (CMU/SEI-2003-TR-002, ADA414865).
-
(2003)
-
-
Ellison, R.J.1
Moore, A.P.2
-
28
-
-
84892026808
-
Software Engineering Institute
-
Carnegie Mellon University
-
Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2003. http://www.sei.cmu.edu/publications/documents/03. reports/03tr002.html.
-
(2003)
-
-
Pittsburgh, P.A.1
-
29
-
-
84892099792
-
Engineering Safety- and Security-Related Requirements ICCBSS Tutorial
-
SEI, Carnegie Mellon University, 27 February
-
Firesmith, D. (2007) Engineering Safety- and Security-Related Requirements ICCBSS Tutorial, SEI, Carnegie Mellon University, 27 February.
-
(2007)
-
-
Firesmith, D.1
-
30
-
-
2942757657
-
Engineering security requirements
-
Firesmith, D. (2003) Engineering security requirements, Journal of Object Technology, Volume 2, No. 1, 2003.
-
(2003)
Journal of Object Technology
, vol.2
, Issue.1
, pp. 2003
-
-
Firesmith, D.1
-
31
-
-
0004189634
-
Design Patterns
-
Addison Wesley
-
Gamma, E. (1995) Design Patterns, Addison Wesley.
-
(1995)
-
-
Gamma, E.1
-
32
-
-
61949376588
-
Security in the Software Lifecycle: Making Software Development Processes-and Software Produced by Them-More Secure
-
Draft version 1.2. U.S. Department of Homeland Security, August
-
Goertzel, K., et al. (2006) Security in the Software Lifecycle: Making Software Development Processes-and Software Produced by Them-More Secure, Draft version 1.2. U.S. Department of Homeland Security, August, http://www.cert.org/books/secureswe/SecuritySL.pdf.
-
(2006)
-
-
Goertzel, K.1
-
33
-
-
49049107220
-
Software Security Assurance: A State-of-the-Art Report (SOAR)
-
Herndon, VA: Information Assurance Technology Analysis Center (IATAC) and Defense Technical Information Center (DTIC), 2007
-
Goertzel, K., et al. (2007) Software Security Assurance: A State-of-the-Art Report (SOAR). Herndon, VA: Information Assurance Technology Analysis Center (IATAC) and Defense Technical Information Center (DTIC), 2007. http://iac.dtic.mil/iatac/download/security.pdf.
-
(2007)
-
-
Goertzel, K.1
-
34
-
-
0010729284
-
Writing Secure Code (2nd ed.)
-
Redmond, WA: Microsoft Press
-
Howard, M. and LeBlanc, D. C. (2002) Writing Secure Code (2nd ed.). Redmond, WA: Microsoft Press.
-
(2002)
-
-
Howard, M.1
LeBlanc, D.C.2
-
35
-
-
0003504769
-
Object-oriented software engineering: use-case-driven approach
-
Addison Wesley
-
Jacobson, I. (1992) Object-oriented software engineering: use-case-driven approach, Addison Wesley.
-
(1992)
-
-
Jacobson, I.1
-
36
-
-
0003499649
-
Requirements Engineering: Processes and Techniques
-
Wiley
-
Kotonya, G. and Sommerville, I. (1998) Requirements Engineering: Processes and Techniques, Wiley.
-
(1998)
-
-
Kotonya, G.1
Sommerville, I.2
-
37
-
-
67249135314
-
Requirements Engineering: From system goals to UML models to software specifications
-
Wiley, UK
-
Lamsweerde, van A. (2009) Requirements Engineering: From system goals to UML models to software specifications, Wiley, UK.
-
(2009)
-
-
Lamsweerde van, A.1
-
38
-
-
33144456824
-
Software security: building security
-
Addison Wesley, USA
-
McGraw, G. (2006) Software security: building security in, Addison Wesley, USA.
-
(2006)
-
-
McGraw, G.1
-
39
-
-
70349553280
-
Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models
-
SEI Technical Note CMU/SEI-2008-TN-006
-
Mead, N. R. et al. (2008) Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models, SEI Technical Note CMU/SEI-2008-TN-006, http://www.sei.cmu.edu.
-
(2008)
-
-
Mead, N.R.1
-
40
-
-
71049166722
-
Security Requirements Engineering: A Survey
-
ISR Technical Report # UCI-ISR-08-2, Institute for Software Research, University of California, Irvine
-
Romero-Mariona, J., Ziv, H., Richardson, D. J. (2008), Security Requirements Engineering: A Survey, ISR Technical Report # UCI-ISR-08-2, Institute for Software Research, University of California, Irvine.
-
(2008)
-
-
Romero-Mariona, J.1
Ziv, H.2
Richardson, D.J.3
-
41
-
-
0006964066
-
Attack Trees: modeling security threats
-
Dr. Dobbs Journal, December
-
Schneier, B. (1999) Attack Trees: modeling security threats, Dr. Dobbs Journal, December, http://www.schneier.com/paper-attacktrees-ddjft. html.
-
(1999)
-
-
Schneier, B.1
-
42
-
-
0003487308
-
Secrets and Lies: Digital Security in a Networked World
-
New York, NY: John Wiley and Sons
-
Schneier, B. (2000) Secrets and Lies: Digital Security in a Networked World. New York, NY: John Wiley and Sons.
-
(2000)
-
-
Schneier, B.1
-
43
-
-
0003917832
-
Requirements Engineering: A good practice guide
-
Wiley
-
Sommerville, I. and Sawyer, P. (1998) Requirements Engineering: A good practice guide, Wiley.
-
(1998)
-
-
Sommerville, I.1
Sawyer, P.2
-
44
-
-
39449099894
-
Security requirements for rest of us: a survey
-
Special Issue on Security and Agile requirement engineering methods, January/February
-
Tondel, I. A et al. (2008) Security requirements for rest of us: a survey, IEEE Software, Special Issue on Security and Agile requirement engineering methods, January/February.
-
(2008)
IEEE Software
-
-
Tondel, I.A.1
-
45
-
-
67349139935
-
On the secure software development process: CLASP, SDL and Touchpoints compared
-
Win, D. B. et al. (2009) On the secure software development process: CLASP, SDL and Touchpoints compared, Information and Software Technology 51 (2009) 1152-1171.
-
(2009)
Information and Software Technology
, vol.51
, Issue.2009
, pp. 1152-1171
-
-
Win, D.B.1
-
46
-
-
35348824361
-
The art of software security assessment: identifying and preventing software vulnerabilities
-
Addison Wesley
-
Dowd, M., McDonald, J. and Schuh, J. (2007) The art of software security assessment: identifying and preventing software vulnerabilities, Addison Wesley.
-
(2007)
-
-
Dowd, M.1
McDonald, J.2
Schuh, J.3
-
47
-
-
84892027226
-
SDL Threat Modeling Tool 3.1
-
Microsoft
-
Microsoft (2009a) SDL Threat Modeling Tool 3.1, http://www.microsoft. com/downloads/en/details.aspx?FamilyID=A48CCCB1-814B-47B6- 9D17-1E273F65AE19anddisplaylang=en
-
(2009)
-
-
-
48
-
-
49049107220
-
Software Security Assurance
-
State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS
-
Goertzel, K. M. et al. (2007) Software Security Assurance, State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS.
-
(2007)
-
-
Goertzel, K.M.1
-
49
-
-
33746103289
-
Trust Beyond Security: An Expanded Trust Model
-
Hoffman, J. L. et al. (2006) Trust Beyond Security: An Expanded Trust Model, Communications Of The Acm July, Vol. 49, No. 7.
-
(2006)
Communications Of The Acm July
, vol.49
, Issue.7
-
-
Hoffman, J.L.1
-
50
-
-
84892111666
-
No More Chewy Centers: Introducing The Zero Trust Model of Information Security
-
Forrestter Report, September
-
Kindervag, J. (2010) No More Chewy Centers: Introducing The Zero Trust Model of Information Security, Forrestter Report, September, http://www.packetmotion.com/landing/zero-trust-model/
-
(2010)
-
-
Kindervag, J.1
-
51
-
-
79952274582
-
A Practical Approach to Threat Modeling
-
March
-
Olzak, T. (2006) A Practical Approach to Threat Modeling, March, http://adventuresinsecurity.com/blog/wp-content/uploads/2006/03/A_ Practical_Approach_to_Threat_Modeling.pdf.
-
(2006)
-
-
Olzak, T.1
-
52
-
-
84892139974
-
Threat Modeling for Web Application Deployment, ThinkingStone
-
accessed on 8th January 2011
-
Ristic, I. (2011) Threat Modeling for Web Application Deployment, ThinkingStone, http://www.modsecurity.org/documentation/Threat_ Modelling.pdf, accessed on 8th January 2011.
-
(2011)
-
-
Ristic, I.1
-
53
-
-
84892044627
-
Trust model
-
Openloop, accessed on 10th January
-
Openloop (2011) Trust model, http://www.openloop.com/software Engineering/security/PKI/TrustModel/index.htm, accessed on 10th January.
-
(2011)
-
-
-
54
-
-
84892059273
-
Assessing Information Security Risks in the Software Development Lifecycle
-
September
-
Ashbaugh, D. A. (2006) Assessing Information Security Risks in the Software Development Lifecycle, September, www.stsc.hill.af.mil.
-
(2006)
-
-
Ashbaugh, D.A.1
-
55
-
-
84892050496
-
-
TAM, accessed on 11th January
-
TAM (2011) http://www.microsoft.com/downloads/en/confirmation.aspx? familyid=59888078-9daf-4e96-b7d1-944703479451anddisplaylang=en, accessed on 11th January.
-
(2011)
-
-
-
56
-
-
84864749614
-
Using Microsoft's Threat Analysis and Modeling Tool
-
Meneely, A. et al. (2009) Using Microsoft's Threat Analysis and Modeling Tool, http://agile.csc.ncsu.edu/SEMaterials/tutorials/msthreatmodeling/.
-
(2009)
-
-
Meneely, A.1
-
57
-
-
84891999236
-
IT infrastructure threat modeling guide
-
Microsoft
-
Microsoft (2009b) IT infrastructure threat modeling guide http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e1d53e3 f-a512-4668-85b3-169a777fc58fanddisplaylang=en.
-
(2009)
-
-
-
58
-
-
33845915969
-
International Conference on Information Security and Cryptology-ICISC 2005. LNCS 3935
-
Mauw, S. and Oostdijk, M. (2005) International Conference on Information Security and Cryptology-ICISC 2005. LNCS 3935, http://www.sti. uniurb.it/events/fosad05/attacktrees.pdf.
-
(2005)
-
-
Mauw, S.1
Oostdijk, M.2
-
59
-
-
74549179551
-
Introduction to Attack Patterns
-
Cigital Inc
-
Barnum, S. and Sethi, A. (2006) Introduction to Attack Patterns, Cigital Inc, https://buildsecurityin.us-cert.gov/bsi/articles/knowledge/attack/585- BSI.html
-
(2006)
-
-
Barnum, S.1
Sethi, A.2
-
60
-
-
33644539077
-
Ambient Intelligence
-
AmI
-
AmI (2008). Ambient Intelligence, http://www.ambientintelligence.org/.
-
(2008)
-
-
-
62
-
-
84892079313
-
Commonality analysis for defining software product lines
-
Tutorial, ICSE 2000, Limerick, Ireland
-
Ardis, M. (2000). Commonality analysis for defining software product lines, Tutorial, ICSE 2000, Limerick, Ireland.
-
(2000)
-
-
Ardis, M.1
-
63
-
-
0012647401
-
Component-Based Product-Line Engineering with the UML
-
Addison-Wesley, September 2001
-
Atkinson et al. (2001). Component-Based Product-Line Engineering with the UML, Addison-Wesley, September 2001.
-
(2001)
-
-
Atkinson1
-
64
-
-
84892004803
-
Software Architecture
-
In Practice Addison Wesley
-
Bass, L. Clements, P. Kazman, R (1998). Software Architecture In Practice Addison Wesley.
-
(1998)
-
-
Clements, B.L.1
Kazman, P.R.2
-
65
-
-
35048869305
-
The Artistry of software architecture
-
Special issue, IEEE Software, November 1995
-
Boasson, M. (1995). The Artistry of software architecture, Special issue, IEEE Software, November 1995.
-
(1995)
-
-
Boasson, M.1
-
66
-
-
1442338082
-
Understanding.NET: A Tutorial and Analysis
-
Addison Wesley 2002
-
Chappell, D. (2002). Understanding.NET: A Tutorial and Analysis, Addison Wesley 2002.
-
(2002)
-
-
Chappell, D.1
-
67
-
-
21244456616
-
User stories applied for agile software development
-
Addison-Wesley Press 2004
-
Cohn, M. (2004). User stories applied for agile software development. Addison-Wesley Press 2004.
-
(2004)
-
-
Cohn, M.1
-
68
-
-
0032207150
-
Commonality and variability in software engineering
-
IEEE Software, November/December 1998
-
Coplien, J., Hoffman, D., and Weiss, D. (1998). Commonality and variability in software engineering, IEEE Software, November/December 1998.
-
(1998)
-
-
Coplien, J.1
Hoffman, D.2
Weiss, D.3
-
69
-
-
62749156655
-
Design Software Product Lines
-
Addison Wesley 2004
-
Gomma, E. (2004). Design Software Product Lines, Addison Wesley 2004.
-
(2004)
-
-
Gomma, E.1
-
70
-
-
84892134534
-
The Nature of Artificial Intelligence, Artificial Intelligence at Edinburgh University: a Perspective
-
Howe, J. (2007). The Nature of Artificial Intelligence, Artificial Intelligence at Edinburgh University: a Perspective, http://www.inf.ed.ac.uk/about/ AIhistory.html.
-
(2007)
-
-
Howe, J.1
-
71
-
-
0003504769
-
Object-Oriented Software Engineering: A use-casedriven approach
-
Addison Wesley, 1992
-
Jacobson, et al. (1992). Object-Oriented Software Engineering: A use-casedriven approach, Addison Wesley, 1992.
-
(1992)
-
-
Jacobson1
-
72
-
-
0003535126
-
Software architecture for product families
-
Addison Wesley 2000
-
Jazayeri, M., Ran, A., van der Linden, F. (2000). Software architecture for product families, Addison Wesley 2000.
-
(2000)
-
-
Jazayeri, M.1
Ran, A.2
van der Linden, F.3
-
73
-
-
84892060441
-
The 4+1 view model of software architecture
-
Special issue, IEEE Software, November 1995
-
Kruchten, P. (1995). The 4+1 view model of software architecture, Special issue, IEEE Software, November 1995.
-
(1995)
-
-
Kruchten, P.1
-
74
-
-
0033697175
-
Requirements Engineering for Product Families
-
ICSE 2000, Limerick, Ireland
-
Kuusela, J., and Savolainen, J. (2000). Requirements Engineering for Product Families, ICSE 2000, Limerick, Ireland.
-
(2000)
-
-
Kuusela, J.1
Savolainen, J.2
-
75
-
-
84892105782
-
Requirements-Based Product Line Engineering
-
ESEC/FSE 2001, Vienna, Austria
-
Mannion, M., and Kaindl, M. (2001). Requirements-Based Product Line Engineering, ESEC/FSE 2001, Vienna, Austria.
-
(2001)
-
-
Mannion, M.1
Kaindl, M.2
-
76
-
-
36948999633
-
Tracing variations in software product families
-
CACM, December
-
Mohan, K., and Ramesh, B. (2007). Tracing variations in software product families, CACM, December, Vol. 50 No. 12.
-
(2007)
, vol.50
, Issue.12
-
-
Mohan, K.1
Ramesh, B.2
-
77
-
-
77955431422
-
Security requirements engineering framework for software product lines
-
Mellado, D. et al. (2010). Security requirements engineering framework for software product lines, Information and Software Technology 52 (2010) 1094-1117.
-
(2010)
Information and Software Technology
, vol.52
, Issue.2010
, pp. 1094-1117
-
-
Mellado, D.1
-
78
-
-
33947637432
-
MAP and OAR Methods: Techniques for Developing Core Assets for Software Product Lines from Existing Assets
-
CMU/SEI, April 2002
-
O'Brien, Liam and Smith, Dennis (2002). MAP and OAR Methods: Techniques for Developing Core Assets for Software Product Lines from Existing Assets, CMU/SEI, April 2002.
-
(2002)
-
-
O'Brien, L.1
Smith, D.2
-
79
-
-
0003871224
-
Measuring software reuse
-
Addison Wesley, 1997
-
Poulin, S. J. (1997). Measuring software reuse, Addison Wesley, 1997.
-
(1997)
-
-
Poulin, S.J.1
-
80
-
-
62749094176
-
Domain Analysis
-
ACM SIGSOFT Software Engineering Notes, May 1998
-
Prieto-Diaz (1998). Domain Analysis, ACM SIGSOFT Software Engineering Notes, May 1998.
-
(1998)
-
-
Prieto-Diaz1
-
81
-
-
15244350148
-
Commonality and Variability Analysis in Industrial Practice for Product-line Improvement
-
Wiley
-
Ramachandran, M. (2005). Commonality and Variability Analysis in Industrial Practice for Product-line Improvement, Special issue, Journal of Software Process Improvement and Practice, Vol.10, Wiley.
-
(2005)
Journal of Software Process Improvement and Practice
, vol.10
, Issue.SPEC ISSUE
-
-
Ramachandran, M.1
-
83
-
-
84932090691
-
Software Components: Guidelines and Applications
-
Nova Science Publishers, New York, USA. ISBN: 978-1- 60456-870-7, October/November 2008
-
Ramachandran, M. (2008). Software Components: Guidelines and Applications, Nova Science Publishers, New York, USA. ISBN: 978-1- 60456-870-7, October/November 2008, https://www.novapublishers.com/catalog/product_info.php?products_id=7577 Pages 410.
-
(2008)
, pp. 410
-
-
Ramachandran, M.1
-
84
-
-
84891965204
-
Knowledge-based Reasoning for Software Architectural Design Strategies
-
SE Notes, March 2003
-
Ramachandran, M. and Mangano, D. (2003). Knowledge-based Reasoning for Software Architectural Design Strategies, SE Notes, March 2003.
-
(2003)
-
-
Ramachandran, M.1
Mangano, D.2
-
85
-
-
84892002484
-
A framework for analyzing reuse knowledge
-
7the Intl. conf. on Software Eng and Knowledge Eng (SEKE'95), Washington DC, 22-24 June, 1995, USA
-
Ramachandran, M. and Sommerville, I. (1995). A framework for analyzing reuse knowledge, 7the Intl. conf. on Software Eng and Knowledge Eng (SEKE'95), Washington DC, 22-24 June, 1995, USA.
-
(1995)
-
-
Ramachandran, M.1
Sommerville, I.2
-
86
-
-
84892013292
-
Chapter 20 Commonality Analysis: Implications over a Successful Product Line
-
Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009
-
Ramachandran, M. and Ganeshan, S. (2009). Chapter 20 Commonality Analysis: Implications over a Successful Product Line, Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009.
-
(2009)
-
-
Ramachandran, M.1
Ganeshan, S.2
-
87
-
-
84891962186
-
Chapter 21 Rapid Productivity and Quality: Software Product Lines and Trends of the Future
-
Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009
-
Ramachandran, M. and Ganeshan, S. (2009). Chapter 21 Rapid Productivity and Quality: Software Product Lines and Trends of the Future, Edited by Ramachandran, M and de Carvalho, Rogério Atem (Editors) (2008) Handbook of Software Engineering and Productivity Technologies: Implications for Globalisation, IGI Publishers, USA, November 2009.
-
(2009)
-
-
Ramachandran, M.1
Ganeshan, S.2
-
88
-
-
84892135496
-
Artificial Intelligence and Software Engineering: Status and Future Trends
-
Rech, J. and Althoff, K-D. (2008). Artificial Intelligence and Software Engineering: Status and Future Trends www.iis.uni-hildesheim.de/files/staff/althoff/Publications/KI_AI-SE-Survey.pdf.
-
(2008)
-
-
Rech, J.1
Althoff, K.-D.2
-
89
-
-
70749153293
-
The programmers' apprentice project: research overview
-
IEEE Computer, November 1988
-
Ritch, C. and Waters, R. C. (1988). The programmers' apprentice project: research overview, IEEE Computer, November 1988.
-
(1988)
-
-
Ritch, C.1
Waters, R.C.2
-
90
-
-
33644539077
-
Ambient Intelligence
-
IOS Press
-
Riva, G. et al. (editors) (2005). Ambient Intelligence, IOS Press, http://www. ambientintelligence.org/.
-
(2005)
-
-
Riva, G.1
-
91
-
-
84877168529
-
Software Product Lines
-
SEI
-
SEI (2005) Software Product Lines, http://www.sei.cmu.edu/productlines/bibliography.html.
-
(2005)
-
-
-
92
-
-
0003787207
-
Software Architecture -- Perspectives on an Emerging Discipline
-
Prentice Hall. Jersey
-
Shaw M., Garlan D. (1996). Software Architecture -- Perspectives on an Emerging Discipline. Prentice Hall. Jersey.
-
(1996)
-
-
Shaw, M.1
Garlan, D.2
-
93
-
-
0003885424
-
Software Engineering
-
Somerville, Seventh Edition. Addison Wesley (2004)
-
Somerville (2004). Software Engineering, Seventh Edition. Addison Wesley (2004).
-
(2004)
-
-
-
94
-
-
0003499649
-
Requirements Engineering: Processes and Techniques
-
Wiley, 1998
-
Sommerville, I. and Kotenya, G. (1998). Requirements Engineering: Processes and Techniques, Wiley, 1998.
-
(1998)
-
-
Sommerville, I.1
Kotenya, G.2
-
95
-
-
0003917832
-
Requirements Engineering: A Good Practice Guide
-
Wiley
-
Sommerville, I., and Sawyer, P. Requirements Engineering: A Good Practice Guide, Wiley, 1997.
-
(1997)
-
-
Sommerville, I.1
Sawyer, P.2
-
96
-
-
0003902724
-
Software Product-Line Engineering: A Family-based Software Development Process
-
1999
-
Weiss, M. D., Lai, R. T. C. (1999). Software Product-Line Engineering: A Family-based Software Development Process, 1999.
-
(1999)
-
-
Weiss, M.D.1
Lai, R.T.C.2
-
97
-
-
84892085731
-
Commonality Analysis: A Systematic Process for Defining Families
-
Second International Workshop on Development and Evolution of Software Architectures for Product Families, February 1998
-
Weiss, M.D. (1998). Commonality Analysis: A Systematic Process for Defining Families. Second International Workshop on Development and Evolution of Software Architectures for Product Families, February 1998.
-
(1998)
-
-
Weiss, M.D.1
-
98
-
-
49049107220
-
Software Security Assurance
-
State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS
-
Goertzel, K. M. et al. (2007) Software Security Assurance, State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS.
-
(2007)
-
-
Goertzel, K.M.1
-
99
-
-
12444319221
-
Software quality assurance
-
Pearson
-
Galin, D. (2004) Software quality assurance, Pearson.
-
(2004)
-
-
Galin, D.1
-
100
-
-
33846988559
-
Structured Assurance Cases: Three Common Standards
-
Proceedings of the Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05)
-
Ankrum, T. S. and Kromholz, A. H. (2005) Structured Assurance Cases: Three Common Standards, Proceedings of the Ninth IEEE International Symposium on High-Assurance Systems Engineering (HASE'05).
-
(2005)
-
-
Ankrum, T.S.1
Kromholz, A.H.2
-
101
-
-
84892096406
-
Creating a Software Assurance Body of Knowledge
-
October
-
Redwine, S. T. (2005) Creating a Software Assurance Body of Knowledge, www.stsc.hill.af.mil, October.
-
(2005)
-
-
Redwine, S.T.1
-
102
-
-
84910108689
-
Where Do Software Security Assurance Tools Add Value?
-
February. As part of the ASE 2005 conference, Long Beach, California, USA
-
Jackson, D. and Cooper, D. (2006) Where Do Software Security Assurance Tools Add Value? NIST Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM'05), February. As part of the ASE 2005 conference, Long Beach, California, USA, http://hissa.nist.gov/~black/Papers/NIST%20SP%20500-265.pdf.
-
(2006)
NIST Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM'05)
-
-
Jackson, D.1
Cooper, D.2
-
103
-
-
84955516854
-
Metrics That Matter: Quantifying Software Security Risk
-
February. As part of the ASE 2005 conference, Long Beach, California, USA
-
Chess, B. (2006) Metrics That Matter: Quantifying Software Security Risk, NIST Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM'05), February. As part of the ASE 2005 conference, Long Beach, California, USA, http://hissa. nist.gov/~black/Papers/NIST%20SP%20500-265.pdf.
-
(2006)
NIST Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM'05)
-
-
Chess, B.1
-
104
-
-
84892053774
-
Resilient software, CrossTalk
-
Crasstalk, Sept/Oct
-
Crasstalk (2009) Resilient software, CrossTalk, The Journal of Defense Software Engineering, 22:6, Sept/Oct.
-
(2009)
The Journal of Defense Software Engineering
, vol.22
, Issue.6
-
-
-
105
-
-
84891981745
-
CERT Resiliency Engineering Framework
-
SEI, CMU report
-
White, D. (2007) CERT Resiliency Engineering Framework, SEI, CMU report.
-
(2007)
-
-
White, D.1
-
107
-
-
84892104958
-
Security Assurance during the Software Development Cycle
-
International Conference on Computer Systems and Technologies - CompSysTech'09
-
Agudo, I. et al. (2009) Security Assurance during the Software Development Cycle, International Conference on Computer Systems and Technologies - CompSysTech'09.
-
(2009)
-
-
Agudo, I.1
-
108
-
-
2342548557
-
The Art of Deception: Controlling the Human Element of Security
-
Wiley
-
Mitnick, K. and Simon, W. L. (2003) The Art of Deception: Controlling the Human Element of Security, Wiley. http://www.social-engineer.org/seresources/.
-
(2003)
-
-
Mitnick, K.1
Simon, W.L.2
-
109
-
-
37249037465
-
Security Metrics: replacing fear, uncertainty, and doubt
-
Addison Wesley, 2007
-
Jaquith, A. (2007) Security Metrics: replacing fear, uncertainty, and doubt, Addison Wesley, 2007.
-
(2007)
-
-
Jaquith, A.1
-
110
-
-
0003885423
-
Software Engineering
-
9th Edition, Pearson
-
Sommerville, I. (2011) Software Engineering, 9th Edition, Pearson.
-
(2011)
-
-
Sommerville, I.1
-
111
-
-
0003625739
-
Software Engineering: Practitioner's Approach
-
7th edition, McGraw Hill
-
Pressman, R. (2009) Software Engineering: Practitioner's Approach, 7th edition, McGraw Hill.
-
(2009)
-
-
Pressman, R.1
-
112
-
-
84892095254
-
Source Code Analysis Tools - Overview
-
Michael, C. and Lavenhar, S. R. (2005) Source Code Analysis Tools - Overview, https://buildsecurityin.us-cert.gov/bsi/articles/tools/code/263- BSI.html.
-
(2005)
-
-
Michael, C.1
Lavenhar, S.R.2
-
113
-
-
84891985621
-
SAMATE project at NIST-Software Assurance Metrics And Tool Evaluation
-
SAMATE
-
SAMATE (2005) SAMATE project at NIST-Software Assurance Metrics And Tool Evaluation, Source Code Security Analyzers, http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html.
-
(2005)
Source Code Security Analyzers
-
-
-
114
-
-
84891976499
-
The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition
-
CCSC: Rocky Mountain Conference 2010
-
Kvedar, D. et al. (2010) The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition, CCSC: Rocky Mountain Conference 2010.
-
(2010)
-
-
Kvedar, D.1
-
115
-
-
0013080980
-
Computer security: art and science
-
Addison-Wesley
-
Bishop, M. (2003) computer security: art and science, Addison-Wesley.
-
(2003)
-
-
Bishop, M.1
-
116
-
-
0003563348
-
Building a secure computer system
-
van Nostrand Reinhold New York Co
-
Gasser, M. (1988) Building a secure computer system, van Nostrand Reinhold New York Co.
-
(1988)
-
-
Gasser, M.1
-
117
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. H., and Schoeder, M. D. (1975) The protection of information in computer systems, Proceedings of the IEEE 63 (9): 1278-308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schoeder, M.D.2
-
118
-
-
84891996022
-
The architecture tradeoff analysis method (ATAM)
-
ATAM, SEI
-
ATAM (2011) The architecture tradeoff analysis method (ATAM), SEI www.sei.cmu.edu/architecture/ata_method.html.
-
(2011)
-
-
-
119
-
-
25644452499
-
Architecture description markup language (ADML) creating open market for IT architecture tools
-
The open group, white paper
-
Spencer, J. (2000) Architecture description markup language (ADML) creating open market for IT architecture tools, The open group, white paper.
-
(2000)
-
-
Spencer, J.1
-
120
-
-
68349109439
-
Software architecture review: the state of practice
-
July
-
Babar, A. M. and Gorton, I. (2009) Software architecture review: the state of practice, IEEE Computer, Vol 42 No 7, July.
-
(2009)
IEEE Computer
, vol.42
, Issue.7
-
-
Babar, A.M.1
Gorton, I.2
-
121
-
-
70349441583
-
Software Architecture: Foundations, theory, and practice
-
Wiley, USA
-
Taylor, R., Medividovic, N., Dashofy, E. M. (2010) Software Architecture: Foundations, theory, and practice, Wiley, USA.
-
(2010)
-
-
Taylor, R.1
Medividovic, N.2
Dashofy, E.M.3
-
122
-
-
84891975346
-
Goodness of fit on software architecture
-
IEEE Software, Nov/Dec
-
Booch, G. (2006) Goodness of fit on software architecture, IEEE Software, Nov/Dec.
-
(2006)
-
-
Booch, G.1
-
123
-
-
57649151414
-
Software security engineering: a guide for project managers
-
Addison Wesley, 2008
-
Allen, J. H. et al. (2008) Software security engineering: a guide for project managers, Addison Wesley, 2008.
-
(2008)
-
-
Allen, J.H.1
-
124
-
-
0003885423
-
Software Engineering
-
9th Edition, Pearson
-
Sommerville, I. (2011) Software Engineering, 9th Edition, Pearson.
-
(2011)
-
-
Sommerville, I.1
-
125
-
-
0003625739
-
Software Engineering: Practitioner's Approach
-
7th edition, McGraw Hill
-
Pressman, R. (2009) Software Engineering: Practitioner's Approach, 7th edition, McGraw Hill.
-
(2009)
-
-
Pressman, R.1
-
126
-
-
70849083494
-
Activity and Artifact Views of a Secure Software Development Process
-
International Conference on Computational Science and Engineering
-
Umair, M., Kan, A., and Zulkernine, M. (2009) Activity and Artifact Views of a Secure Software Development Process, International Conference on Computational Science and Engineering.
-
(2009)
-
-
Umair, M.1
Kan, A.2
Zulkernine, M.3
-
127
-
-
84932090691
-
Software Components: Guidelines and Applications
-
Nova Scientific Publishers, NY, USA
-
Ramachandran, M. (2008) Software Components: Guidelines and Applications, Nova Scientific Publishers, NY, USA.
-
(2008)
-
-
Ramachandran, M.1
-
128
-
-
84892040866
-
Clusters and Security: Distributed Security for Distributed Systems
-
Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides
-
Pourzandi, M. et al. (2007) Clusters and Security: Distributed Security for Distributed Systems, Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides.
-
(2007)
-
-
Pourzandi, M.1
-
129
-
-
0010380353
-
Internet and intranet security
-
Artech House, Inc
-
Oppliger, R. (2002) Internet and intranet security, Artech House, Inc.
-
(2002)
-
-
Oppliger, R.1
-
130
-
-
0008390875
-
Hack attacks denied-a complete guide to network lockdown
-
John Wiley and Sons, Inc
-
Chirillo, J. (2001) Hack attacks denied-a complete guide to network lockdown, John Wiley and Sons, Inc.
-
(2001)
-
-
Chirillo, J.1
-
131
-
-
0003507850
-
Network security essentials-applications and standards
-
2nd edition, Pearson Education, Inc
-
Stallings, W. (2003) Network security essentials-applications and standards, 2nd edition, Pearson Education, Inc.
-
(2003)
-
-
Stallings, W.1
-
132
-
-
84892132133
-
Web services: mostly secured already
-
Slide presentation
-
Dick, K. (2008) Web services: mostly secured already, Slide presentation http://www.webservicessummit.com/SDSIC/KSDSDSICSlides_files/frame.ht m.
-
(2008)
-
-
Dick, K.1
-
133
-
-
33947392597
-
Designing an integrated architecture for network content security gateways
-
IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006
-
Lin, Y-D. et al. (2006) Designing an integrated architecture for network content security gateways, IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006.
-
(2006)
-
-
Lin, Y.-D.1
-
134
-
-
39449099894
-
Security requirements for rest of us: a survey
-
Special Issue on Security and Agile requirement engineering methods, January/February
-
Tondel, I. A. et al. (2008) Security requirements for rest of us: a survey, IEEE Software, Special Issue on Security and Agile requirement engineering methods, January/February.
-
(2008)
IEEE Software
-
-
Tondel, I.A.1
-
135
-
-
2342469291
-
Software Security: Building Security
-
March/April
-
McGraw, G. (2004) Software Security: Building Security In, IEEE Security and Privacy, March/April.
-
(2004)
IEEE Security and Privacy
-
-
McGraw, G.1
-
136
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G. and A. L. Opdahl (2005) Eliciting security requirements with misuse cases, Requirements Eng (2005) 10: 34-44.
-
(2005)
Requirements Eng
, vol.10
, Issue.2005
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
137
-
-
57649151414
-
Software security engineering: A guide for project managers
-
Addison Wesley, SEI series, USA
-
Allen, J. et al. (2008) Software security engineering: A guide for project managers, Addison Wesley, SEI series, USA.
-
(2008)
-
-
Allen, J.1
-
138
-
-
33144456824
-
Software security: building security
-
in, Addison Wesley, USA
-
McGraw, G. (2006) Software security: building security in, Addison Wesley, USA.
-
(2006)
-
-
McGraw, G.1
-
139
-
-
49049087976
-
Analysis and Component-based Realization of Security Requirements
-
The Third International Conference on Availability, Reliability and Security, IEEE CS Press
-
Hatebur, D. Heisel, M. Schmidt, H. (2008) Analysis and Component-based Realization of Security Requirements, The Third International Conference on Availability, Reliability and Security, IEEE CS Press.
-
(2008)
-
-
Heisel, H.D.1
Schmidt, M.H.2
-
140
-
-
0003920373
-
UML Components
-
Addison Wesley
-
Cheesman, J. and Daniels, J. (2000) UML Components, Addison Wesley.
-
(2000)
-
-
Cheesman, J.1
Daniels, J.2
-
141
-
-
0003854752
-
Objects, components and frameworks with UML
-
Addison Wesley
-
D'Souza and Wills (1999) Objects, components and frameworks with UML, Addison Wesley.
-
(1999)
-
-
D'Souza1
Wills2
-
142
-
-
0004181453
-
Component-Based Software Engineering
-
Addison Wesley
-
Heineman, G. T. and Councill, W. T. (2001) Component-Based Software Engineering, Addison Wesley.
-
(2001)
-
-
Heineman, G.T.1
Councill, W.T.2
-
143
-
-
84892054192
-
Special issue on Software components
-
IEEE SW, IEEE Software, September 1998
-
IEEE SW (1998) Special issue on Software components, IEEE Software, September 1998.
-
(1998)
-
-
-
144
-
-
84891963074
-
Reuse of off-the-shelf components: 9th international conference on software reuse
-
ICSR 2006, Turin, Italy, June 12-15, 2006, Springer Verlog Lecture Notes
-
Morisio, M. (2006) (ed.). Reuse of off-the-shelf components: 9th international conference on software reuse, ICSR 2006, Turin, Italy, June 12-15, 2006, Springer Verlog Lecture Notes.
-
(2006)
-
-
Morisio, M.1
-
145
-
-
84892120108
-
SE, 6th Edition
-
Pressman, McGraw Hill
-
Pressman (2005) SE, 6th Edition, McGraw Hill.
-
(2005)
-
-
-
146
-
-
0003885423
-
Software Engineering
-
7th Edition, Addison Wesley
-
Sommerville, I. (2005) Software Engineering, 7th Edition, Addison Wesley.
-
(2005)
-
-
Sommerville, I.1
-
147
-
-
0004142101
-
Component Software
-
Addison Wesley
-
Szyperski, C. (1998) Component Software, Addison Wesley.
-
(1998)
-
-
Szyperski, C.1
-
148
-
-
84932090691
-
Software Components: Guidelines and Applications
-
Nova Scientific Publishers, NY, USA
-
Ramachandran, M. (2008) Software Components: Guidelines and Applications, Nova Scientific Publishers, NY, USA.
-
(2008)
-
-
Ramachandran, M.1
-
149
-
-
84892016273
-
Good program design
-
1979, Prentice-Hall
-
Parnas, L. (1979) Good program design, 1979, Prentice-Hall.
-
(1979)
-
-
Parnas, L.1
-
150
-
-
84892064928
-
Selected writings on computing: a personal perspective
-
ACM Classic Books Series, 1982
-
Dijkstra, E. W. (1979) Selected writings on computing: a personal perspective, ACM Classic Books Series, 1982.
-
(1979)
-
-
Dijkstra, E.W.1
-
151
-
-
0004085484
-
COM and DCOM
-
Wiley
-
Sessions, R. (1998) COM and DCOM, Wiley.
-
(1998)
-
-
Sessions, R.1
-
152
-
-
0003885423
-
Software Engineering
-
7th Edition, Addison Wesley
-
Sommerville, I. (2005) Software Engineering, 7th Edition, Addison Wesley.
-
(2005)
-
-
Sommerville, I.1
-
153
-
-
84891983746
-
Software reuse assessment
-
First Intl. workshop on software reuse, Germany
-
Ramachandran, M. and Sommerville (1992) Software reuse assessment, First Intl. workshop on software reuse, Germany.
-
(1992)
-
-
Ramachandran, M.1
Sommerville2
-
154
-
-
2442503135
-
A Handbook of Software and Systems Engineering
-
Addison Wesley
-
Endres, A. and Rombach, D. (2003) A Handbook of Software and Systems Engineering, Addison Wesley.
-
(2003)
-
-
Endres, A.1
Rombach, D.2
-
155
-
-
84892003013
-
Concurrent programs
-
Prentice-Hall
-
Hoare, T. (1979) Concurrent programs, Prentice-Hall.
-
(1979)
-
-
Hoare, T.1
-
156
-
-
0003917832
-
Requirements Engineering: Good Practice Guidelines
-
Wiley
-
Sommerville, I. and Sawyer, P. (1995) Requirements Engineering: Good Practice Guidelines, Wiley.
-
(1995)
-
-
Sommerville, I.1
Sawyer, P.2
-
157
-
-
49049087976
-
Analysis and Component-based Realization of Security Requirements
-
The Third International Conference on Availability, Reliability and Security (ARES'08), IEEE CS Press
-
Hatebur, D., Heisel, M., Schmidt, H. (2008) Analysis and Component-based Realization of Security Requirements, The Third International Conference on Availability, Reliability and Security (ARES'08), IEEE CS Press.
-
(2008)
-
-
Hatebur, D.1
Heisel, M.2
Schmidt, H.3
-
159
-
-
0007863633
-
A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components
-
Proceedings of the 13th Australian Software Engineering Conference (ASWEC'01)
-
Khan, K., Han, J. and Zheng, Y. (2001) A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components, Proceedings of the 13th Australian Software Engineering Conference (ASWEC'01).
-
(2001)
-
-
Khan, K.1
Han, J.2
Zheng, Y.3
-
160
-
-
78650865094
-
A Comprehensive Interface Definition Framework for Software Components
-
IEEE Proceedings of the 1998 Asia-Pacific Software Engineering Conference, Taipei, December
-
Han, J. (1998) A Comprehensive Interface Definition Framework for Software Components, IEEE Proceedings of the 1998 Asia-Pacific Software Engineering Conference, Taipei, December.
-
(1998)
-
-
Han, J.1
-
161
-
-
33747259074
-
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software
-
Microsoft Press
-
Howard, M. and Lipner, S. (2006) The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software, Microsoft Press.
-
(2006)
-
-
Howard, M.1
Lipner, S.2
-
162
-
-
0003416497
-
Securing Java: getting down to business with mobile code
-
John Wiley and Sons, USA
-
McGraw, G. and Felton, E. W. (1999) Securing Java: getting down to business with mobile code, John Wiley and Sons, USA.
-
(1999)
-
-
McGraw, G.1
Felton, E.W.2
-
163
-
-
35348824361
-
The art of software security assessment: Identifying and preventing software vulnerabilities
-
Addison Wesley
-
Dowd, M., McDonald, J., and Schuh, J. (2007) The art of software security assessment: Identifying and preventing software vulnerabilities, Addison Wesley.
-
(2007)
-
-
Dowd, M.1
McDonald, J.2
Schuh, J.3
-
164
-
-
84932090691
-
Software Components: Guidelines and Applications
-
Nova Scientific Publishers, NY, USA
-
Ramachandran, M. (2008) Software Components: Guidelines and Applications, Nova Scientific Publishers, NY, USA.
-
(2008)
-
-
Ramachandran, M.1
-
165
-
-
84892094711
-
Architecture and security design principles
-
ASP.NET, accessed on 12th February
-
ASP.NET (2011) architecture and security design principles http://msdn. microsoft.com/en-us/library/yedba920.aspx, accessed on 12th February
-
(2011)
-
-
-
166
-
-
84891978048
-
Web-services Security: What's Required To Secure A Service- Oriented Architecture
-
Oracle
-
Oracle (2010) Web-services Security: What's Required To Secure A Service- Oriented Architecture.
-
(2010)
-
-
-
167
-
-
84892138341
-
Software Development Guidelines
-
Hyde, R. (2000) Software Development Guidelines, http://webster.cs.ucr.edu/ Page_softeng/softDevGuide_contents.html.
-
(2000)
-
-
Hyde, R.1
-
168
-
-
84891991729
-
Secure Coding Guidelines for the Java Programming Language, Version 3.0
-
SecureJava, accessed on February 14th
-
SecureJava (2011) Secure Coding Guidelines for the Java Programming Language, Version 3.0, http://www.oracle.com/technetwork/java/seccode guide-139067.html, accessed on February 14th.
-
(2011)
-
-
-
169
-
-
0003925663
-
Building Secure Software: How to Avoid Security Problems the Right Way
-
Boston: Addison-Wesley
-
Viega, J. and McGraw, G. (2002) Building Secure Software: How to Avoid Security Problems the Right Way, Boston: Addison-Wesley.
-
(2002)
-
-
Viega, J.1
McGraw, G.2
-
170
-
-
0004104224
-
Effective Java Programming Language Guide
-
2nd ed, Addison-Wesley Professional
-
Bloch, J. (2008) Effective Java Programming Language Guide, 2nd ed, Addison-Wesley Professional.
-
(2008)
-
-
Bloch, J.1
-
171
-
-
35348829230
-
The art of software security testing
-
Addison Wesley
-
Wysopal, C. et al. (2007) The art of software security testing, Addison Wesley.
-
(2007)
-
-
Wysopal, C.1
-
172
-
-
34548730452
-
Software Testing and Analysis-Process, Principles, and Techniques
-
John Wiley and Sons, USA
-
Pezze, M. and Young, M. (2008) Software Testing and Analysis-Process, Principles, and Techniques, John Wiley and Sons, USA.
-
(2008)
-
-
Pezze, M.1
Young, M.2
-
173
-
-
35348829230
-
The art of software security testing
-
Addison Wesley
-
Wysopal, C. et al. (2007) The art of software security testing, Addison Wesley.
-
(2007)
-
-
Wysopal, C.1
-
174
-
-
84892028186
-
Junit with Jtest, Parasoft tools
-
Ellswork, C. and Dunlop, C. (2009) Junit with Jtest, Parasoft tools, http://www.devx.com/Java/Article/15625/0/page/2.
-
(2009)
-
-
Ellswork, C.1
Dunlop, C.2
-
175
-
-
84892072552
-
Jtest
-
Jtest (2011) http://www.parasoft.com/jsp/products/jtest.jsp;jsessionid=aaa5Jg ObObp7fo?redname=java_staticanalysis_unittestingandreferred=java_stati canalysis_unittesting.
-
(2011)
-
-
-
176
-
-
0003580125
-
Software Reuse: Architecture, Process and Organization for Business Success
-
Addison Wesley
-
Jacobson, I. et al. (1997) Software Reuse: Architecture, Process and Organization for Business Success, Addison Wesley.
-
(1997)
-
-
Jacobson, I.1
-
177
-
-
84892081326
-
The Most Important Design Guideline? IEEE Software
-
July/August 2004
-
Meyers, S. (2004) The Most Important Design Guideline? IEEE Software, July/August 2004.
-
(2004)
-
-
Meyers, S.1
-
178
-
-
1542376923
-
Use Case-based Testing of Product Lines
-
ACM SIGSOFT Software Engineering Notes, September 2003
-
Bertolino, A., Gnesi, S. (2003) Use Case-based Testing of Product Lines, ACM SIGSOFT Software Engineering Notes, September 2003.
-
(2003)
-
-
Bertolino, A.1
Gnesi, S.2
-
179
-
-
49049107220
-
Software Security Assurance
-
State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS
-
Goertzel, K. M. et al. (2007) Software Security Assurance, State-of-the-Art Report (SOAR) July 31, 2007, Published by IATAC and DACS.
-
(2007)
-
-
Goertzel, K.M.1
-
180
-
-
0004097670
-
Software Testing Techniques
-
Van Nost. Reinhold; 2 edition (Jun 1990)
-
Beizer, B. (1990) Software Testing Techniques, Van Nost. Reinhold; 2 edition (Jun 1990).
-
(1990)
-
-
Beizer, B.1
-
181
-
-
0013347631
-
Common Vulnerabilities and Exposures (CVE) List
-
Mitre Corporation, Retrieved. November 22, accessible at
-
Mitre Corporation (2004) Common Vulnerabilities and Exposures (CVE) List. Retrieved. November 22, accessible at http://www.cve.mitre.org/cve/downloads/.
-
(2004)
-
-
-
182
-
-
40449092394
-
Applying Formal Methods to a Certifiably Secure Software System
-
JANUARY/FEBRUARY
-
Heitmeyer, C. L. et al. (2008) Applying Formal Methods to a Certifiably Secure Software System, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 34, NO. 1, JANUARY/FEBRUARY.
-
(2008)
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, vol.34
, Issue.1
-
-
Heitmeyer, C.L.1
-
183
-
-
33846230206
-
Application of Lightweight Formal Methods to Software Security
-
Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05)
-
Gilliam, P. D. et al. (2005) Application of Lightweight Formal Methods to Software Security, Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
-
(2005)
-
-
Gilliam, P.D.1
-
184
-
-
62349084005
-
An Attack Scenario-based Approach for Software Security Testing at Design Stage
-
International Symposium on Computer Science and Computational Technology, IEEE CS Press
-
He, K. et al. (2008) An Attack Scenario-based Approach for Software Security Testing at Design Stage, International Symposium on Computer Science and Computational Technology, IEEE CS Press.
-
(2008)
-
-
He, K.1
-
185
-
-
84892033891
-
Developing Secure Applications: Best Practices for Writing Secure Code
-
Boca Raton, Fla.: Auerbach, ISBN 0849319900
-
Trocino, D. P. (2004) Developing Secure Applications: Best Practices for Writing Secure Code. Boca Raton, Fla.: Auerbach, ISBN 0849319900.
-
(2004)
-
-
Trocino, D.P.1
-
186
-
-
84892076566
-
Secure programmer: Developing secure programs
-
August 21, 2003
-
Wheeler, D. A. (2003) Secure programmer: Developing secure programs (August 21, 2003).
-
(2003)
-
-
Wheeler, D.A.1
-
187
-
-
84892115995
-
Secure Software Development and Code Analysis Tools
-
GIAC Certification: Practical Assignment v1.4b, Option 1, SANS Institute
-
La, T. (2003) Secure Software Development and Code Analysis Tools. GIAC Certification: Practical Assignment v1.4b, Option 1, SANS Institute.
-
(2003)
-
-
La, T.1
-
188
-
-
84891990490
-
Testing Code Security
-
Auerbach Publications
-
Linden, van der, M. A. (2007) Testing Code Security, Auerbach Publications.
-
(2007)
-
-
Linden van der, M.A.1
-
189
-
-
84892097705
-
Penetration Testing
-
MSDN Magazine, May
-
Whittaker, A. J. (2008) Penetration Testing, http://msdn.microsoft.com/enus/magazine/cc507646.aspx, MSDN Magazine, May.
-
(2008)
-
-
Whittaker, A.J.1
-
190
-
-
72349095448
-
A Penetration Testing Method for E-Commerce Authentication System Security
-
International Conference on Management of e-Commerce and e-Government, Nanchang, China
-
Pan, W. and Li, W. (2009) A Penetration Testing Method for E-Commerce Authentication System Security, International Conference on Management of e-Commerce and e-Government, Nanchang, China.
-
(2009)
-
-
Pan, W.1
Li, W.2
-
191
-
-
35348824361
-
The Art of Software Security Assessment-Identifying and Preventing Software Vulnerabilities
-
Addison Wesley
-
Dowd, M., McDonald, J., and Schuh, J. (2006) The Art of Software Security Assessment-Identifying and Preventing Software Vulnerabilities, Addison Wesley.
-
(2006)
-
-
Dowd, M.1
McDonald, J.2
Schuh, J.3
-
192
-
-
84892083504
-
Software security testing, special issue on building security
-
September/October
-
Potter, B., Hamilton, B. A., and McGraw, G. (2004) Software security testing, special issue on building security in, IEEE Security and Privacy, September/October.
-
(2004)
IEEE Security and Privacy
-
-
Potter, B.1
Hamilton, B.A.2
McGraw, G.3
-
193
-
-
48749099042
-
Development of a Software Security Assessment Instrument to Reduce Software Security Risk
-
Proceedings of the 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'01)
-
Gilliam, P. D. et al. (2001) Development of a Software Security Assessment Instrument to Reduce Software Security Risk, Proceedings of the 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'01).
-
(2001)
-
-
Gilliam, P.D.1
-
194
-
-
49249107627
-
Architectural Risk Analysis of Software Systems Based on Security Patterns
-
JULY-SEPTEMBER
-
Halkidis, S. T. (2008) Architectural Risk Analysis of Software Systems Based on Security Patterns, IEEE Transactions On Dependable And Secure Computing, VOL. 5, NO. 3, JULY-SEPTEMBER.
-
(2008)
IEEE Transactions On Dependable And Secure Computing
, vol.5
, Issue.3
-
-
Halkidis, S.T.1
-
195
-
-
84892081112
-
Network Mapper Tool for scanning network ports for security
-
Nmap
-
Nmap (2011) Network Mapper Tool for scanning network ports for security, http://nmap.org/.
-
(2011)
-
-
-
197
-
-
84898587672
-
APC Legendary Reliability Physical Security of Data Centers and network Rooms
-
Christopher, L. (2005) APC Legendary Reliability Physical Security of Data Centers and network Rooms. Fundamental Principles of Network Security, pp.4-10.
-
(2005)
Fundamental Principles of Network Security
, pp. 4-10
-
-
Christopher, L.1
-
198
-
-
0347542044
-
Introduction to Network security
-
Curtin, M. (1997) Introduction to Network security, http://www.interhack. net/pubs/network-security/.
-
(1997)
-
-
Curtin, M.1
-
199
-
-
84891967965
-
House of Lords Science and Technology Committee
-
House of Lords, August
-
House of Lords (2007) House of Lords Science and Technology Committee, Personal Internet Security, vol.1, August, pp.13-27. http://www. publications.parliament.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf. http://www.iss.net/documents/whitepapers/ISS_Preemptive_Host_Protection_ Whitepaper.pdf.
-
(2007)
Personal Internet Security
, vol.1
, pp. 13-27
-
-
-
201
-
-
84892109313
-
Internet Firewall and Network Security
-
New Riders Publishing
-
Karanjit, S. and Chris, H. (1994) Internet Firewall and Network Security. New Riders Publishing.
-
(1994)
-
-
Karanjit, S.1
Chris, H.2
-
202
-
-
77957814219
-
A Guide to Computer Network Security
-
Springer, London
-
Kizza, J. M. (2009) A Guide to Computer Network Security, Springer, London.
-
(2009)
-
-
Kizza, J.M.1
-
203
-
-
1542298711
-
Wireless Security
-
Merritt, M. and David, P. (2002) Wireless Security.
-
(2002)
-
-
Merritt, M.1
David, P.2
-
204
-
-
84892002596
-
The Future of Internet (2009)
-
Papadimitriou, D. et al. (2009) The Future of Internet (2009) http://www.future-internet.eu/fileadmin/documents/reports/Cross- ETPs_FI_Vision_ Document_v1_0.pdf.
-
(2009)
-
-
Papadimitriou, D.1
-
205
-
-
1642405101
-
Wireless security Model Threads Solutions
-
McGraw-Hill Telecom
-
Randall, N. K. and L., C., Panos (2002) Wireless security Model Threads Solutions. McGraw-Hill Telecom.
-
(2002)
-
-
Randall, N.K.1
Panos, L.C.2
-
206
-
-
11144331510
-
Incident Response: Computer Forensics Toolkit
-
Wiley, USA
-
Schweitzer, D. (2003) Incident Response: Computer Forensics Toolkit, Wiley, USA.
-
(2003)
-
-
Schweitzer, D.1
-
207
-
-
0003945978
-
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2/William Stallings
-
Harlow, Addison Wesley
-
Stallings, W. (1999) SNMP, SNMPv2, SNMPv3, and RMON 1 and 2/William Stallings. Harlow, Addison Wesley.
-
(1999)
-
-
Stallings, W.1
-
208
-
-
0003507850
-
Network Security Essentials
-
2nded. Pearson Education INC
-
Stallings, W. (2003) Network Security Essentials. 2nded. Pearson Education INC.
-
(2003)
-
-
Stallings, W.1
-
209
-
-
84892040866
-
Clusters and Security: Distributed Security for Distributed Systems
-
Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides
-
Pourzandi, M. et al. (2007) Clusters and Security: Distributed Security for Distributed Systems, Open Systems Laboratory-Ericsson Research, National Center for Supercomputing Applications (NCSA) Presentation Slides.
-
(2007)
-
-
Pourzandi, M.1
-
210
-
-
0010380353
-
Internet and intranet security
-
Artech House, Inc
-
Oppliger, R. (2002) Internet and intranet security, Artech House, Inc.
-
(2002)
-
-
Oppliger, R.1
-
211
-
-
0008390875
-
Hack attacks denied-a complete guide to network lockdown
-
John Wiley and Sons, Inc
-
Chirillo, J. (2001) Hack attacks denied-a complete guide to network lockdown, John Wiley and Sons, Inc.
-
(2001)
-
-
Chirillo, J.1
-
212
-
-
0003507850
-
Network security essentials-applications and standards
-
2nd edition, Pearson Education, Inc
-
Stallings, W. (2003) Network security essentials-applications and standards, 2nd edition, Pearson Education, Inc.
-
(2003)
-
-
Stallings, W.1
-
213
-
-
84892008340
-
Web services: mostly secured already, Slide presentation
-
Dick, K. (2008) Web services: mostly secured already, Slide presentation. http://www.webservicessummit.com/SDSIC/KSDSDSICSlides_files/frame.htm.
-
(2008)
-
-
Dick, K.1
-
214
-
-
33947392597
-
Designing an integrated architecture for network content security gateways
-
IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006
-
Lin, Y-D. et al. (2006) Designing an integrated architecture for network content security gateways, IEEE Computer, Special Issue on Grid Computing and Web Services, November 2006.
-
(2006)
-
-
Lin, Y.-D.1
-
215
-
-
84892054439
-
The Security of Web Services as Software, CrossTalk
-
September
-
Goertzel, K. M. (2007) The Security of Web Services as Software, CrossTalk, September, http://www.stsc.hill.af.mil/crossTalk/2007/09/0709Goertzel. html.
-
(2007)
-
-
Goertzel, K.M.1
-
216
-
-
65949084989
-
Web-Services Engineering: Promises and Challenges
-
ICSE'02, May 19-25, Orlando, Florida, USA
-
Aoyama, M. et al. (2002) Web-Services Engineering: Promises and Challenges, ICSE'02, May 19-25, Orlando, Florida, USA.
-
(2002)
-
-
Aoyama, M.1
-
217
-
-
33750108824
-
Audition of web services for testing conformance to open specified protocols
-
J. Stafford et al., eds, Springer, 2006
-
Bertolino, A. et al. (2006) Audition of web services for testing conformance to open specified protocols, J. Stafford et al., eds., Architecting systems with trustworthy components, Springer, 2006.
-
(2006)
Architecting systems with trustworthy components
-
-
Bertolino, A.1
-
218
-
-
84892001317
-
Cloud Expo Article, Cloud Computing: Understanding Infrastructure as a Service
-
January
-
Bias, R. (2009), Cloud Expo Article, Cloud Computing: Understanding Infrastructure as a Service, Cloud computing journal, http://cloudcomputing.sys-con.com/node/807481, January.
-
(2009)
Cloud computing journal
-
-
Bias, R.1
-
219
-
-
58549100358
-
A research manifesto for services science, Special Issue on Services Science
-
CACM, July 2006
-
Chesbrough, H., and Spohrer, J. (2006) A research manifesto for services science, Special Issue on Services Science, CACM, July 2006, Vol.49/No. 7.
-
(2006)
, vol.49
, Issue.7
-
-
Chesbrough, H.1
Spohrer, J.2
-
220
-
-
84892045672
-
Cobweb
-
Cobweb (2009) http://www.cobweb.com/.
-
(2009)
-
-
-
221
-
-
36749016304
-
Component contracts in service-oriented architectures
-
November 2007
-
Curbera, F. (2007) Component contracts in service-oriented architectures, Special Issue on Service-oriented Computing, IEEE Computer, V.40, No.11, November 2007.
-
(2007)
Special Issue on Service-oriented Computing, IEEE Computer
, vol.40
, Issue.11
-
-
Curbera, F.1
-
222
-
-
4644300495
-
Service-oriented architecture: concepts, technology, and design
-
Prentice Hall
-
Erl, T. (2005) Service-oriented architecture: concepts, technology, and design, Prentice Hall.
-
(2005)
-
-
Erl, T.1
-
223
-
-
84891982892
-
What are web services?
-
Special Issue, CACM, June, V46/N6. For Software Testing, International Journal of Computer Science and Information Security (IJCSIS)
-
Farrell, J., and Ferris, C. (2003), What are web services? Special Issue, CACM, June, V46/N6. For Software Testing, International Journal of Computer Science and Information Security (IJCSIS), Vol. 7, No. 3, 2010.
-
(2003)
, vol.7
, Issue.3
-
-
Farrell, J.1
Ferris, C.2
-
224
-
-
84892009533
-
Creating business value through flexible IT architecture, Special Issue on Service-oriented Computing
-
November 2007
-
Helbig, J. (2007) Creating business value through flexible IT architecture, Special Issue on Service-oriented Computing, IEEE Computer, V.40, No.11, November 2007.
-
(2007)
IEEE Computer
, vol.40
, Issue.11
-
-
Helbig, J.1
-
225
-
-
84892128755
-
Cloud computing world forum
-
IaaS
-
IaaS (2010) Cloud computing world forum, http://www.cloudwf.com/iaas.html.
-
(2010)
-
-
-
226
-
-
84891979110
-
Video whitepaper
-
IThound
-
IThound (2010) Video whitepaper http://images.vnunet.com/video_ WP/V4.htm.
-
(2010)
-
-
-
227
-
-
84892127084
-
Interoperable security service standards for web services
-
IT pro, IEEE CS Press, December
-
Lakshminarayanan, S. (2010) Interoperable security service standards for web services, IT pro, IEEE CS Press, December.
-
(2010)
-
-
Lakshminarayanan, S.1
-
228
-
-
84902323044
-
Realizing service-centric software systems
-
Special issue on SoC, IEEE Software, November/December 2007
-
Nano, O. and Zisman, A. (2007) Realizing service-centric software systems, Special issue on SoC, IEEE Software, November/December 2007.
-
(2007)
-
-
Nano, O.1
Zisman, A.2
-
229
-
-
69949114230
-
Computer in the cloud, technology review
-
Naone, E. (2007) Computer in the cloud, technology review, http://www.technologyreview.com/Infotech/19397/?a=f.
-
(2007)
-
-
Naone, E.1
-
230
-
-
84892101758
-
-
NIST
-
NIST (2009) http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.
-
(2009)
-
-
-
231
-
-
84891998831
-
Types of PaaS solutions
-
PaaS
-
PaaS (2010) Types of PaaS solutions http://www.salesforce.com/uk/paas/paassolutions/.
-
(2010)
-
-
-
232
-
-
36749060136
-
Service-oriented computing: state-of-the-art and research challenges, Special Issue on Service-oriented Computing
-
November 2007
-
Papazoglou, P. M. et al. (2007) Service-oriented computing: state-of-the-art and research challenges, Special Issue on Service-oriented Computing, IEEE Computer, V.40, No.11, November 2007.
-
(2007)
IEEE Computer
, vol.40
, Issue.11
-
-
Papazoglou, P.M.1
-
233
-
-
84932090691
-
Software components: guidelines and applications
-
Nova Publishers, NY
-
Ramachandran, M. (2008) Software components: guidelines and applications, Nova Publishers, NY.
-
(2008)
-
-
Ramachandran, M.1
-
234
-
-
84891977745
-
SaaS
-
SaaS
-
SaaS (2009) SaaS http://www.saas.co.uk/.
-
(2009)
-
-
-
235
-
-
84892122410
-
2020 Science Group: Toward 2020 science
-
Science Group, tech.report, Microsoft, 2006
-
Science Group (2006), 2020 Science Group: Toward 2020 science, tech.report, Microsoft, 2006; http://research.microsoft.com/towards2020 science/downloads/T2020S_Report.pdf.
-
(2006)
-
-
-
236
-
-
84891980214
-
Self-organization: paradigms and applications, engineering self-organizing systems: Nature-Inspired approaches to software engineering
-
Springer, 2004
-
Serugendo, G., et al. (2004) Self-organization: paradigms and applications, engineering self-organizing systems: Nature-Inspired approaches to software engineering, Springer, 2004.
-
(2004)
-
-
Serugendo, G.1
-
237
-
-
70449475268
-
A Flexible Business Process Customization Framework for SaaS
-
WASE International Conference on Information Engineering, July, China
-
Taiyuan, S. (2009) A Flexible Business Process Customization Framework for SaaS, WASE International Conference on Information Engineering, July, China.
-
(2009)
-
-
Taiyuan, S.1
-
238
-
-
70849101026
-
RESTful web services
-
Tyagi, S. (2006) RESTful web services, http://www.oracle.com/technetwork/articles/javase/index-137171.html.
-
(2006)
-
-
Tyagi, S.1
-
239
-
-
84892133310
-
A Model of Cloud-based Application Environment
-
Venkataraman, T. et al. (2010) A Model of Cloud-based Application Environment.
-
(2010)
-
-
Venkataraman, T.1
-
240
-
-
84892129078
-
-
Verizon, October
-
Verizon (2010), http://www.zdnet.co.uk/news/cloud/2010/10/08/the-cloudlessons- from-history-40090471/, October.
-
(2010)
-
-
-
242
-
-
84892018599
-
Microsoft Office as a Platform for Software + Services
-
Wilson, C., and Josephson, A. (2007) Microsoft Office as a Platform for Software + Services, The Architecture Journal, No.13, www. architecturejournal.net.
-
(2007)
The Architecture Journal
, Issue.13
-
-
Wilson, C.1
Josephson, A.2
-
243
-
-
77952710722
-
Scientific Cloud Computing: Early Definition and Experience
-
Wang, L., and Laszewski, V. G (2008) Scientific Cloud Computing: Early Definition and Experience, http://cyberaide.googlecode.com/svn/trunk/papers/08-cloud/vonLaszewski-08-cloud.pdf.
-
(2008)
-
-
Wang, L.1
Laszewski, V.G.2
-
244
-
-
4243114029
-
Web-service componentization
-
CACM, October Vol 46/N 10
-
Yang, J. (2003) Web-service componentization, CACM, October Vol 46/N 10.
-
(2003)
-
-
Yang, J.1
-
245
-
-
70449464802
-
CCOA: Cloud Computing Open Architecture
-
IEEE International Conference on Web Services
-
Zhang, L-J., and Zhou, Q (2009) CCOA: Cloud Computing Open Architecture, IEEE International Conference on Web Services.
-
(2009)
-
-
Zhang, L.-J.1
Zhou, Q.2
-
246
-
-
84892081501
-
Architecture-Centered ERP Systems in the Manufacturing Domain
-
Nivot, USA
-
Alleman, G. B. (2002) Architecture-Centered ERP Systems in the Manufacturing Domain, Nivot, USA.
-
(2002)
-
-
Alleman, G.B.1
-
247
-
-
84892034895
-
-
Amr
-
Amr (2008) www.amrresearch.com.
-
(2008)
-
-
-
248
-
-
84892042304
-
Implementation issues in ERP
-
1st Intl. Conference on Systems Thinking in Management
-
Appuswamy, R. (2000) Implementation issues in ERP, 1st Intl. Conference on Systems Thinking in Management.
-
(2000)
-
-
Appuswamy, R.1
-
249
-
-
0007308675
-
The Current state of CBSE
-
September/October 1998
-
Brown, A. W. and Wallnau, K. C. (1998) The Current state of CBSE, September/October 1998.
-
(1998)
-
-
Brown, A.W.1
Wallnau, K.C.2
-
250
-
-
0003920373
-
UML Components
-
Addison Wesley
-
Cheesman, J. and Daniels, J. (2000) UML Components, Addison Wesley.
-
(2000)
-
-
Cheesman, J.1
Daniels, J.2
-
251
-
-
84892016464
-
Component-Based Software Development Lifecycles
-
Karlstad University, Institution for Information technology, Sweden
-
Christiansson, B. and Jacobsson, L. Component-Based Software Development Lifecycles, Karlstad University, Institution for Information technology, Sweden, 1999.
-
(1999)
-
-
Christiansson, B.1
Jacobsson, L.2
-
252
-
-
0003854752
-
Objects, components and frameworks with UML
-
Addison Wesley
-
D'Souza and Wills (1999) Objects, components and frameworks with UML, Addison Wesley.
-
(1999)
-
-
D'Souza1
Wills2
-
253
-
-
0032112063
-
Putting the enterprise into the enterprise system
-
July-August
-
Davenport, T. H. (1998) Putting the enterprise into the enterprise system, Harvard Business Review, pp. 121-131, July-August.
-
(1998)
Harvard Business Review
, pp. 121-131
-
-
Davenport, T.H.1
-
254
-
-
84892079462
-
A Three-tier Software Architecture for Manufacturing Activity Control in ERP Concept
-
International Conference on Computer Systems and Technologies- CompSysTech' 2005
-
Dumbrava, S., Panescu, D. and Costin, M. (2005) A Three-tier Software Architecture for Manufacturing Activity Control in ERP Concept, International Conference on Computer Systems and Technologies- CompSysTech' 2005.
-
(2005)
-
-
Dumbrava, S.1
Panescu, D.2
Costin, M.3
-
255
-
-
0003923066
-
Software Metrics: Establishing a Companywide program
-
Prentice Hall
-
Grady, R. and Caswell, D. (1999) Software Metrics: Establishing a Companywide program, Prentice Hall.
-
(1999)
-
-
Grady, R.1
Caswell, D.2
-
256
-
-
0032628083
-
A Critical success factor model for ERP implementation
-
May/June
-
Holland, C. P. and Light, B. (1999) A Critical success factor model for ERP implementation, IEEE Software, pp. 30-36, May/June.
-
(1999)
IEEE Software
, pp. 30-36
-
-
Holland, C.P.1
Light, B.2
-
257
-
-
0004010083
-
Managing the software process
-
Addison-Wesley
-
Humphrey, W. (1989) Managing the software process, Addison-Wesley.
-
(1989)
-
-
Humphrey, W.1
-
258
-
-
84892125159
-
A component-based design approach to ERP design in a distributed object environment
-
IACIS 01
-
Kim, B-O., Lockwood, D. (2001) A component-based design approach to ERP design in a distributed object environment, IACIS 01.
-
(2001)
-
-
Kim, B.-O.1
Lockwood, D.2
-
259
-
-
70849122468
-
Building a Service-Oriented ERP from an Open Source Software
-
Fourth International Conference on Software Engineering Advances, IEEE CS Press
-
Kouamou, G. E. (2009) Building a Service-Oriented ERP from an Open Source Software, Fourth International Conference on Software Engineering Advances, IEEE CS Press.
-
(2009)
-
-
Kouamou, G.E.1
-
260
-
-
0003955218
-
Corporate Information Systems Management: Text and Cases
-
5th edition, McGraw- Hill
-
Applegate, L.M., McFarlan, F. W. and McKenney, J. L. (1999) Corporate Information Systems Management: Text and Cases, 5th edition, McGraw- Hill.
-
(1999)
-
-
Applegate, L.M.1
McFarlan, F.W.2
McKenney, J.L.3
-
261
-
-
84892127507
-
Component-based ERP systems
-
Master thesis, Mid Sweden University, Sundsvall
-
Malm, B. (2001) Component-based ERP systems, Master thesis, Mid Sweden University, Sundsvall.
-
(2001)
-
-
Malm, B.1
-
262
-
-
55949120171
-
Requirements Engineering Method and Maturity Model for ERP Projects
-
Intl. J. of Enterprise Information Systems (IJEIS), IGI Publishers, Oct-Dec
-
Parthasarathy, S. and Ramachandran, M. (2008) Requirements Engineering Method and Maturity Model for ERP Projects, Intl. J. of Enterprise Information Systems (IJEIS), IGI Publishers, Vol. 4, No. 4, Oct-Dec.
-
(2008)
, vol.4
, Issue.4
-
-
Parthasarathy, S.1
Ramachandran, M.2
-
263
-
-
84932090691
-
Software components: guidelines and applications
-
Nova Publishers, NY
-
Ramachandran, M. (2008) Software components: guidelines and applications, Nova Publishers, NY.
-
(2008)
-
-
Ramachandran, M.1
-
266
-
-
0004142101
-
Component Software
-
Addison Wesley
-
Szyperski, C. (1998) Component Software, Addison Wesley
-
(1998)
-
-
Szyperski, C.1
|