|
Page Content
- Provisional Harmonised Criteria, version 1.2, Information Technology Security Evaluation Criteria (ITSEC), Cheltenham, UK, June 1991
- ISO/IEC 15408:1999, Common Criteria for Information Technology Security Evaluation, version 2.1, International Organization for Standardization, Geneva, 1999
- S. Robertson and J. Robertson, Mastering the Requirements Process, Addison-Wesley, Reading, Mass., 1999
- J.M. Spivey, The Z Notation: A Reference Manual, 2nd ed., Prentice-Hall, Upper Saddle River, N.J., 1992
- CESG Computer Security Manual "F": A Formal Development Method for High Assurance Systems, Communications Electronics Security Group, Cheltenham, UK, 1995
- A. Hall and R. Chapman, Correctness by Construction: Developing a Commercial Secure System , IEEE Software, January/February 2002, http://computer.org/publications/dlib
- D. Evans and D. Larochelle, Improving Security Using Extensible Lightweight Static Analysis, IEEE Software, January/February 2002, http://computer.org/publications/dlib
- S.L. Pfleeger and L.Hatton, Investigating the Influence of Formal Methods, Computer, vol. 30, n. 2, Feb. 1997
- DO-178B, Software Considerations in Airborne Systems and Equipment Certification, Radio Technical Commission for Areonautics (RTCA), December 1, 1992, http://www.rtca.org
- Leslie A. (Schad) Johnson, DO-178B, Software Considerations in Airborne Systems and Equipment Certification, http://www.stsc.hill.af.mil/crosstalk/1998/oct/schad.asp
- Software Productivity Consortium, RTCA DO-178B, http://www.software.org/quagmire/descriptions/rtcado-178b.asp
- Carnegie Mellon University - Electrical and Computer Engineering Department, Contents: Topics in Dependable Embedded Systems, http://www-2.cs.cmu.edu/~koopman/des_s99/contents.html
- Ian Sommerville, Dependability, http://www.comp.lancs.ac.uk/computing/resources/SE6/Slides/PDF/ch16.pdf
- McGraw Gary, John Viega, Selecting technologies for building secure software, Part 1, http://www-106.ibm.com/developerworks/security/library/s-build.html?dwzone=security
- Gary McGraw, John Viega, Making software behave, http://www-106.ibm.com/developerworks/security/library/behave.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Assuring your software is secure, http://www-106.ibm.com/developerworks/security/library/assurance.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Everything to hide, http://www-106.ibm.com/developerworks/security/library/everything.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Cryptography essentials, http://www-106.ibm.com/developerworks/security/library/hashing/index.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Learning the basics of buffer overflows, http://www-106.ibm.com/developerworks/security/library/overflows/index.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Preventing buffer overflows, http://www-106.ibm.com/developerworks/security/library/buffer-defend.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Brass tacks and smash attacks, http://www-106.ibm.com/developerworks/security/library/smash.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Security by obscurity, http://www-106.ibm.com/developerworks/security/library/s-obs.html?dwzone=security
- Gary McGraw, John Viega, Make your software behave: Tried and true encryption, http://www-106.ibm.com/developerworks/security/library/tried/index.html?dwzone=security
- Gary McGraw, John Viega, Software security principles: Part 1, http://www-106.ibm.com/developerworks/security/library/s-link.html?dwzone=security
- Gary McGraw, John Viega, Software security principles: Part 2: Defense in depth and secure failure, http://www-106.ibm.com/developerworks/security/library/s-fail.html?dwzone=security
- Gary McGraw, John Viega, Software security principles: Part 3: Controlling access: Least privilege and compartmentalization, http://www-106.ibm.com/developerworks/security/library/s-priv.html?dwzone=security
- Gary McGraw, John Viega, Keep it simple; keep it private, http://www-106.ibm.com/developerworks/security/library/s-simp.html?dwzone=security
- Gary McGraw, John Viega, Software security principles: Part 5: On keeping secrets, trusting others, and following the crowd, http://www-106.ibm.com/developerworks/security/library/s-princ5.html?dwzone=security
[ Table of Contents ] | |
|
|
|
|