Notes
1. Goertzel, K., et al., “Enhancing the Development Life Cycle to Produce Secure Software,” Version 2.0. Rome, New York: United States Department of Defense Data and Analysis Center for Software, October 2008.
2. Allen, E. “Designing Extensible Applications,” in Diagnosing Java Code. IBM DeveloperWorks, 2001.
3. National Institute of Standards and Technology (NIST), 1997, “Metrology for Information Technology (IT),” www.nist.gov/itl/lab/nistirs/ir6025.htm.
4. Oladimeji, E. A., and Chung, L., “Analyzing Security Interoperability during Component Integration,” in Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (July 10–12, 2006). ICIS-COMSAR, IEEE Computer Society, Washington, DC, 121–129.
5. Parnas, D. L., “On the Criteria to Be Used in Decomposing Systems into Modules.,” Communications of the ACM, 15(12):1053–8, December 1972.
6. Mooney, J. D., “Bringing Portability to the Software Process,” West Virginia University, Department of Statistics and Computer Science, (www.cs.wvu.edu/~jdm/research/portability/reports/TR_97-1), 1997.
7. DOD Guide for Achieving Reliability, Availability, and Maintainability, August 3, 2005.
8. Information Assurance Technology Analysis Center (IATAC), Data and Analysis Center for Software (DACS), Software Security Assurance, State-of-the-Art Report (SOAR), July 31, 2007.
9. Mark Weiser, “Hot ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access