A TAXONOMY OF E-COMMERCE RISKS AND FAILURES

A Thesis Submitted to the Department of Computer Science at Florida Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science

[1]  Wenliang Du,et al.  Categorization of Software Errors that led to Security Breaches , 1998 .

[2]  N. D. Jayaram,et al.  Network security-a taxonomic view , 1997 .

[3]  Daoud Aït-Kadi,et al.  An Integrative Functional Approach for Automated Manufacturing Systems Modeling , 1998, Integr. Comput. Aided Eng..

[4]  Michael C. Signor The Failure Analysis Matrix: A Usable Model for Ranking Solutions to Failures in Information Systems , 2000 .

[5]  Tor Stålhane,et al.  Modification of safety critical systems: an assessment of three approaches , 1998, Microprocess. Microsystems.

[6]  Lawrence Chung,et al.  Metrics for Software Adaptability , 2001 .

[7]  M. P. Ristenbatt Methodology for network communication vulnerability analysis , 1988, MILCOM 88, 21st Century Military Communications - What's Possible?'. Conference record. Military Communications Conference.

[8]  Eugene H. Spafford,et al.  Software vulnerability analysis , 1998 .

[9]  Richard R. Linde,et al.  Operating system penetration , 1975, AFIPS '75.

[10]  Thomas Maier FMEA and FTA to Support Safe Design of Embedded Software in Safety-Critical Systems , 1997 .

[11]  Lincoln D. Stein Web Security: A Step-by-Step Reference Guide , 1998 .

[12]  Dale Karolak,et al.  Software engineering risk management , 1995 .

[13]  Matt Bishop,et al.  A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .

[14]  Leonard J. Bass,et al.  Quality Attribute Design Primitives and the Attribute Driven Design Method , 2001, PFE.

[15]  Hal Shubin,et al.  Navigation in Web applications , 1997, INTR.

[16]  Rogério de Lemos,et al.  Analyzing Safety Requirements for Process-Control Systems , 1995, IEEE Softw..

[17]  Mario R. Barbacci,et al.  Steps in an Architecture Tradeoff Analysis Method: Quality Attribute Models and Analysis , 1998 .

[18]  Barry Boehm,et al.  Characteristics of software quality , 1978 .

[19]  李幼升,et al.  Ph , 1989 .

[20]  Robyn R. Lutz Bi-directional Analysis for Certification of Safety-Critical Software , 1999 .

[21]  Brian Marick,et al.  A survey of software fault surveys , 1990 .

[22]  James Bach,et al.  Heuristic Risk-Based Testing , 1999 .

[23]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[24]  C. Richard Attanasio,et al.  Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..

[25]  James A. Davis,et al.  The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks , 2001 .

[26]  Rogério de Lemos,et al.  On the safety analysis of requirements specifications for safety-critical software , 1995 .

[27]  D. L. Lough,et al.  A taxonomy of computer attacks with applications to wireless networks , 2001 .

[28]  Parker Computer Crime: Criminal Justice Resource Manual (2nd ed.) , 1989 .

[29]  Jr. D W Straub,et al.  Deviancy by bits and bytes: computer abusers and control measures , 1984 .

[30]  James Carlin Becker,et al.  A PRACTICAL APPROACH TO FAILURE MODE, EFFECTS AND CRITICALITY ANALYSIS (FMECA) FOR COMPUTING SYSTEMS , 1996 .

[31]  John A. McDermid,et al.  An integrated tool set for software safety analysis , 1993, J. Syst. Softw..

[32]  Ståle Amland Hulda Garborgsv Risk Based Testing and Metrics Risk Analysis Fundamentals and Metrics for software testing including a Financial Application case study , 2002 .

[33]  P. L. Goddard Validating the safety of embedded real-time control systems using FMEA , 1993, Annual Reliability and Maintainability Symposium 1993 Proceedings.

[34]  John Dilley,et al.  Known HTTP Proxy/Caching Problems , 2001, RFC.

[35]  Michael J. Flynn,et al.  Very high-speed computing systems , 1966 .

[36]  Kim H. Pries Failure Mode & Effects Analysis in Software Development , 1998 .

[37]  Donald J. Reifer,et al.  Software Failure Modes and Effects Analysis , 1979, IEEE Transactions on Reliability.

[38]  Erland Jonsson,et al.  How to systematically classify computer security intrusions , 1997, S&P 1997.

[39]  Roger Shaw Safety and Reliability of Software Based Systems , 1997, Springer London.

[40]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[41]  Michael Rossi,et al.  Failure Mode, Effects, and Criticality Analysis (FMECA) , 1993 .

[42]  Gregg C. Vanderheiden,et al.  Web content accessibility guidelines 1.0 , 2001, INTR.

[43]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[44]  N. Banerjee Utilization Of FMEA Concept In SoftwareLifecycle Management , 1970 .

[45]  Boris Beizer,et al.  Software Testing Techniques , 1983 .