A TAXONOMY OF E-COMMERCE RISKS AND FAILURES
暂无分享,去创建一个
[1] Wenliang Du,et al. Categorization of Software Errors that led to Security Breaches , 1998 .
[2] N. D. Jayaram,et al. Network security-a taxonomic view , 1997 .
[3] Daoud Aït-Kadi,et al. An Integrative Functional Approach for Automated Manufacturing Systems Modeling , 1998, Integr. Comput. Aided Eng..
[4] Michael C. Signor. The Failure Analysis Matrix: A Usable Model for Ranking Solutions to Failures in Information Systems , 2000 .
[5] Tor Stålhane,et al. Modification of safety critical systems: an assessment of three approaches , 1998, Microprocess. Microsystems.
[6] Lawrence Chung,et al. Metrics for Software Adaptability , 2001 .
[7] M. P. Ristenbatt. Methodology for network communication vulnerability analysis , 1988, MILCOM 88, 21st Century Military Communications - What's Possible?'. Conference record. Military Communications Conference.
[8] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[9] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[10] Thomas Maier. FMEA and FTA to Support Safe Design of Embedded Software in Safety-Critical Systems , 1997 .
[11] Lincoln D. Stein. Web Security: A Step-by-Step Reference Guide , 1998 .
[12] Dale Karolak,et al. Software engineering risk management , 1995 .
[13] Matt Bishop,et al. A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .
[14] Leonard J. Bass,et al. Quality Attribute Design Primitives and the Attribute Driven Design Method , 2001, PFE.
[15] Hal Shubin,et al. Navigation in Web applications , 1997, INTR.
[16] Rogério de Lemos,et al. Analyzing Safety Requirements for Process-Control Systems , 1995, IEEE Softw..
[17] Mario R. Barbacci,et al. Steps in an Architecture Tradeoff Analysis Method: Quality Attribute Models and Analysis , 1998 .
[18] Barry Boehm,et al. Characteristics of software quality , 1978 .
[20] Robyn R. Lutz. Bi-directional Analysis for Certification of Safety-Critical Software , 1999 .
[21] Brian Marick,et al. A survey of software fault surveys , 1990 .
[22] James Bach,et al. Heuristic Risk-Based Testing , 1999 .
[23] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[24] C. Richard Attanasio,et al. Penetrating an Operating System: A Study of VM/370 Integrity , 1976, IBM Syst. J..
[25] James A. Davis,et al. The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks , 2001 .
[26] Rogério de Lemos,et al. On the safety analysis of requirements specifications for safety-critical software , 1995 .
[27] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[28] Parker. Computer Crime: Criminal Justice Resource Manual (2nd ed.) , 1989 .
[29] Jr. D W Straub,et al. Deviancy by bits and bytes: computer abusers and control measures , 1984 .
[30] James Carlin Becker,et al. A PRACTICAL APPROACH TO FAILURE MODE, EFFECTS AND CRITICALITY ANALYSIS (FMECA) FOR COMPUTING SYSTEMS , 1996 .
[31] John A. McDermid,et al. An integrated tool set for software safety analysis , 1993, J. Syst. Softw..
[32] Ståle Amland Hulda Garborgsv. Risk Based Testing and Metrics Risk Analysis Fundamentals and Metrics for software testing including a Financial Application case study , 2002 .
[33] P. L. Goddard. Validating the safety of embedded real-time control systems using FMEA , 1993, Annual Reliability and Maintainability Symposium 1993 Proceedings.
[34] John Dilley,et al. Known HTTP Proxy/Caching Problems , 2001, RFC.
[35] Michael J. Flynn,et al. Very high-speed computing systems , 1966 .
[36] Kim H. Pries. Failure Mode & Effects Analysis in Software Development , 1998 .
[37] Donald J. Reifer,et al. Software Failure Modes and Effects Analysis , 1979, IEEE Transactions on Reliability.
[38] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, S&P 1997.
[39] Roger Shaw. Safety and Reliability of Software Based Systems , 1997, Springer London.
[40] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[41] Michael Rossi,et al. Failure Mode, Effects, and Criticality Analysis (FMECA) , 1993 .
[42] Gregg C. Vanderheiden,et al. Web content accessibility guidelines 1.0 , 2001, INTR.
[43] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[44] N. Banerjee. Utilization Of FMEA Concept In SoftwareLifecycle Management , 1970 .
[45] Boris Beizer,et al. Software Testing Techniques , 1983 .