Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems | NIST
暂无分享,去创建一个
[1] Cormac Herley,et al. Unfalsifiability of security claims , 2016, Proceedings of the National Academy of Sciences.
[2] Nancy R. Mead,et al. Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum , 2010 .
[3] William C. Barker. Guideline for Identifying an Information System as a National Security System , 2003 .
[4] NetComm Limited,et al. IEEEInstitute of Electrical and Electronic Engineers) , 2010 .
[5] Mark W. Maier. Architecting Principles for Systems‐of‐Systems , 1996 .
[6] Patricia R. Toth,et al. Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans , 2008 .
[7] Joint Task Force Transformation Initiative,et al. Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .
[8] Philip Alan Myers. Subversion : the neglected aspect of computer security. , 1980 .
[9] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[10] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[11] Azad M. Madni,et al. Towards a Conceptual Framework for Resilience Engineering , 2009, IEEE Systems Journal.
[12] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[13] Daniel F. Sterne,et al. On the buzzword 'security policy' , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.