Agile Security Using an Incremental Security Architecture
暂无分享,去创建一个
[1] Kent L. Beck,et al. Extreme programming explained - embrace change , 1990 .
[2] Jim Shore. Continuous design , 2004, IEEE Software.
[3] O. Murru,et al. Assessing XP at a European Internet Company , 2003, IEEE Softw..
[4] Peter Amey,et al. Static verification and extreme programming , 2004 .
[5] Darren Dalcher,et al. Choosing a development life cycle : Comparing project and product measures , 2004 .
[6] Richard F. Paige,et al. Towards agile re-engineering of dependable grid applications , 2004 .
[7] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[8] Ravi S. Sandhu. Good-Enough Security: Toward a Pragmatic Business-Driven Discipline , 2003, IEEE Internet Comput..
[9] Konstantin Beznosov,et al. Extreme Security Engineering: On Employing XP Practices to Achieve , 2003 .
[10] Gustav Boström,et al. Security Engineering and eXtreme Programming: An Impossible Marriage? , 2004, XP/Agile Universe.
[11] Martin Fowler,et al. Refactoring - Improving the Design of Existing Code , 1999, Addison Wesley object technology series.
[12] Philippe Kruchten,et al. Towards agile security assurance , 2004, NSPW '04.