![]() McGraw, G., Chess, B., Migues, S.: Building Security In Maturity Model (BSIMM 3) (2011)ĭoyle, A.C.: Memoirs of Sherlock Holmes, ![]() Miller, B., Fredriksen, L., So, B.: An empirical study of the reliability of unix utilities. ![]() In: Proceedings of Third International Conference on Availability, Security, and Reliability (ARES 2008), pp. Jensen, J.: A Novel Testbed for Detection of Malicious Software Functionality. McGraw, G., Steven, J.: Software security: Comparing Apples, Oranges, and Aardvarks (or, All Static Analysis Tools Are Not Created Equal) (2011) In: Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA 2006, pp. Kongsli, V.: Towards agile security in web applications. Poppendieck, M., Morsicato, R.: XP in a Safety-Critical Environment. In: Proceedings of Hawaii International Conference on System Sciences (2005) Siponen, M., Baskerville, R., Kuivalainen, T.: Integrating security into agile development methods. In: Proceedings of New Security Paradigms Workshop, Nova Scotia, Canada (2004) Springer, Heidelberg (2004)īeznosov, K., Kruchten, P.: Towards agile security assurance. Wäyrynen, J., Bodén, M., Boström, G.: Security Engineering and eXtreme Programming: An Impossible Marriage? In: Zannier, C., Erdogmus, H., Lindstrom, L. In: Proceedings of the First ACM Workshop on Business Driven Security Engineering, BizSec (2003) In: Proceedings of the International Workshop on Time-Constrained Requirements Engineering (TCRE 2002) (2002)īeznosov, K.: eXtreme Security Engineering: On Employing XP Practices to Achieve ”Good Enough Security” without Defining It. ![]() ISO/IEC 15408-1: Evaluation criteria for it security part 1: Introduction and general model (2005)Įberlein, A., do Prado Leite, J.C.S.: Agile requirements definition: A view from requirements engineering. ![]() Ozment, A., Schechter, S.E.: Milk or wine: does software security improve with age? In: Proceedings of the 15th Conference on USENIX Security Symposium, USENIX-SS 2006, vol. 15. NVD: National Vulnerability Database Home, Ĭlemens, S.L.: Notes on ’innocents abroad’: Paragraph 20 (2010) (There are three kinds of lies: lies, damned lies, and statistics - Attributed to Disraeli), īrooks, F.P.: The Mythical Man-Month. CVE: Common Vulnerabilities and Exposures (CVE), ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |