Notes

1. Goertzel, K., et al., “Enhancing the Development Life Cycle to Produce Secure Software,” Version 2.0. Rome, New York: United States Department of Defense Data and Analysis Center for Software, October 2008.

2. Allen, E. “Designing Extensible Applications,” in Diagnosing Java Code. IBM DeveloperWorks, 2001.

3. National Institute of Standards and Technology (NIST), 1997, “Metrology for Information Technology (IT),” www.nist.gov/itl/lab/nistirs/ir6025.htm.

4. Oladimeji, E. A., and Chung, L., “Analyzing Security Interoperability during Component Integration,” in Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (July 10–12, 2006). ICIS-COMSAR, IEEE Computer Society, Washington, DC, 121–129.

5. Parnas, D. L., “On the Criteria to Be Used in Decomposing Systems into Modules.,” Communications of the ACM, 15(12):1053–8, December 1972.

6. Mooney, J. D., “Bringing Portability to the Software Process,” West Virginia University, Department of Statistics and Computer Science, (www.cs.wvu.edu/~jdm/research/portability/reports/TR_97-1), 1997.

7. DOD Guide for Achieving Reliability, Availability, and Maintainability, August 3, 2005.

8. Information Assurance Technology Analysis Center (IATAC), Data and Analysis Center for Software (DACS), Software Security Assurance, State-of-the-Art Report (SOAR), July 31, 2007.

9. Mark Weiser, “Hot ...

Get Web Commerce Security Design and Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.