Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Cecilia Albert
October 2014 - Technical Note A Method for Aligning Acquisition Strategies and Software Architectures

Topics: Acquisition Support

Authors: Lisa Brownsword, Cecilia Albert, David J. Carney, Patrick R. Place

This report describes the third year of the SEI's research into aligning acquisition strategies and software architecture.

February 2014 - Technical Note Results in Relating Quality Attributes to Acquisition Strategies

Topics: Acquisition Support

Authors: Lisa Brownsword, Cecilia Albert, David J. Carney, Patrick R. Place

This technical note describes the second phase of a study that focuses on the relationships between software architecture and acquisition strategy -- more specifically, their alignment or misalignment.

February 2011 - Special Report A Framework for Evaluating Common Operating Environments: Piloting, Lessons Learned, and Opportunities

Topics: Acquisition Support

Authors: Cecilia Albert, Steve Rosemergy

This report explores the interdependencies among common language, business goals, and soft-ware architecture as the basis for a common framework for conducting evaluations of software technical solutions.

December 2010 - Technical Report Beyond Technology Readiness Levels for Software: U.S. Army Workshop Report

Topics: Acquisition Support

Authors: Stephen Blanchette, Jr., Cecilia Albert, Suzanne Garcia-Miller

This report synthesizes presentations, discussions, and outcomes from the "Beyond Technology Readiness Levels for Software" workshop from August 2010.

January 2005 - Handbook OCTAVE-S Implementation Guide, Version 1

Topics: Cyber Risk and Resilience Management

Authors: Cecilia Albert, Audrey J. Dorofee, James F. Stevens, Carol Woody

In this 2005 handbook, the authors provide detailed guidelines for conducting an OCTAVE-S evaluation.

January 2003 - Presentation They Keep Moving the Cheese

Topics: Acquisition Support

Authors: Cecilia Albert, Lisa Brownsword

“They Keep Moving the Cheese: A Framework for the Evolutionary Acquisition of Large Software Intensive Systems” was delivered by Cecilia Albert and Lisa Brownsword in 2003.

November 2002 - Technical Report Evolutionary Process for Integrating COTS-Based Systems (EPIC) Building, Fielding, and Supporting Commercial-off-the-Shelf (COTS) Based Solutions

Topics: Acquisition Support

Authors: Cecilia Albert, Lisa Brownsword, David Bentley (U.S. Air Force), Thomas Bono (MITRE), Edwin J. Morris, Deborah Pruitt (MITRE)

This 2002 document is the first release of a full description of the EPIC framework along with its activities and artifacts.

July 2002 - Technical Report Evolutionary Process for Integrating COTS-Based Systems (EPIC): An Overview

Authors: Cecilia Albert, Lisa Brownsword, David Bentley (U.S. Air Force), Thomas Bono (MITRE), Edwin J. Morris, Deborah Pruitt (MITRE)

This document is the first release of an overview of the EPIC framework along with its activities and artifacts.

December 2001 - Technical Report OCTAVE Criteria, Version 2.0

Topics: Cyber Risk and Resilience Management, Cybersecurity Engineering

Authors: Cecilia Albert, Audrey J. Dorofee

This 2001 report defines a general approach for evaluating and managing information security risks.

October 2001 - Technical Report OCTAVE Catalog of Practices, Version 2.0

Topics: Cyber Risk and Resilience Management

Authors: Cecilia Albert, Audrey J. Dorofee, Julia H. Allen

In this report, the authors describe OCTAVE practices, which enable organizations to identify risks and mitigate them.

May 2001 - Special Report Spiral Development and Evolutionary Acquisition

Topics: Acquisition Support

Authors: Fred Hansen, Elliot Axelband, Lisa Brownsword, Eileen C. Forrester, John T. Foreman, Cecilia Albert

DoD Instruction 5000.2 introduced innovations throughout the acquisition cycle. To address this, a workshop was held September 2000. This 2001 report summarizes the workshop and presents its recommendations.

February 1999 - Security Improvement Module Securing Desktop Workstations

Authors: Derek Simmel, Gary Ford, Julia H. Allen, Cecilia Albert, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda

The practices recommended in this 1999 report are designed to help you configure and deploy networked workstations that satisfy your organization‰s security requirements. The practices may also be useful in examining the configuration of previously deployed workstations.

February 1999 - Security Improvement Module Responding to Intrusions

Authors: Klaus-Peter Kossakowski, William R. Wilson, Julia H. Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda

This 1999 report is one of a series of SEI publications that are intended to provide practical guidance to help organizations improve the security of their networked computer systems. This report is intended for system and network administrators, managers of information systems, and security personnel responsible for networked information resources.

February 1999 - Security Improvement Module Securing Network Servers (1999)

Authors: Gary Ford, Dwayne Vermeulen, Julia H. Allen, Cecilia Albert, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda, Klaus-Peter Kossakowski, Derek Simmel

The practices recommended in this 1999 report are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.

June 1998 - Security Improvement Module Preparing to Detect Signs of Intrusion

Authors: John Kochmar, Julia H. Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Suresh Konda, Klaus-Peter Kossakowski, Derek Simmel

The practices contained in this 1998 report identify advance preparations you must make to enable you to obtain evidence of an intrusion or an intrusion attempt.

August 1997 - Handbook Software Acquisition Risk Management Key Process Area (KPA) Guidebook Version 1.0

Authors: Brian P. Gallagher, Cecilia Albert, Rick Barbour

This 1997 guidebook provides guidelines for implementing a software acquisition risk management program that satisfies the goals of the ARM KPA of the SA-CMM.