Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Robert J. Ellison
August 2014 - Special Report Assuring Software Reliability

Topics: Acquisition Support

Authors: Robert J. Ellison

This report describes ways to incorporate the analysis of the potential impact of software failures--regardless of their cause--into development and acquisition practices through the use of software assurance.

April 2014 - Podcast Best Practices for Trust in the Wireless Emergency Alerts Service

Topics: Pervasive Mobile Computing

Authors: Robert Ellison, Carol Woody, Suzanne Miller

In this podcast, CERT researchers Robert Ellison and Carol Woody discuss research aimed at increasing alert originators' trust in the WEA service and the public's trust in the alerts that they receive.

February 2014 - Special Report Maximizing Trust in the Wireless Emergency Alerts (WEA) Service

Topics: Measurement and Analysis

Authors: Carol Woody, Robert J. Ellison

This report presents recommendations for stakeholders of the Wireless Emergency Alerts (WEA) service that resulted from the development of two trust models, focusing on how to increase both alert originators’ and the public’s trust in WEA.

February 2014 - Special Report Best Practices in Wireless Emergency Alerts

Topics: Cyber Risk and Resilience Management

Authors: John McGregor, Joseph P. Elm, Elizabeth Trocki Stark (SRA International, Inc.), Jennifer Lavan (SRA International, Inc.), Rita C. Creel, Christopher J. Alberts, Carol Woody, Robert J. Ellison, Tamara Marshall-Keim

This report presents four best practices for the Wireless Emergency Alerts (WEA) service, including implementing WEA in a local jurisdiction, training emergency staff in using WEA, cross-jurisdictional governance of WEA, and cybersecurity risk management.

August 2013 - White Paper Security and Project Management

Topics: Cybersecurity Engineering, Software Assurance

Authors: Robert J. Ellison

In this paper, Robert Ellison explains what project managers should consider because they relate to security needs.

July 2013 - White Paper Trustworthy Composition: The System Is Not Always the Sum of Its Parts

Topics: Cybersecurity Engineering, Software Assurance

Authors: Robert J. Ellison

In this paper, Robert Ellison surveys several profound technical problems faced by practitioners assembling and integrating secure and survivable systems.

July 2013 - White Paper Improving Software Assurance

Topics: Cybersecurity Engineering, Software Assurance

Authors: Carol Woody, Robert J. Ellison

In this paper, the authors discuss what practitioners should know about software assurance, where to look, what to look for, and how to demonstrate improvement.

July 2013 - White Paper Scale: System Development Challenges

Authors: Carol Woody, Robert J. Ellison

In this paper, the authors describe software assurance challenges inherent in networked systems development and propose a solution.

July 2013 - White Paper System-of-Systems Influences on Acquisition Strategy Development

Topics: Acquisition Support, Cybersecurity Engineering, Software Assurance

Authors: Rita C. Creel, Robert J. Ellison

In this paper, the authors discuss significant new sources of risk and recommend ways to address them.

July 2013 - White Paper Supply-Chain Risk Management: Incorporating Security into Software Development

Topics: Cybersecurity Engineering, Software Assurance

Authors: Carol Woody, Robert J. Ellison

In this paper, the authors describe practices that address defects and mechanisms for introducing these practices into the acquisition lifecycle.

May 2013 - White Paper A Systemic Approach for Assessing Software Supply-Chain Risk

Topics: Acquisition Support, Cybersecurity Engineering, Software Assurance

Authors: Audrey J. Dorofee, Carol Woody, Christopher J. Alberts, Rita C. Creel, Robert J. Ellison

In this paper, the authors highlight the approach being implemented by SEI researchers and provides a summary of the status of this work.

May 2013 - White Paper Software Security Engineering: A Guide for Project Managers

Topics: Cybersecurity Engineering, Software Assurance

Authors: Gary McGraw, Julia H. Allen, Nancy R. Mead, Robert J. Ellison, Sean Barnum

In this guide, the authors discuss our reliance on software and systems that use the internet or internet-exposed private networks.

June 2012 - White Paper Introduction to System Strategies

Authors: Robert J. Ellison, Carol Woody

In this paper, the authors discuss the effects of the changing operational environment on the development of secure systems.

September 2011 - CERT Research Report Supply Chain Assurance Overview

Topics: Cybersecurity Engineering

Authors: Robert J. Ellison, Christopher J. Alberts, Rita C. Creel, Audrey J. Dorofee, Carol Woody

In this section of the research report, the authors attempt to integrate development and acquisition practices with risk-based evaluations and mitigations.

December 2010 - Technical Note Software Supply Chain Risk Management: From Products to Systems of Systems

Topics: Cybersecurity Engineering

Authors: Robert J. Ellison, Christopher J. Alberts, Rita C. Creel, Audrey J. Dorofee, Carol Woody

In this report, the authors consider current practices in software supply chain analysis and suggest some foundational practices.

June 2010 - Webinar Securing Global Software Supply Chains

Topics: Cybersecurity Engineering, Software Assurance

Authors: Robert J. Ellison

In this 2010 webinar, Bob Ellison examines the software side pf supply chain and provides examples to help acquirers manage supply chains.

June 2010 - Technical Note Survivability Analysis Framework

Topics: Cybersecurity Engineering

Authors: Robert J. Ellison, Carol Woody

In this report, the authors describe the Survivability Analysis Framework, which is used to evaluate critical operational capabilities.

May 2010 - Technical Note Evaluating and Mitigating Software Supply Chain Security Risks

Topics: Software Assurance

Authors: Robert J. Ellison, John B. Goodenough, Charles B. Weinstock, Carol Woody

In this 2010 report, the authors identify software supply chain security risks and specify evidence to gather to determine if these risks have been mitigated.

March 2010 - White Paper Cyber Assurance

Authors: Christopher J. Alberts, Robert J. Ellison, Carol Woody

This paper, extracted from the 2009 CERT Research Report, describes planned research tasks in the field of cyber assurance.

October 2009 - Webinar The Survivability Analysis Framework

Topics: Cybersecurity Engineering

Authors: Robert J. Ellison, Carol Woody

In this October 2009 webinar, Robert Ellison and Carol Woody present the Survivability Analysis Framework.

May 2008 - Technical Report Survivability Assurance for System of Systems

Topics: Cybersecurity Engineering, Software Assurance

Authors: Robert J. Ellison, John B. Goodenough, Charles B. Weinstock, Carol Woody

In this report, the authors describe the Survivability Analysis Framework, a structured view of people, process, and technology.

March 2008 - Book Software Security Engineering: A Guide for Project Managers

Topics: Cybersecurity Engineering

Authors: Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead

In this book, the authors provide sound practices likely to increase the security and dependability of your software during development and operation.

July 2007 - White Paper System Strategies References

Topics: Cybersecurity Engineering, Software Assurance

Authors: Robert J. Ellison, Carol Woody

In this paper, the authors provide references related to system strategies.

February 2006 - White Paper The Influence of System Properties on Software Assurance and Project Management

Authors: Robert J. Ellison

In this paper, Robert Ellison discusses characteristics of software and how they influence how software assurance should be managed.

September 2004 - Technical Note Security and Survivability Reasoning Frameworks and Architectural Design Tactics

Topics: Cybersecurity Engineering, Software Architecture

Authors: Robert J. Ellison, Andrew P. Moore, Len Bass, Mark H. Klein, Felix Bachmann

In this report, the authors describe an approach to disciplined software architecture design for the related quality attributes of security and survivability.

June 2004 - White Paper Acquisition Overview: The Challenges

Topics: Cybersecurity Engineering, Acquisition Support, Software Assurance

Authors: Rita C. Creel, Robert J. Ellison

In this paper, the authors raise issues involving how systems are integrated to provide required capabilities.

October 2003 - Technical Report Quality Attribute Workshops (QAWs), Third Edition

Topics: Software Architecture

Authors: Mario R. Barbacci, Robert J. Ellison, Anthony J. Lattanze, Judith A. Stafford, Charles B. Weinstock, William G. Wood

This report describes the newly revised QAW (Quality Attribute Workshop) and describes potential uses of the refined scenarios generated during it.

October 2002 - Technical Report Trustworthy Refinement Through Intrusion-Aware Design

Authors: Robert J. Ellison, Andrew P. Moore

This document has been superseded by CMU/SEI-2003-TR-002.

October 2002 - Technical Report Trustworthy Refinement Through Intrusion-Aware Design (TRIAD)

Authors: Robert J. Ellison, Andrew P. Moore

In this report, the authors demonstrate the application of TRIAD to refining a survivability strategy for a business that sells products on the internet.

June 2002 - Technical Report Quality Attribute Workshops, 2nd Edition

Topics: Software Architecture

Authors: Mario R. Barbacci, Robert J. Ellison, Anthony J. Lattanze, Judith A. Stafford, Charles B. Weinstock, William G. Wood

This report clarifies the context in which a QAW (Quality Attribute Workshop) is applicable, provides a rationale for developing the process and describes it in detail, and concludes with a list of lessons learned and a discussion of how these lessons have helped evolve the process to its current state.

May 2002 - White Paper Foundations for Survivable Systems Engineering

Authors: Robert J. Ellison, Richard C. Linger (Oak Ridge National Laboratory), Nancy R. Mead, Andrew P. Moore

In this paper, the authors describe their efforts to perform risk assessment and analyze and design robust survivable systems.

October 2001 - Technical Note Architectural Refinement for the Design of Survivable Systems

Topics: Software Architecture

Authors: Robert J. Ellison, Andrew P. Moore

This paper describes a process for systematically refining an enterprise system architecture to resist, recognize, and recover from deliberate, malicious attacks by applying reusable design primitives that help ensure the survival of the enterprise mission.

May 2001 - Technical Report Quality Attribute Workshops

Topics: Software Architecture

Authors: Mario R. Barbacci, Robert J. Ellison, Judith A. Stafford, Charles B. Weinstock, William G. Wood

This report describes the QAW (Quality Attribute Workshop) approach, which is a method for evaluating a software-intensive system architecture during the acquisition phase of major programs.

March 2001 - Technical Note Attack Modeling for Information Security and Survivability

Authors: Andrew P. Moore, Robert J. Ellison, Richard C. Linger (Oak Ridge National Laboratory)

This technical note describes and illustrates an approach for documenting attack information in a structured and reusable form.

September 2000 - Technical Report Survivable Network Analysis Method

Authors: Nancy R. Mead, Robert J. Ellison, Richard C. Linger (Oak Ridge National Laboratory), Thomas A. Longstaff, John McHugh

This report, published in 2000, describes the SNA method developed at the SEI's CERT Coordination Center. The SNA method guides stakeholders through an analysis process intended to improve system survivability when a system is threatened.

January 2000 - Special Report Quality Attribute Workshop Participants Handbook

Topics: Software Architecture

Authors: Mario R. Barbacci, Robert J. Ellison, Charles B. Weinstock, William G. Wood

This report describes the 1) process we use to conduct QAW (Quality Attribute Workshop), 2) information required, 3) suggested tools, and 4) expected outcomes of QAWs.

September 1998 - Technical Report Case Study in Survivable Network System Analysis

Topics: Network Situational Awareness

Authors: Robert J. Ellison, Richard C. Linger (Oak Ridge National Laboratory), Thomas A. Longstaff, Nancy R. Mead

In this report, the authors present a method for analyzing the survivability of distributed network systems and an example of its application.

November 1997 - Technical Report Survivable Network Systems: An Emerging Discipline

Authors: David Fisher, Richard C. Linger (Oak Ridge National Laboratory), Howard F. Lipson, Thomas A. Longstaff, Nancy R. Mead, Robert J. Ellison

This 1997 report describes the survivability approach to helping assure that a system that must operate in an unbounded network is robust in the presence of attack and will survive attacks that result in successful intrusions.

January 1996 - White Paper A Case Study in Requirements for Survivable Systems

Authors: Robert J. Ellison, Richard C. Linger (Oak Ridge National Laboratory), Thomas A. Longstaff, Nancy R. Mead

This case study summarizes the application and results of applying the SNA method to a subsystem of a large-scale, distributed healthcare system.

October 1987 - Technical Report Software Development

Authors: Susan A. Dart, Robert J. Ellison

Over the last 20 years, the set of software tools available to developers has expanded considerably. We can illustrate this change by observing some distinctions in the terminology.