Howard F. Lipson
Software Engineering Institute
Publications by Howard F. Lipson
-
Evidence of Assurance: Laying the Foundation for a Credible Security Case
August 07, 2013 • White Paper
Charles B. WeinstockHoward F. Lipson
In this paper, the authors provide examples of several of the kinds of evidence that can contribute to a security case.
read -
Arguing Security - Creating Security Assurance Cases
July 05, 2013 • White Paper
Charles B. WeinstockHoward F. LipsonJohn B. Goodenough
In this paper, the authors explain an approach to documenting an assurance case for system security.
read -
Assembly, Integration, and Evolution Overview
May 14, 2013 • White Paper
Howard F. Lipson
In this paper, Howard Lipson describes the objective of the Assembly, Integration & Evolution content area.
read -
Assurance Cases Overview
May 14, 2013 • White Paper
Howard F. Lipson
In this paper, Howard Lipson introduces the concepts and benefits of developing and maintaining assurance cases for security.
read -
Results of SEI Independent Research and Development Projects (FY 2010)
February 01, 2011 • Technical Report
William AndersonDavid FisherDavid P. Gluch
This report describes results of independent research and development (IRAD) projects undertaken in fiscal year 2010.
read -
Application Firewalls and Proxies - Introduction and Concept of Operations
September 27, 2008 • White Paper
Howard F. LipsonKen Van Wyk (No Affiliation)
In this paper, the authors describe one of the many potential topic areas involving the integration of business applications into a supporting IT security infrastructure.
read -
Evolutionary Systems Design: Recognizing Changes in Security and Survivability Risks
September 01, 2006 • Technical Note
Howard F. Lipson
In this 2006 report, Howard Lipson uses an example to illustrate the critical importance of evolutionary design changes in secure and survivable systems.
read -
Simulating Insider Cyber-Threat Risks: A Model-Based Case and a Case-Based Model
August 11, 2005 • White Paper
Eliot Rich (University at Albany State University of New York)Howard F. LipsonDave Mundie
In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.
read -
Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY 2004)
October 01, 2004 • Technical Report
John K. BergeyEdwin J. MorrisJeannine Siviy
This report describes the IR&D projects that were conducted during fiscal year 2004 (October 2003 through September 2004).
read -
Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
November 01, 2002 • Special Report
Howard F. Lipson
In this report, Howard Lipson describes the technical challenges and global policy issues related to cyber attacks.
read -
Life-Cycle Models for Survivable Systems
October 01, 2002 • Technical Report
Richard C. Linger (Oak Ridge National Laboratory)Howard F. LipsonJohn McHugh
In this 2002 report, the authors describe a software development life-cycle model for survivability and illustrate techniques to support survivability goals.
read -
Can We Ever Build Survivable Systems from COTS Components?
December 01, 2001 • Technical Note
Howard F. LipsonNancy R. MeadAndrew P. Moore
In this 2001 report, the authors describe a risk-mitigation framework for deciding when and how COTS components can be used to build survivable systems.
read -
The Architecture Tradeoff Analysis Method
July 01, 1998 • Technical Report
Rick KazmanMark H. KleinMario R. Barbacci
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in the architectures of software-intensive systems.
read -
Steps in an Architecture Tradeoff Analysis Method: Quality Attribute Models and Analysis
May 01, 1998 • Technical Report
Mario R. BarbacciPeter H. FeilerMark H. Klein
This paper presents some of the steps in an emerging architecture tradeoff analysis method (ATAM).
read -
The Architecture Tradeoff Analysis Method
April 01, 1998 • White Paper
Rick KazmanMark H. KleinMario R. Barbacci
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design.
read -
Survivable Network Systems: An Emerging Discipline
November 01, 1997 • Technical Report
David FisherRichard C. Linger (Oak Ridge National Laboratory)Howard F. Lipson
This 1997 report describes the survivability approach to helping assure that a system that must operate in an unbounded network is robust in the presence of attack and will survive attacks that result in successful intrusions.
read