Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Howard F. Lipson
August 2013 - White Paper Evidence of Assurance: Laying the Foundation for a Credible Security Case

Topics: Cybersecurity Engineering, Software Assurance

In this paper, the authors provide examples of several of the kinds of evidence that can contribute to a security case.

July 2013 - White Paper Arguing Security - Creating Security Assurance Cases

Topics: Cybersecurity Engineering, Software Assurance

In this paper, the authors explain an approach to documenting an assurance case for system security.

May 2013 - White Paper Assembly, Integration, and Evolution Overview

Topics: Cybersecurity Engineering, Software Assurance

Authors: Howard F. Lipson

In this paper, Howard Lipson describes the objective of the Assembly, Integration & Evolution content area.

May 2013 - White Paper Assurance Cases Overview

Topics: Cybersecurity Engineering, Software Assurance

Authors: Howard F. Lipson

In this paper, Howard Lipson introduces the concepts and benefits of developing and maintaining assurance cases for security.

September 2008 - White Paper Application Firewalls and Proxies - Introduction and Concept of Operations

Topics: Cybersecurity Engineering, Software Assurance

In this paper, the authors describe one of the many potential topic areas involving the integration of business applications into a supporting IT security infrastructure.

September 2006 - Technical Note Evolutionary Systems Design: Recognizing Changes in Security and Survivability Risks

Topics: Cybersecurity Engineering, Software Assurance

Authors: Howard F. Lipson

In this 2006 report, Howard Lipson uses an example to illustrate the critical importance of evolutionary design changes in secure and survivable systems.

November 2002 - Special Report Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues

Topics: Insider Threat

Authors: Howard F. Lipson

In this report, Howard Lipson describes the technical challenges and global policy issues related to cyber attacks.

October 2002 - Technical Report Life-Cycle Models for Survivable Systems

Topics: Cybersecurity Engineering, Software Assurance

In this 2002 report, the authors describe a software development life-cycle model for survivability and illustrate techniques to support survivability goals.

December 2001 - Technical Note Can We Ever Build Survivable Systems from COTS Components?

In this 2001 report, the authors describe a risk-mitigation framework for deciding when and how COTS components can be used to build survivable systems.

July 1998 - Technical Report The Architecture Tradeoff Analysis Method

Topics: Software Architecture

This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in the architectures of software-intensive systems.

May 1998 - Technical Report Steps in an Architecture Tradeoff Analysis Method: Quality Attribute Models and Analysis

Topics: Software Architecture

This paper presents some of the steps in an emerging architecture tradeoff analysis method (ATAM).

April 1998 - White Paper The Architecture Tradeoff Analysis Method

This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design.

November 1997 - Technical Report Survivable Network Systems: An Emerging Discipline

This 1997 report describes the survivability approach to helping assure that a system that must operate in an unbounded network is robust in the presence of attack and will survive attacks that result in successful intrusions.