Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Richard C. Linger (Oak Ridge National Laboratory)
February 2011 - Technical Report Function Extraction (FX) Research for Computation of Software Behavior: 2010 Development and Application of Semantic Reduction Theorems for Behavior Analysis

In this report, the authors present research to compute the behavior of software with mathematical precision and how this research has been implemented.

October 2010 - Podcast Software Assurance: A Master's Level Curriculum

Topics: Workforce Development

In this podcast, participants explain how knowledge about software assurance is essential to ensure that complex systems function as intended.

August 2010 - Technical Report Software Assurance Curriculum Project Volume II: Undergraduate Course Outlines

Topics: Cybersecurity Engineering, Software Assurance

In this report, the authors describe seven courses for an undergraduate curriculum specialization for software assurance.

June 2009 - White Paper Computational Evaluation of Software Security Attributes

This paper provides an introduction to the CSA approach, provides behavioral requirements for security attributes, and discusses possible application of the CSA approach.

April 2007 - White Paper Function Extraction: Automated Behavior Computation for Aerospace Software Verification and Certification

This paper describes verification and certification challenges for avionics software.

December 2006 - Technical Report Technology Foundations for Computational Evaluation of Software Security Attributes

In this 2006 report, the authors describe foundations for computational security attributes technology.

December 2005 - Technical Note The CERT Function Extraction Experiment: Quantifying FX Impact on Software Comprehension and Verification

Topics: Cybersecurity Engineering

In this report, the authors describe an experiment comparing traditional methods of comprehension with automated behavior computation using an FX prototype.

December 2005 - Technical Report Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends (FY2005)

This report describes the IR&D projects that were conducted during fiscal year 2005 (October 2004 through September 2005). In addition, this report provides information on what the SEI has learned in its role as a technology scout for developments over the past year in the field of software engineering.

July 2005 - Technical Report The Impact of Function Extraction Technology on Next-Generation Software Engineering

Topics: Cybersecurity Engineering

In this 2005 report, the authors summarize FX research and development and investigates the impact of FX on software engineering.

February 2003 - Technical Note Applying FSQ Engineering Foundations to Automated Calculation of Program Behavior

Topics: Network Situational Awareness

In this report, Richard Linger describes the application of function-theoretic mathematical foundations to the problem of program behavior calculation.

October 2002 - Technical Report SEI Independent Research and Development Projects

This report describes the IR&D projects that were conducted during fiscal year 2002 (October 2001 through September 2002).

October 2002 - Technical Report Life-Cycle Models for Survivable Systems

Topics: Cybersecurity Engineering, Software Assurance

In this 2002 report, the authors describe a software development life-cycle model for survivability and illustrate techniques to support survivability goals.

June 2002 - Technical Note Flow-Service-Quality (FSQ) Engineering: Foundations for Network System Analysis and Development

Topics: Network Situational Awareness

In this 2002 report, the authors describe Flow-Service-Quality engineering, an emerging technology for management, acquisition, and more.

May 2002 - White Paper Foundations for Survivable Systems Engineering

In this paper, the authors describe their efforts to perform risk assessment and analyze and design robust survivable systems.

October 2001 - Technical Report Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models

This 2001 paper describes initial work in the foundations stage for survivability specification and intrusion specification, as well as survivability evaluationmodels that draw upon both of these areas.

March 2001 - Technical Note Attack Modeling for Information Security and Survivability

This technical note describes and illustrates an approach for documenting attack information in a structured and reusable form.

October 2000 - Presentation Lifecycle Models for Survivable Systems

This presentation on the lifecycle models for survivable systems was presented by Rick Linger of the Software Engineering Institute (SEI) at the Information Survivability Workshop (ISW) 2000, held from October 24-26, 2000 in Boston, Massachusetts.

September 2000 - Technical Report Survivable Network Analysis Method

This report, published in 2000, describes the SNA method developed at the SEI's CERT Coordination Center. The SNA method guides stakeholders through an analysis process intended to improve system survivability when a system is threatened.

March 1999 - Book Cleanroom Software Engineering: Technology and Process

Topics: CMMI, Process Improvement

This book provides an in-depth description of the Cleanroom approach to high-quality software development, and discusses how Cleanroom is compatible with the Capability Maturity Model (CMM).

September 1998 - Technical Report Case Study in Survivable Network System Analysis

Topics: Network Situational Awareness

In this report, the authors present a method for analyzing the survivability of distributed network systems and an example of its application.

November 1997 - Technical Report Survivable Network Systems: An Emerging Discipline

This 1997 report describes the survivability approach to helping assure that a system that must operate in an unbounded network is robust in the presence of attack and will survive attacks that result in successful intrusions.

December 1996 - Technical Report Cleanroom Software Engineering Implementation of the Capability Maturity Model (CMM) for Software

This report defines the Cleanroom software engineering implementation of theCapability Maturity Model for Software.

November 1996 - Technical Report Cleanroom Software Engineering Reference

This report defines the Cleanroom Software Engineering Reference Model (CRM), which is intended as a guide for Cleanroom project management and performance, process assessment and improvement, and technology transfer and adoption.

January 1996 - White Paper A Case Study in Requirements for Survivable Systems

This case study summarizes the application and results of applying the SNA method to a subsystem of a large-scale, distributed healthcare system.