Showing 1 - 10 of 14 results for the Author - carol woody , Type - White Paper
This paper discusses twelve threat modeling methods from a variety of sources that target different parts of the development process.
This paper compares threat modeling methods for cyber-physical systems and recommends which methods (and combinations of methods) to use.
In this paper, Carol Woody summarizes recent key accomplishments, including harmonizing security practices with CMMI and using assurance cases.
In this white paper, the authors map eight CERT tools, services, and processes to Microsoft's Simplified Security Development Lifecycle.
In this paper, the authors highlight efforts to address the principles of software assurance and its educational curriculum.
This white paper was produced to focus attention on the opportunities and challenges for embedding information assurance considerations into Agile development and acquisition.
In this paper, the authors highlight efforts underway to address our society's growing dependence on software and the need for effective software assurance.
In this paper, the authors highlight the approach being implemented by SEI researchers for assessing and managing software supply-chain risks and provides a summary of the status of this work.
In this paper, the authors describe practices that address defects and mechanisms for introducing these practices into the acquisition lifecycle.
This paper, extracted from the 2009 CERT Research Report, describes planned research tasks in the field of cyber assurance.