Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 7 of 7 results for the Author - howard f. lipson , Type - White Paper

White Paper | May 2013 - White Paper Assembly, Integration, and Evolution Overview By Howard F. Lipson

In this paper, Howard Lipson describes the objective of the Assembly, Integration & Evolution content area.

White Paper | April 1998 - White Paper The Architecture Tradeoff Analysis Method By Rick Kazman, Mark H. Klein, Mario R. Barbacci, Thomas A. Longstaff, Howard F. Lipson, Jeromy Carriere

This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design.

White Paper | August 2013 - White Paper Evidence of Assurance: Laying the Foundation for a Credible ... By Charles B. Weinstock, Howard F. Lipson

In this paper, the authors provide examples of several of the kinds of evidence that can contribute to a security case.

White Paper | July 2013 - White Paper Arguing Security - Creating Security Assurance Cases By Charles B. Weinstock, Howard F. Lipson, John B. Goodenough

In this paper, the authors explain an approach to documenting an assurance case for system security.

White Paper | August 2005 - White Paper Simulating Insider Cyber-Threat Risks: A Model-Based Case ... By Eliot Rich (University at Albany State University of New York), Howard F. Lipson, Dave Mundie, Jose M. Sarriegui (University of Navarra Spain), Agata Sawicka (Agder University College Norway), Thomas R. Stewart (University at Albany State University of New York), Jose M. Torres (University of Navarra Spain), Elise A. Weaver (Worcester Polytechnic Institute), Johannes Wiik (Agder University College Norway), Ignacio J. Martinez-Moyano (University at Albany State University of New York), Paul Conrad, Dawn Cappelli, Andrew P. Moore, Timothy J. Shimeall, David F. Andersen (University at Albany State University of New York), Jose J. Gonzalez (Agder University College Norway), Robert J. Ellison

In this paper, the authors identify actions that may inadvertently lead to increased vulnerability to threats from employees, contractors, and clients.

White Paper | September 2008 - White Paper Application Firewalls and Proxies - Introduction and Concept ... By Howard F. Lipson, Ken Van Wyk (No Affiliation)

In this paper, the authors describe one of the many potential topic areas involving the integration of business applications into a supporting IT security infrastructure.

White Paper | May 2013 - White Paper Assurance Cases Overview By Howard F. Lipson

In this paper, Howard Lipson introduces the concepts and benefits of developing and maintaining assurance cases for security.