Showing 41 - 50 of 494 results for the Type - White Paper
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
This paper discusses the application of assurance cases as a means of building confidence that the software design of a complex system of systems will actually meet the operational objectives set forth in the project's top-level requirements.
In this paper, the authors describe two efforts that support national cybersecurity education goals.
This paper summarizes the comparison performed between the CMMI and the regulations and standards that drive software intensive medical device product development.
In this paper, the authors propose a set of Supply Chain Risk Management (SCRM) activities and practices for Information and Communication Technologies (ICT).
In this 2001 paper, the authors describe the then-current situation regarding denial-of-service (DOS) attacks and ways of addressing the problem.
In this paper, the authors describe three educational initiatives in support of software assurance education.
In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.
In this paper, the authors discuss how system engineers are uncertain about how to determine the impact of software on overall system.
This white paper presents basic terminology related to Service- Oriented Architecture (SOA). The goal of the paper is to establish a baseline of terms for service-oriented systems.