Friday 26 October 2012

[ALF 04] Luca de Alfaro, Marco Faella, Thomas A. Henzinger,
Rupak Majumdar, and Marielle Stoelinga. “Model checking
discounted temporal properties”. Proceedings of the 10th
International Conference on Tools and Algorithms for the
Construction and Analysis of Systems (TACAS), Lecture Notes in
Computer Science 2988, Springer-Verlag, 2004, pp. 77-92.
[ALF 01] Luca de Alfaro and Thomas A. Henzinger. “Interface
automata”. Proceedings of the Ninth Annual Symposium on
Foundations of Software Engineering (FSE), ACM Press, 2001,
pp. 109-120.
[BIS 03] Matt Bishop, “Computer Security: Art and Science”,
Addison Wesley, 2003. ISBN: 0-201-44099-7.
[CC1 99] National Institute of Standards and Technology,
“Common Criteria for Information Technology Security
Evaluation, Part I: Introduction and General Model”, Version
2.1, CCIMB-99-031, August 1999.
[CC2 99] National Institute of Standards and Technology,
“Common Criteria for Information Technology Security
Evaluation, Part II: Security Function Requirements”, Version
2.1, CCIMB-99-031, August 1999.
[CC3 99] National Institute of Standards and Technology,
“Common Criteria for Information Technology Security
Evaluation, Part III: Security Assurance Requirements”, Version
2.1, CCIMB-99-031, August 1999.
[CEC 91] Commission of the European Communities,
“Information Technology Security Evaluation Criteria”, Version
1.2, 1991.
[DOD 85] Department of Defense, “Trusted Computer System
Evaluation Criteria”, DOD 5200.28-STD, December 1985.
[GHE 91] Carlo Ghezzi, Mehdi Jazayeri, and Dino Mandrioli,
Fundamentals of Software Engineering, Prentice Hall, 1991.
[HMU 01] John E. Hopcroft, Rajeev Motwani, and Jeffery D.
Ullman, “Introduction to Automata Theory, Languages, and
Computation”, Addison-Wesley, 2001.
[Land 81] C.E. Landwehr, “Formal Models for Computer
Security”, ACM Computing Surveys, Vol. 13, No. 3, 1981. pp.
247 – 278.
[NIST 01] National Institute of Standards and Technology,
“Security Requirements for Cryptographic Modules”, PIPS PUB
140-2, May 2001.
[NIST 03] Marianne Swanson, Nadya Bartol, John Sabato, Joan
Hash, and Laurie Graffo, “Security Metrics Guide for Information
Technology Systems”, NIST Special Publication 800-55, National
Institute of Standards and Technology,
http://csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf.
July 2003.
[POT 00] Ronald W. Potter, “The Art of Measurement, Theory
and Practice”, Printice Hall PTR, Upper Saddle River, New
Jersey, 2000. ISBN 0-13-026174-2.

No comments:

Post a Comment