Latest Additions to the Library
Spotlight On: Malicious Insiders and Organized Crime Activity
This report defines malicious insiders and organized crime and provides a snapshot of who malicious insiders are, what and how they strike, and why.
Understanding and Leveraging a Supplier’s CMMI Efforts: A Guidebook for Acquirers (Revised for V1.3)
This guidebook helps acquisition organizations formulate questions for their suppliers related to CMMI. It also helps organizations interpret responses to identify and evaluate risks for a given supplier.
Relating Business Goals to Architecturally Significant Requirements for Software Systems
This report attempts to facilitate better elicitation of high-pedigree quality attribute requirements by understanding how business goals influence quality attribute requirements and architectures.
Engineering Safety-and Security-Related Requirements for Software-Intensive Systems (ICSE 2010)
presentation given at the 32nd International Conference on Software Engineering 4 May 2010
System Architecture Virtual Integration: An Industrial Case Study
This report introduces key concepts of the SAVI paradigm, describe the POC scope, and discusses the series of development scenarios used in a POC demonstration to illustrate the feasibility of...