ГОСТ Р ИСО/МЭК 15026-1—2016
{29]Committee on National Security Systems (CNSS) Instruction 4009: National Information Assurance <IA) Glossary.
Revised May 2003. Available at http-tf
www.cnss.gov/Assets/
pdf/cnssl_4009.pdf
(30) Common Criteria Recognition Arrangement (CCRA). Common Criteria v 3.1 Revision 2. NIAP September 2007.
Available at
http://www
commoncntenaportal.org
{31]Common Weaknesses Enumeration. MITRE. 2012. Available athttp:tfcwe. mltre.org
{32]Cooke N.J.. Gorman J.C.. Winner J.L. Team Cogitation. In:{43], pp. 239—268
{33]Courtois P.-J. Justifying the Dependability of Computer-based Systems: With Applications in Nuclear Engineering.
Springer. 2008
I34]Cranor L.. & Garfmkel S. Security and Usability. Designing Secure Systems that People Can Use. O’Reilly. 2005
{35] Dayton-Johnson. Jeff. Natural disasters and adaptive capacity. OECD Development Centre Research programme
on: Market Access. Capacity Building and Competitiveness. Working Paper No. 237 DEV/DOC(2004)06. August
2004
(36] Department of Defense Directive 8500.1 (6 February 2003). Information Assurance (IA). Washington. DC. US
Department of Defense. ASD(NII)/DoD CIO. April 23. 2007. Available at
http:tfwwiiv.dtic.mil/whsfdirectives/corres/pdf/850001p.pdf.
(37]Department of Defense Strategic Defense Initiative Organization. Trusted Software Development Methodology.
SDI-S-SD-91-000007. vol. 1.17 June 1992
(38]Department of Homeland Security National Cyber Security Division s ’Build Secunty ln‘ <BSI) web site. 2012.
http://buildsecurityin.us-cert.gov
(39] DependabilityResearchGroup.SafetyCases.UniversityofVirginia.Availableat:http://
dependability.cs.virginia.edu/mfo/Safety_Cases
(40] Despotou G.. & Kelly T. Extending the Safety Case Concept to Address Dependability, Proceedings of the 22nd
International System Safety Conference. 2004
(41]Dowd M.. McDonald J.. Schuh J. The Art of Software Security Assessment: Identifying and Preventing Software
Vulnerabilities. Addlson-Westey, 2006
{42]Dunbar K.. & Fugelsang J. Scientific Thinking and Reasoning. In: (59]. pp.705—727
{43] Durso F.T.. Nickerson R.S.. Dumais S.T.. Lewandowsky S.. Perfect T.J. eds. Handbook of Applied Cognition 2nd
edition. Wiley. 2007
[44]Ellsworth P.C. Legal Reasoning. In: {59]. p. 685— 704
(45] Ericsson К .A.. Charness N.. Feltovlch P.J.. Hoffman R.R. eds. The Cambridge Handbook of Expertise and Expert
Performance. Cambridge University Press. 2006
{46]Fenton N.. Llttlewood B.. Nell M.,Str»gini L.. Sutcliffe A.. Wright D. Assessing dependability of safety critical systems
using diverse evidence. IEE Proc. Softw. 1998 145 (1) pp. 35—39
(47] Gasser M. Building a Secure Computer System. Van Nostrand Relnhold. 1988. Available at http://
deke.ruc.edu.cn/wshi/readings/cs02.pdf
(48]Gray J.W. Probabilistic Interference. Proceedings of tne IEEE Symposium on Research in Security and Pnvacy.
IEEE.pp.170— 179,1990
(49]Greenwell W.. Strunk E.. Knight J. Failure Analysis and the Safety-Case Lifecycle. IFIP Working Conference on
Human Error. Safety and System Development (HESSD) Toulouse, France. Aug 2004
(50] Greenwell W.S.. Knight J.C.. Pease J.J. A Taxonomy of Fallacies In System Safety Arguments. 24th International
System Safety Conference. Albuquerque. NM. August 2006
(51]Hall A.. & Chapman R. Correctness by Construction: Developing a Commercial Secure System. IEEE Softw.2002
Jan/Feb. 19 (1) pp. 18—25
(52]Herrmann D.S. Software Safety and Reliability. IEEE Computer Society Press. 1999
(53]Hoglund G..& McGraw G. Exploiting Software: How to break code. Addison-Wesley. 2004
(54]Hollnagel E..Woods D.D.,LevesonN. eds. Resilience Engineering: Concepts and Precepts. Ashgate Pub Co. 2006
(55]Hollnagel E. ed. Handbook ofcognitive task design. Lawrence Erlbaum Associates. 2003
(56]Hollnagel E. Human Error: Trick or Treat? In: (43]. pp.219—238
(57]Hollnagel E. Earners and Accident Prevention. Ashgate. 2004
(58] Hollnagel E. Human Factors: From Liability to Asset. Presentation. 2007. Available at
www.vtt.
fl/liitetiedostot/muut/Hollnagel.pdf
(59]Holyoak K.J.. & Morrison R.G. eds. The Cambridge Handbook of Thinking and Reasoning. Cambridge University
Press. 2005
17