ГОСТ Р ИСО/МЭК 15026-1—2016
[127J Ladkm Р. The Pre-Implementation Safety Case forRVSM in European Airspace is Flawed. 29 Aug 2002. Available at
http://www.rvs.unl-bielefeld.de/publications/Reports/SCflawed-pa
per.html
(128) LandwehrC. Computer Security. tJIS. 2001.1 pp.3— 13
(129) Lautien S.. Cooper D . Jackson D. SafSec: Commonalities Between Safety and Security Assurance. Proceedings of
the Thirteenth Safety Critical Systems Symposium — Southampton. 2005
(130) LeBoeuf R.A.. & Shafir E.B. Decision Making. In: (59). pp.243—266
(131) Leveson N. A Systems-Theoretic Approach to Safety m Software-Intensive Systems. IEEE Trans. Dependable Sec.
Comput. 2004.1 (1) pp. 66—86
(132) Lipner S.. & Howard M. The Trustworthy Computing Security Development Lifecycle. Microsoft. 2005. Available at
http://msdn.mlcrosoft.com/en-usi’library/ms995349.aspx
(133) Maguire R. Safety Cases abd Safety Reports: Meaning. Motivation and Management. Ashgate. 2006
(134) McDermid J. Software Safety. Where’s the Evidence?6th Australian Workshop on Industrial Experience with Safety
Critical Systems and Software (SCS’01). Brisbane. 2001
(135) McGrawG. Software Security: Building Security In. Addison Wesley. 2006
(136) McLean J. Security Models. In: Encyclopedia of Software Engineering. (Marciniak J. ed.). Wiley. 1994
(137) Meier J.D.. Mackman A.. Vasireddy S.. Dunner M., Escamilla R.. Murukan A. Improving Web Application Security:
ThreatsandCountermeasures,Microsoft.2004.Availableat:
http://download.microsoft.eom/download/d/8/c/d8c02f31-64af-438ca9f4-e31acb8e3333/Threats_Countermeasur
es.pdf
(138) Merkow M.S.. & Breithaupt J. Computer Security Assurance Using the Common Criteria. Thompson Delamr
Learning. 2005
(139) Ministry of Defence. Defence Standard 00-42 Issue 2. Reliability and Maintainability (R&M) Assurance Guidance.
Part 3. R&M Case. 6 June 2003
(140) Ministry Of Defence. Defence Standard 00-55 (PART 1)/lssue 2. Requirements for Safety Related Software in
Defence Equipment Part 1: Requirements. 21 August 1997
(141) Ministry of Defence. Defence Standard 00-55 (PART 2)/lssue 2. Requirements for Safety Related Software in
Defence Equipment Part 2: Guidance. 21 August 1997
(142) Ministry of Defence. Interim Defence Standard 00-56. Safety Management Requirements for Defence Systems
Part 1: Requirements. 17 December 2004
(143) Ministry of Defence. Interim Defence Standard 00-56. Safety Management Requirements for Defence Systems
Part 2: Guidance on Establishing a Means of Complying with Part 1.17 December 2004
(144) Moore A., Kllnker E.. Mihelclc D. How to Construct FormalArguments that Persuade Certifiers. In: IndustrialStrength
FormalMethods in Practice Academic Press. 1999
(145) National Aeronautics and Space Administration (NASA) Software Assurance Guidebook. September 1989
(NASA-GB-A201). Available at http.//
www.hq.nasa.
gov/office/codeq/doclree/ nasa_gb_a201 .pdf
(146) National Offshore Petroleum Safety Authority. Safety case. [Online Documents (cited on: 20 Jun 2012) Available at
http://www.nopsema.gov.au/safety/safety-case/
(147) National Research Council (NRC) Computer Science and Telecommunications Board. (CSTB). Cybersecunty
Today and Tomorrow: Pay Now or Pay Later. National Academies Press. 2002. Available at
http://www.nap.edu/topics.php?
top*c=320istart=10
(148) National Security Agency. The Information Systems Security Engineering Process (IATF) v3.1.2002
(149) Naval Research Laboratory. Handbook for the Computer Security Certification of Trusted Sysfems. US Naval
Research Laboratory. 1995
(150) NDIA System Assurance Committee. Englneenng for System Assurance. National Defense Industrial Association.
USA. 2008
(151) NIST. Federal Information Processing Standards Publication (FIPS PUB) 200: Minimum Security Requirements for
FederalInformationandInformationSystems.March2006.Availableat
http://csrc.nist.gov/publicationsj‘fips/fip8200/FIPS-200-final-march.pdf
(152) NIST. NIST Special Publication 800-27. Rev A: Engmeenng Principles for Information Technology Secunty (A
Baseline for Achieving Secunty). Revision A, June 2004. Available at
http://csrc.mst.
gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf
(153) NIST. NIST Special Publication 800-33. Underlying Technical Models for Information Technology Security.
December 2001. Available at
http://csrc.nist.gov/publications/
nistpubs/800-33/sp800-33.pdf
20