ГОСТ Р ИСО/МЭК 15026-1—2016
1154) Process Framework O.P.E.N. Safety Cases. [Online Document cited on. 20 Jun 2012) Available at:
http://www.opfro.org/mdex.html?
Components/WorkProducts/SafetySet/SafetySet. html-Contents
(155) OPSI. The Offshore Installations (Safety Case) Regulations 2005. [Online Document cited on: 20 June 2012).
Available at
http://www.opsi.gov.uk/si/si2005/20053117.htm
(156) Park J., Montrose B., Froscher J. Tools lor Inlormalion Security Assurance Arguments. DARPA Information
Survivability Conference & Exposition II. 2001. DISCEX‘01. Proceedings. 2001
(157) PetroskiH. Design Paradigms. Cambridge University Press. 1994
(158) Prasad D. Dependable Systems Integration using Measurement Theory and Decision Analysis. PhD Thesis.
Department of Computer Science. University of York. UK. 1998
(159) PSM Safety & Security TWG. Security Measurement. Nov. 2004
(160) Pullum L.L. Software Fault Tolerance. Artech House. 2001
(161) RandellB..& Koutny M. Failures: Their Definition. Modelling and Analysis. School of Computing Science. Newcastle
University CS-TR NO 994. Dec. 2006 RandellB. & Rushby J.M. Disthbuted Secure Systems. Then and Now.CS-TR No
1052 School of Computing Science, Newcastle University. Oct. 2007
(162) RechtinE. Systems Architecting of Organizations: Why Eagles Can’t Swim. CRC Press. Boca Raton. FL.2000
(163J Redwine S.T. Jr. ed. Software Assurance: A Guide to the Common Body of Knowledge to Produce. Acquire, and
Sustain Secure Software Version 1.1. US Department of Homeland Security, September 2006
(164) Redwine S.T. Jr. The Quality of Assurance Cases. Workshop on Assurance Cases for Security: The Metrics
Challenge. International Conference on Dependable Systems and Networks. 2007
(165) Redwine S.T.Jr.. & Davis N. eds. Processes for Producing Secure Software: Towards Secure Software. Vols. I and II.
Washington. D.C.: National Cyber Security Partnership. 2004. Available at
http://www.cig
ital.com/papers/download/secure_software_process.pdf
(166) Ross K.G.. Shafer J.L., Klein G. Professional Judgements and Naturalistic Decision Making’. In: (45). pp. 403— 420
(167) Ross R. et at. Recommended Security Controls for Federal Information Systems. NIST Special Publication 800-53.
Aug 2009. Available at
htip://csrc.nist.gov/publlcatlons/nlstpubs/80053-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf
(168) SAE JA1000. Reliability Program Standard. SAE International, June 1998. Available at
http://www
. sae.org
(169) SaltzerJ.H.. & Schroeder M.D. The protection of Information In computer systems. Proc. IEEE. 1975. 63 (9). pp.
1278— 1308. Available at:
http://cap-tore.com/CapTheory/Protlnf/
(170) Seminal Papers — History of Computer Security Project. University of California Davis Computer Security
Laboratory. Available at:
http://seclab.cs.
ucdavls.edu/projects/Tilstory/seminal.html
(171) Serene. "Safety argument*. (Online Document] [cited on. 13 Feb 2007) Available at:
http://www2.
dcs.qmul.ac.uk/~norman/SERENE_Help/sereneSafety_argument.htm
(172) Severson K. Yucca Mountain Safety Case Focus of NWTRB September Meeting. United States Nuclear Waste
Technical Review Board. Aug. 2006
(173) Sieck W.R..& Klein G. Decision making. In: (43). pp. 195—218
(174) Software and Systems Engineering Vocabulary (sevocab). Available at
www.computer.org/sevocab
(175) Sommerville I. Software Engineering. Pearson Education. Eighth Edition. 2006
(176) Stoneburner G., Hayden C.. Feringa A. Engmeenng Principles tor Information Technology Security (A Baseline for
Achieving Security). Revision A. NIST Special Publication 800-27 Rev A. June 2004
(177) Storey N. Safety-Critical ComputerSystems. Addison Wesley. 1996
(178) Strunk E., & Knight J. The Essential Synthesis o f Problem Frames and Assurance Cases. IWAAPF’06. Shanghai.
China. May 2006
(179) SwlderskiF..& Snyder W. ThreatModeling. Microsoft Press. 2004
(180) u.S. NRC. "Quality Assurance Case Studies at Construction Projects*
(181) Vanfleet W.M. etal. MILS: "Architecture for High Assurance Embedded Computing.* Crosstalk. August. 2005
(182) Viega J.. & McGraw G. Building Secure Software: How to Avoid Secunty Problems the Right Way. Addison Wesley.
Reading. MA. 2001
(183) Walker V.R. Risk Regulation and the Faces’ of Uncertainty. Risk: Health. Safety and Environment, pp. 27—38.
Winter 1998
(184) Ware W.H. Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer
Security. The RAND Corporation. Santa Monica. CA (Feb. 1970)
21