ГОСТ Р 54582—2011
43
[30]Practical Guide to the Open Brand
Ref. X981. The Open Group, 44 Montgomery, Street, Suite 960, San Francisco, CA 94104-4704, USA
Note: The guide may be available as http://www.opengroup.org/publications/cataloci/x981.htm
[31]Canadian Trusted Computer Product Evaluation Criteria, Version 3.0
(NITSM 8/93 and CID 09/19), 1993. Communications Security Establishment, P.O. Box 9703, Terminal, Ottawa,
Ontario K1G 3Z4, Canada
[32]Rating Maintenance Phase Program (RAMP), Doc Vers. 2, 1995
NCSC-TG-013-95, Library No. S-242,047, National Computer Security Center (NCSC), 9800 Savage
Road, Fort George G. Meade, Maryland 20755-6000, USA
Note: The document may be available as http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC- TG-013.2. html
[33]IT Baseline Protection Manual
ISBN 3-88784-915-9. Bundesanzeiger-Verlag, Postfach 10 05 34, 50455 Koln, Germany
Note: Up-to-date versions of this manual may also be available on-line at http://www.bsi.bund, de/english/index. htm
[34]Capability Maturity Model for Software CMU/SEI-91-TR-24
August 1991, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213—3890
Note: The document may be available as http://www.sei.cmu.edu/pub/documents/93.reDorts/pdf/tr24.93.pdf
[35]Capability Maturity Model ® Integration for the systems engineering and software engineering integrated model,
CMMI-SE/SW Version 1.1
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213—3890
Note: The document may be available as http://www.sei.cmu.edu/pub/documents/02.reports/pdf/02tr001.pdf
[36] CMMISM for Systems Engineering/Software Engineering/Integrated Product and Process Development,
Version 1.1, Staged Representation CMMI-SE/SW/IPPD, V1.1, Staged, Software Engineering Institute, Carnegie
Mellon University, Pittsburgh, PA 15213-3890
Note: The document may be available as http://www.sei.cmu.edu/pub/documents/02.reports/pdf/02tr004.pdf
[37]CMMISM for Systems Engineering/Software Engineering/Integrated Product and Process Development/Supplier
Sourcing, Version 1.1, Staged Representation
CMMI-SE/SW/IPPD/SS, V1.1, Staged, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA
15213-3890, USA
Note: The document may be available as http://www.sei.cmu, edu/pub/documents/02.reports/pdf/02trO 11.pdf.
[38]Software Acquisition Capability Maturity Model® (SA-CMM®), Version 1.03
March 2002. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA
Note: The document may be available as http://www.sei.cmu.edu/publications/documents/02.reports/02tr010.html
[39]X/Open Baseline Security Services (XBSS) Document Number C529, ISBN 1-85912-136-5, December 1995. The
Open Group, 44 Montgomery, Street, Suite 960, San Francisco, CA 94104-4704, USA
Note: The document may be available at http://www.opengroup.org/publications/cataloct/c529.htm
[40]Information Technology Security Evaluation Criteria (ITSEC), version 1.2 Offi ce for Official Publications of the EC,
June 1991. Document may be obtained by: http://www.cordis.lu/infosec/src/crit.htm
[41]Information Technology Security Evaluation Manual (ITSEM), version 1.0 Offi ce for Official Publications of the EC,
September 1993. Document may be obtained by: http://www.cordis.lu/infosec/src/crit.htm
[42]V-Model — Development Standard for IT Systems, VM 1997 IABG, EinsteinstraBe 20, D-85521 Ottobrunn,
Germany. Document may be obtained by: http://www.v-modell.iabg.de/ENGL
[43]A Head Start on Assurance in Proceedings of an Invitational Workshop on Information Technology (IT) Assurance
and Trustworthiness, March 21-23, 1994, NISTIR 5472. National Security Agency, 9800 Savage Road, Suite 6740,
Ft. Meade, MD 20755-7640, USA
[44]UK Certifi cate Maintenance Scheme, Issue 1.0
31 July 1996, Certifi cation Body, PO Box 152, Cheltenham, Glos GL52 5UF, UK
Note: The document may be available as http://www.cesg.gov.uk/site/iacs/itsec/media/formal-docs/uksp 16p2.pdf
[45]Trusted Computer System Evaluation Criteria (TCSEC), 1985
DOD 5200.28-STD, Library No. 8225,711, US Dept. of Defense
Document may be obtained by: http://www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html
[46]Trusted Product Evaluation Program (TPEP)
Information may be obtained by: http://www.radium.ncsc.mil/tpep/process/procedures.html
[47]A Trusted Software Development Methodology
J. Watson and E. Amoroso, in Proc. 13th Natl. Computer Security Conf, Oct. 1990, pp. 717—727
[48]Insider Threat Mitigation Report
in Final Report of the Insider Threat Integrated Process Team, IPTApril 24, 2000. Insider Threat Integrated Process
Team, Department of Defense, USA
[49]State of the Practice of Intrusion Detection Technologies
CMU/SEI-99-TR-028 ESC-TR-99-028, January 2000. Software Engineering Institute, Carnegie Mellon University,
Pittsburgh, PA 15213-3890, USA
Note:
The
document
may
be
available
as
http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf