Back to Results
First PageMeta Content
Cyberwarfare / Software quality / Data security / National security / Software assurance / Software Engineering Institute / Software development process / Vulnerability / Software security assurance / Computer network security / Security / Computer security


ACQUISITION OF SOFTWARE-RELIANT CAPABILITIES Software Assurance, Trustworthiness, and Rigor
Add to Reading List

Document Date: 2014-09-01 19:29:32


Open Document

File Size: 160,78 KB

Share Result on Facebook

Company

IBM / Addison-Wesley Publishing Company Inc. / Cognitive Systems / Resilient Military Systems / Oak Ridge National Laboratory / John Wiley & Sons Inc. / Mead / Cyber Security Encryption / Trusted / /

Country

United States / /

/

Event

Product Issues / /

Facility

Carnegie Mellon University / Dickinson College / Software Engineering Institute / Carnegie Mellon University Software Engineering Institute / Carnegie Mellon University’s Software Engineering Institute / /

IndustryTerm

software engineering / seasoned software / configuration management / identity management / software security / software production / adoption infrastructure / underutilized technology / particular software component / software components / software assurance / widespread infrastructure / software functions / incident management / software artifacts / trustworthy software products / static analysis tools / software assurance spans / software releases / software engineering rigor / software processes / legacy software systems / software assurance uncertainty focuses / multivendor tool / software inspections / accountability management / authorization management / underutilized technology lies / /

MusicGroup

Oak / /

Organization

Dickinson College in Carlisle / U.S. Patent and Trademark Office / Annual Technology Report / IEEE Reliability Society / Carnegie Mellon University’s Software Engineering Institute / Center for National Software Studies / Federal Systems Division / Carnegie Mellon University / Department of Homeland Security / Department of Defense / Carnegie Mellon University Software Engineering Institute / /

Person

Richard C. Linger / Gwendolyn H. Walton / Mark G. Pleszkoch / Paul E. Black / Michael Colon / Theodore Winograd / Elaine Fedchak / Carmen J. Trammell / Holly Lynne McKinley / Thomas McGibbon / Rosann W. Collins / Jesse H. Poore Stacy / Stacy J. Prowell / Karen Mercedes / John Marciniak / Robert Vienneau / /

/

Position

President / SEI Visiting Scientist / Independent Consultant / AUTHOR / technologist / independent consultant / software engineering manager / technologist / /

Product

component detection confidence level Trusted chain / /

ProvinceOrState

Pennsylvania / /

Technology

underutilized technology / encryption / Function Extraction Technology / Depth encryption / SDLC software artifacts Static Analysis Risk Management Calculation Resilience Underutilized Practice Underutilized Technology / /

SocialTag