jagomart
digital resources
picture1_Software Development Life Cycle Pdf 179192 | File Item Download 2023-01-29 22-36-03


 136x       Filetype PDF       File size 0.20 MB       Source: s3-eu-west-1.amazonaws.com


File: Software Development Life Cycle Pdf 179192 | File Item Download 2023-01-29 22-36-03
secure software development life cycle processes a technology scouting report noopur davis december 2005 software engineering process management unlimited distribution subject to the copyright technical note cmu sei 2005 tn ...

icon picture PDF Filetype PDF | Posted on 29 Jan 2023 | 2 years ago
Partial capture of text on file.
                               Secure Software Development  
                               Life Cycle Processes:  
                               A Technology Scouting Report 
                                
                                
                               Noopur Davis 
                                
                                
                                
                               December 2005 
                                
                                
                                
                               Software Engineering Process Management 
                                
                                
                                
                                
                                
                                
                                
                                
                                
                                
                               Unlimited distribution subject to the copyright. 
                                
            Technical Note 
         CMU/SEI-2005-TN-024 
          This work is sponsored by the U.S. Department of Defense. 
          The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. 
          Department of Defense. 
          Copyright 2005 Carnegie Mellon University. 
          NO WARRANTY 
          THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS 
          FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY 
          KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, 
          WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED 
          FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF 
          ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. 
          Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. 
          Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is 
          granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. 
          External use. Requests for permission to reproduce this document or prepare derivative works of this document for external 
          and commercial use should be addressed to the SEI Licensing Agent. 
          This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie 
          Mellon University for the operation of the Software Engineering Institute, a federally funded research and development 
          center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the 
          work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the 
          copyright license under the clause at 252.227-7013. 
          For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site 
          (http://www.sei.cmu.edu/publications/pubweb.html). 
           
           
                          Contents 
                          Acknowledgements............................................................................................vii 
                          Abstract.................................................................................................................ix 
                          1    Introduction....................................................................................................1 
                                1.1  Definitions...............................................................................................1 
                                1.2  Background.............................................................................................3 
                          2    Capability Maturity Models (CMMs).............................................................5 
                                2.1  Capability Maturity Model Integration (CMMI) ........................................5 
                                2.2  Federal Aviation Administration integrated Capability Maturity Model  
                                                                                                                    
                                      (FAA-iCMM)............................................................................................8
                                2.3  Trusted CMM/Trusted Software Methodology (T-CMM/TSM)...............10 
                                2.4  Systems Security Engineering Capability Maturity Model (SSE-CMM) 10 
                                2.5  Proposed Safety and Security Additions to the CMMI and  
                                                                                                                    
                                      FAA-iCMM............................................................................................12
                          3    Additional Processes, Process Models, and Methodologies..................14 
                                3.1  Microsoft’s Trustworthy Computing Security Development Lifecycle....14 
                                3.2  Team Software Process for Secure Software Development.................14 
                                3.3  Correctness by Construction................................................................17 
                                3.4  Agile Methods.......................................................................................18 
                                3.5  The Common Criteria...........................................................................20 
                          4    Summary......................................................................................................22 
                          Bibliography........................................................................................................23 
                           
                          CMU/SEI-2005-TN-024                                                                       i 
           
          ii  CMU/SEI-2005-TN-024 
The words contained in this file might help you see if this file matches what you are looking for:

...Secure software development life cycle processes a technology scouting report noopur davis december engineering process management unlimited distribution subject to the copyright technical note cmu sei tn this work is sponsored by u s department of defense institute federally funded research and center carnegie mellon university no warranty material furnished on an as basis makes warranties any kind either expressed or implied matter including but not limited fitness for purpose merchantability exclusivity results obtained from use does make with respect freedom patent trademark infringement trademarks in intended way infringe rights holder internal permission reproduce document prepare derivative works granted provided statements are included all reproductions external requests commercial should be addressed licensing agent was created performance federal government contract number fa c operation united states has royalty free license duplicate disclose whole part manner have permit o...

no reviews yet
Please Login to review.