{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:40:07Z","timestamp":1747579207712,"version":"3.40.5"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2001,11,1]],"date-time":"2001-11-01T00:00:00Z","timestamp":1004572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,11,1]],"date-time":"2001-11-01T00:00:00Z","timestamp":1004572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Annals of Software Engineering"],"published-print":{"date-parts":[[2001,11]]},"DOI":"10.1023\/a:1012587001946","type":"journal-article","created":{"date-parts":[[2002,12,29]],"date-time":"2002-12-29T19:13:07Z","timestamp":1041189187000},"page":"45-78","source":"Crossref","is-referenced-by-count":2,"title":["Managing Software Development for Survivable Systems"],"prefix":"10.1007","volume":"11","author":[{"given":"Nancy R.","family":"Mead","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Richard C.","family":"Linger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"McHugh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Howard F.","family":"Lipson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"380441_CR1","volume-title":"Proceedings of the 1997 Information Survivability Workshop","author":"R.H. Anderson","year":"1997","unstructured":"Anderson, R.H., A.C. Hearn and R.O. Hundley (1997), \"RAND Studies of Cyberspace Security Issues and the Concept of a U.S. Minimum Essential Information Infrastructure,\" In Proceedings of the 1997 Information Survivability Workshop, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA."},{"key":"380441_CR2","volume-title":"Software Risk Management","author":"B.W. Boehm","year":"1989","unstructured":"Boehm, B.W. (1989), Software Risk Management, IEEE Computer Society Press, Los Alamitos, CA."},{"key":"380441_CR3","volume-title":"Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences","author":"J.M. Carrol","year":"1999","unstructured":"Carrol, J.M. (1999), \"Five Reasons for Scenario-Based Design,\" In Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, IEEE Computer Society Press, Los Alamitos, CA."},{"key":"380441_CR4","unstructured":"Department of Defense (DoD) (1985), \"Department of Defense Trusted Computer System Evaluation Criteria,\" DoD 5200.28-STD, National Computer Security Center, Department of Defense Computer Security Center."},{"key":"380441_CR5","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1023\/A:1018933820619","volume":"3","author":"C. Ebert","year":"1997","unstructured":"Ebert, C. (1997), \"Dealing with Nonfunctional Requirements in Large Software Systems,\" Annals of Software Engineering 3, 367-395.","journal-title":"Annals of Software Engineering"},{"key":"380441_CR6","series-title":"Technical Report CMU\/SEI-97-TR-013","volume-title":"Survivable Network Systems: An Emerging Discipline","author":"R. Ellison","year":"1999","unstructured":"Ellison, R., D. Fisher, R.C. Linger, H.F. Lipson, T. Longstaff and N.R. Mead (1999), \"Survivable Network Systems: An Emerging Discipline,\" Technical Report CMU\/SEI-97-TR-013 (November 1997, revised May 1999), Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA."},{"issue":"4","key":"380441_CR7","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/52.776952","volume":"16","author":"R. Ellison","year":"1999","unstructured":"Ellison, R., R.C. Linger, T. Longstaff and N. R. Mead (1999), \"Survivable Network System Analysis: A Case Study,\" IEEE Software 16, 4, 70-77.","journal-title":"IEEE Software"},{"key":"380441_CR8","volume-title":"Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems","author":"R. Kazman","year":"1998","unstructured":"Kazman, R., M. Klein, M. Barbacci, T. Longstaff, H.F. Lipson and S.J. Carriere (1998), \"The Architecture Tradeoff Analysis Method,\" In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, IEEE Computer Society Press, Los Alamitos, CA; available at: http: \/\/www.sei.cmu.edu\/ata\/."},{"issue":"11","key":"380441_CR9","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1109\/32.106972","volume":"17","author":"R.A. Kemmerer","year":"1991","unstructured":"Kemmerer, R.A. and P.A. Porras (1991), \"Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels,\" IEEE Transactions on Software Engineering 17, 11, 1166-1185.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"380441_CR10","volume-title":"Proceedings of 32nd Annual Hawaii International Conference on System Sciences (HICSS-32)","author":"R.C. Linger","year":"1999","unstructured":"Linger, R.C. (1999), \"Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software,\" In Proceedings of 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), IEEE Computer Society Press, Los Alamitos, CA; available at: http:\/\/www.cert. org\/research\/."},{"key":"380441_CR11","volume-title":"Proceedings of the International Conference on Requirements Engineering","author":"R.C. Linger","year":"1998","unstructured":"Linger, R.C., N.R. Mead and H.F. Lipson (1998), \"Requirements Definition for Survivable Network Systems,\" In Proceedings of the International Conference on Requirements Engineering, IEEE Computer Society Press, Los Alamitos, CA, 14-23; available at: http:\/\/www.cert.org\/research\/."},{"key":"380441_CR12","volume-title":"Industrial Strength Formal Methods in Practice","author":"R.C. Linger","year":"1999","unstructured":"Linger, R.C. and C.J. Trammell (1999), \"Cleanroom Software Engineering Theory and Practice,\" In Industrial Strength Formal Methods in Practice, M.G. Hinchey and J.P. Bowen, Eds., Springer, London, UK."},{"key":"380441_CR13","volume-title":"Proceedings of the 1999 New Security Paradigms Workshop","author":"H.F. Lipson","year":"1999","unstructured":"Lipson, H.F. and D.A. Fisher (1999), \"Survivability: A New Technical and Business Perspective on Security,\" In Proceedings of the 1999 New Security Paradigms Workshop, Association for Computing Machinery, New York."},{"key":"380441_CR14","first-page":"184","volume-title":"Proceedings of the 1989 Computer Security Applications Conference","author":"A. Marmor-Squires","year":"1989","unstructured":"Marmor-Squires, A., J. McHugh, M. Branstad, B. Danner, L. Nagy, P. Rougeau and D. Sterne (1989), \"A Risk Driven Process Model for the Development of Trusted Systems,\" In Proceedings of the 1989 Computer Security Applications Conference, IEEE Computer Society Press, Los Alamitos, CA, pp. 184-192."},{"key":"380441_CR15","volume-title":"Proceedings of the 11th National Computer Security Conference","author":"A.B. Marmor-Squires","year":"1988","unstructured":"Marmor-Squires, A.B. and P.A. Rougeau (1988), \"Issues in Process Models and Integrated Environments for Trusted Systems Development,\" In Proceedings of the 11th National Computer Security Conference, National Institute of Standards and Technology, Gaithersburg, MD."},{"key":"380441_CR16","volume-title":"Towards the Generation of Efficient Code from Verified Programs","author":"J. McHugh","year":"1983","unstructured":"McHugh, J. (1983), \"Towards the Generation of Efficient Code from Verified Programs,\" Ph.D. Dissertation, The University of Texas at Austin, Austin, TX."},{"key":"380441_CR17","volume-title":"Handbook for the Computer Security Certification of Trusted Systems","author":"J. McHugh","year":"1994","unstructured":"McHugh, J., C.N. Payne and C. Martin (1994), \"Assurance Mappings,\" In Handbook for the Computer Security Certification of Trusted Systems, Center for High Assurance Computing Systems, Naval Research Laboratory, Washington, DC."},{"key":"380441_CR18","volume-title":"Proceedings of 25th Hawaii International Conference on System Sciences","author":"H.D. Mills","year":"1992","unstructured":"Mills, H.D. (1992), \"Certifying the Correctness of Software,\" In Proceedings of 25th Hawaii International Conference on System Sciences, IEEE Computer Society Press, Los Alamitos, CA."},{"key":"380441_CR19","volume-title":"Principles of Information Systems Analysis and Design","author":"H.D. Mills","year":"1986","unstructured":"Mills, H.D., R.C. Linger and A.R. Hevner (1986), Principles of Information Systems Analysis and Design, Academic Press, New York."},{"issue":"2","key":"380441_CR20","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/TSE.1986.6312940","volume":"12","author":"D.L. Parnas","year":"1986","unstructured":"Parnas, D.L. and P.C. Clements (1986), \"A Rational Design Process: How and Why to Fake It,\" IEEE Transactions on Software Engineering 12, 2, 251-257.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"380441_CR21","volume-title":"Cleanroom Software Engineering: Technology and Process","author":"S.J. Prowell","year":"1999","unstructured":"Prowell, S.J., C.J. Trammell, R.C. Linger and J.H. Poore (1999), Cleanroom Software Engineering: Technology and Process, Addison-Wesley, Reading, MA."},{"key":"380441_CR22","volume-title":"Proceedings of the 9th International Conference on Software Engineering","author":"W.W. Royce","year":"1987","unstructured":"Royce, W.W. (1987), \"Managing the Development of Large Software Systems,\" In Proceedings of the 9th International Conference on Software Engineering, IEEE Computer Society Press, Los Alamitos, CA."},{"key":"380441_CR23","volume-title":"Toward Zero-Defect Programming","author":"A.M. Stavely","year":"1999","unstructured":"Stavely, A.M. (1999), Toward Zero-Defect Programming, Addison-Wesley, Reading, MA."},{"key":"380441_CR24","volume-title":"Proceedings of 1987 IEEE Symposium on Security and Privacy","author":"W.D. Young","year":"1987","unstructured":"Young, W.D. and J. McHugh (1987), \"Coding for a Believable Specification to Implementation Mapping,\" In Proceedings of 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA."}],"container-title":["Annals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1012587001946.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1012587001946\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1012587001946.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:12:12Z","timestamp":1747577532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1012587001946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,11]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,11]]}},"alternative-id":["380441"],"URL":"https:\/\/doi.org\/10.1023\/a:1012587001946","relation":{},"ISSN":["1022-7091","1573-7489"],"issn-type":[{"type":"print","value":"1022-7091"},{"type":"electronic","value":"1573-7489"}],"subject":[],"published":{"date-parts":[[2001,11]]}}}