[1]
|
F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on Information and System Security, Vol. 3, No. 1, 2000, pp. 30-50. doi:10.1145/353323.353382
|
[2]
|
Six Sigma Motorola University, 2011.
http://web.archive.org/web/20051106012600/http://www.motorola.com/motorolauniversity.
|
[3]
|
J. Rees, S. Bandyopadhyay and E. H. Spafford, “PFIRES: A Policy Framework for Information Security,” Communications of the ACM, Vol. 46, No. 7, 2003, pp. 101-106.
doi:10.1145/792704.792706
|
[4]
|
K. J. Knapp, R. F. Morris Jr., T. E. Marshall and T. A. Byrd, “Information Security Policy: An Organizational-Level Process Model”, Computers and Security, Vol. 28, No. 7, 2009, pp. 493-508.
doi:10.1016/j.cose.2009.07.001
|
[5]
|
W. Scacchi, “Process Models in Software Engineering,” Encyclopedia of Software Engineering, 2nd Edition, John Wiley and Sons, Inc., New York, 2001.
|
[6]
|
R. Shankar, “Process Improvement Using Six Sigma: A DMAIC Guide,” ASQ Quality Press, Milwaukee, 2009.
|
[7]
|
D. N. Card, “Myths and Strategies of Defect Causal Analysis”, Proceedings of Pacific Northwest Software Quality Conference, Portland, 18-19 October 2006.
|
[8]
|
G. Zanin and L. V.Mancini, “Towards a Formal Model for Security Policies Specification and Validation in the SELinux System,” Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (ACMAT’04), New York, 2-4 June 2004, pp. 136-145.
|
[9]
|
S. Preda, F. Cuppens, N. Cuppens-Boulahia, J. G. Alfaro, L. Toutain and Y. Elrakaiby, “Semantic Context Aware Security Policy Deployment,” Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS’09), Sydney, 10-12 March 2009, pp. 251-261.
|
[10]
|
D. Xu and K. E. Nygard, “Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets,” IEEE Transactions on Software Engineering, Vol. 32, No. 4, 2006, pp. 265-278.
doi:10.1109/TSE.2006.40
|
[11]
|
“A Complete Guide to the Common Vulnerability Scoring System Version 2.0.,” 2011.
http://www.first.org/cvss/cvss-guide.html.
|
[12]
|
“CMLA Service Provider Agreement,” 2011.
http://www.cm-la.com/documents/CMLA%20Service%20Provider%20Agreement%20V1.42%2020110712%20final.pdf.
|
[13]
|
PostgreSQL, 2011.
http://www.postgresql.org/
|
[14]
|
V. E. Sower, R. Quarles and E. Broussard, “Cost of Quality Usage and Its Relationship to Quality System Maturity,” International Journal of Quality & Reliability Management, Vol. 24, No. 2, 2007, pp. 121-140.
doi:10.1108/02656710710722257
|
[15]
|
M. Lazzaroni, “A Tool for Quality Controls in Industrial Process,” IEEE Instrumentation and Measurement Technology Conference, Suntec City, 3-6 March 2009.
doi:10.1109/IMTC.2009.5168418
|
[16]
|
H. De Koning and J. De Mast, “ASQ: The CTQ Flowdown as a Conceptual Model of Project Objectives,” Quality Management Journal, Vol. 14, No. 2, 2007, pp. 19-28.
|
[17]
|
L. Grunske, R. Colvin and K. Winter, “Probabilistic Model-Checking Support for FMEA,” 4th International Conference on the Quantitative Evaluation of Systems (QEST 2007), Edinburgh, 16-19 September 2007, pp. 119-128.
|
[18]
|
National Vulnerability Database (NVD), 2011.
http://nvd.nist.gov/home.cfm
|
[19]
|
H. P. Barringer, “Process Reliability and Six Sigma,” National Manufacturing Week Conference, Chicago, 13-16 March 2000.
|
[20]
|
C. Hsieh, B. Lin and Bill Manduca, “Information Technology and Six Sigma Implementation,” Journal of Computer Information Systems, Vol. 47, No. 4, 2007, pp. 1-10.
|
[21]
|
A. Takanen, J. DeMott and C.Miller, “Fuzzing for Software Security Testing and Quality Assurance,” 1st Edition, Artech House, London, 2008.
|
[22]
|
“The ANOVA Procedure, SAS/STAT(R) 9.2 User’s Guide,” 2nd Edition, 2011.
http://support.sas.com/documentation/cdl/en/statuganova/61771/PDF/default/statuganova.pdf
|
[23]
|
M. Tanco, E. Viles, L. Ilzarbe and M. álvarez, “Manufacturing Industries Need Design of Experiments (DoE),” Proceedings of the World Congress on Engineering (WCE 2007), London, Vol. 2, 2-4 July 2007.
|
[24]
|
D. M. Ferrin, M. J. Miller and D. Muthler, “Six Sigma and Simulation, So What’s the Correlation,” Proceedings of the 2002 Winter Simulation Conference, 8-11 December 2002, pp. 1439-1443.
|
[25]
|
M. J. McDonald, “Quality Prediction and Mistake Proofing,” Technical Report, Sandia National Laboratories, Washington, DC, 1998. doi:10.2172/650152
|