Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Robert J. Ellison"'
Autor:
Robert J. Ellison
The 2005 Department of Defense Guide for Achieving Reliability, Availability, and Maintainability (RAM) recommended an emphasis on engineering analysis with formal design reviews with less reliance on RAM predictions. A number of studies have shown t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::195751f76af6941d22c3689f43990411
https://doi.org/10.21236/ada609884
https://doi.org/10.21236/ada609884
Autor:
Rita C. Creel, Christopher J. Alberts, Elizabeth T Stark, John D. McGregor, Robert J. Ellison, Carol Woody, Tamara Marshall-Keim, Joseph P. Elm, Jen Lavan
This material is based on work funded and supported by Department of Homeland Security and is also available at FirstResponder.gov in the Technology Documents Library. This report presents four best practices for the Wireless Emergency Alerts (WEA) p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::12e14896d84603ec8c43a83660546bd1
https://doi.org/10.21236/ada609915
https://doi.org/10.21236/ada609915
Autor:
Carol Woody, Robert J. Ellison
Trust is a key factor in the effectiveness of the Wireless Emergency Alerts (WEA) service. Alert originators at emergency management agencies must trust WEA to deliver alerts to the public in an accurate and timely manner. Members of the public must
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b0e226ecdba824f81790a4deec1cfd4b
https://doi.org/10.21236/ada609838
https://doi.org/10.21236/ada609838
Publikováno v:
IEEE Software. 16:70-77
The Survivable Network Analysis method permits assessment of survivability at the architecture level. Steps include system mission and architecture definition, essential capability definition, compromisable capability definition, and survivability an
Publikováno v:
HICSS
In today's business environment, multiple organizations must routinely work together in software supply chains when acquiring, developing, operating, and maintaining software products. The programmatic and product complexity inherent in software supp
Autor:
Chelene Fortier-Lozancich, Drew Brown, Nancy R. Mead, Sean Barnum, Robin A. Gandhi, Thomas A Augustine, Robert J. Ellison, Yannick Moy, Kasey Thompson
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5e5be19a3e34d0287b9efb5dfece666e
https://doi.org/10.21236/ada552354
https://doi.org/10.21236/ada552354
Autor:
Robert J. Ellison, Carol Woody
Publikováno v:
HICSS
As outsourcing and expanded use of commercial off-the-shelf (COTS) products increase, supply-chain risk becomes a growing concern for software acquisitions. Supply-chain risks for hardware procurement include manufacturing and delivery disruptions, a
Complexity and change pervade today's organizations. Organizational and technology components that must work together may be created, managed, and maintained by different entities. Net-centric operations and service-oriented architectures will push t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::49fee4fea80bcdd0064fcdfbf87dd5d1
https://doi.org/10.21236/ada482224
https://doi.org/10.21236/ada482224
Autor:
Robert J. Ellison, Andrew P. Moore
Publikováno v:
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security.
High confidence in a system's survivability requires an accurate understanding of the system's threat environment and the impact of that environment on system operations. This paper describes a framework for intrusion-aware design called trustworthy
Autor:
Robert J. Ellison, Andrew P. Moore
High confidence in a system’s survivability requires an accurate understanding of the sys-tem’s threat environment and the impact of that environment on system operations. Unfortu-nately, existing development methods for secure and survivable inf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a1a7830db4ecd04044e95db6b895bc4d
https://doi.org/10.21236/ada414865
https://doi.org/10.21236/ada414865