R E F E R E N C E S
Adams, E. N. (1984). ‘Optimizing preventative service of software products’. IBM J. Res & Dev.,
28 (1), 2–14.
Berghel, H. (2001). ‘The Code Red Worm’. Comm. ACM, 44 (12), 15–19.
Boehm, B. W., McClean, R. L. and Urfig, D. B. (1975). ‘Some experience with automated aids to the
design of large-scale reliable software’. IEEE Trans. on Software Engineering., SE-1 (1), 125–33.
Ellison, R., Linger, R., Lipson, H., Mead, N. and Moore, A. (2002). ‘Foundations of Survivable Systems
Engineering’. Crosstalk: The Journal of Defense Software Engineering, 12, 10–15.
Ellison, R. J., Fisher, D. A., Linger, R. C., Lipson, H. F., Longstaff, T. A. and Mead, N. R. (1999a).
‘Survivability: Protecting Your Critical Systems’. IEEE Internet Computing, 3 (6), 55–63.
Ellison, R. J., Linger, R. C., Longstaff, T. and Mead, N. R. (1999b). ‘Survivable Network System
Analysis: A Case Study’. IEEE Software, 16 (4), 70–7.
Endres, A. (1975). ‘An analysis of errors and their causes in system programs’. IEEE Trans. on
Software Engineering., SE-1 (2), 140–9.
Laprie, J.-C. (1995). ‘Dependable Computing: Concepts, Limits, Challenges’. FTCS- 25: 25th IEEE
Symposium on Fault-Tolerant Computing, Pasadena, Calif.: IEEE Press.
Littlewood, B. (1990). ‘Software Reliability Growth Models’. In Software Reliability Handbook. Rook,
P. (ed.). Amsterdam: Elsevier. 401–412.
Lutz, R. R. (1993). ‘Analysing Software Requirements Errors in Safety-Critical Embedded Systems’.
RE'93, San Diego, Calif: IEEE.
Mills, H. D., Dyer, M. and Linger, R. (1987). ‘Cleanroom Software Engineering’. IEEE Software, 4 (5),
19–25.
Nakajo, T. and Kume, H. (1991). ‘A Case History Analysis of Software Error-Cause Relationships’.
IEEE Trans. on Software Eng., 18 (8), 830–8.
Perrow, C. (1984). Normal Accidents: Living with High-Risk Technology. New York: Basic Books.
Pfleeger, C. P. and Pfleeger, S. L. (2007). Security in Computing, 4th edition. Boston: Addison-
Wesley.
Spafford, E. (1989). ‘The Internet Worm: Crisis and Aftermath’. Comm. ACM, 32 (6), 678–87.
308 Chapter 11 ■ Dependability and security