Monday
Sep012014

Sep/Oct 2014

Acquisition of Software-Reliant Capabilities

Download Entire Sep/Oct 2014 Issue (PDF 12MB)

View Online Digital Flipbook Version (Requires Adobe Flash)

Table of Contents
(click below to download individual articles from the Sep/Oct 2014 issue)

From the Publisher
by Justin T. Hill
Download Article (PDF)

Using Concept Maps to Introduce Software Security Assurance Cases
by Dallas Snider, John Coffey, Thomas Reichherzer, Norman Wilde, Chris Terry, Joe Vandeville, Allison Heinen, and Sarah Pramanik
To improve the security of software systems, we need to improve the software development processes used to produce them.
Download Article (PDF)

Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals
by Dan Shoemaker and Nancy R. Mead
As the potential for highly destructive cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software.
Download Article (PDF)

Evaluating Security Risks Using Mission Threads
by Carol Woody, Ph.D., and Christopher Alberts
Using mission threads to connect desired operational capability to the underlying technology for analysis of system and software qualities such as security.
Download Article (PDF)

The Necessity of Intended Use Specification for Successful Modeling and Simulation of a System-of-Systems
by Charles H. Piersall III, P.E. and Frank Grange Ph.D.
Informal and casual consideration of Intended Use in Modeling and Simulation practice can pose programmatic risks in acquisition.
Download Article (PDF)

Software Assurance, Trustworthiness, and Rigor
by Don O'Neill
Trustworthiness requires a commitment to rigor in both software production and its verification. No soft skill, rigor has a hard edge.
Download Article (PDF)

N-Version Architectural Framework for Application Security Automation (NVASA)
by Majid Malaika, Suku Nair, and Frank Coyle
Detecting and preventing attacks through an application security framework that uses the N-Version programming methodology.
Download Article (PDF)

Acquisition Anonymous
by Paul Kimmerly
A proactive twelve-step program for government acquisition.
Download Article (PDF)

Forecasting from Defect Signals
by Paul Below
On large software development and acquisition Programs, testing phases typically extend over many months. It is important to forecast the quality of the software at that future time when the schedule calls for testing to be complete.
Download Article (PDF)

Agile Surveillance Points: An Alternative to Milestone Reviews
by Dick Carlson
An approach to using surveillance points throughout a project lifecycle as the basis for technical interchange meetings.
Download Article (PDF)

BackTalk
by David A. Cook,
Download Article (PDF)