1 |
Common Criteria, version 3.1, Part 3, http://commoncriteriaportal.org, 2006.
|
2 |
National Vulnerability Database Version 2.2, http://nvd.nist.gov/
|
3 |
Common Vulnerability Score System version 2.0, http://nvd.nist.gov/ cvss.cfm, 2007.
|
4 |
Common Vulnerability and Exposures, http://cve.mitre.org/index.html.
|
5 |
R. Seacord, The CERT C Secure Coding Standard, Addison Wesley, pp. 25-27, Oct. 2008.
|
6 |
DACS, Enhancing the Development Life Cycle to Produce Secure Software, pp. 149-177, http://www.thedacs.com, Oct. 2008.
|
7 |
통합인증프레임워크 가이드, 행정안전부, p. 24, 2009년 8월.
|
8 |
국가 사이버안전매뉴얼, 5장 보안관리수준 평가, 국가정보원 pp.97-99, 2005년 10월.
|
9 |
The Department of Homeland Security, Practical Measurement Framework for Software Assurance and Information Security, http:// buildsecurityin.us-cert.gov/, Oct, 2008.
|
10 |
G. McGraw, Software Security: Building Security In, Addison Wesley, pp. 83-86, Feb. 2006.
|
11 |
J. West, Secure Programming with Static Analysis, Addison-Wesley, pp. 11-13, Jun. 2007.
|
12 |
L. Laird and M Brennan, Software Measurement and Estimation: A Practical Approach, Wiley Inter-Science, pp. 58-67, Jun. 2006.
|