Security Document Citations¶
[SALT75] | J. H. Saltzer and M. D. Schroeder, “The protection of information in computer systems,” Proceedings ofthe IEEE, vol. 63, no. 9, pp. 1278-1308, Sep 1975. |
[PAUL09] | M. Paul, “The Ten Best Practices for Secure Software Development,” International Information Systems Security Certification Consortium, Inc. [(ISC)2®], Palm Harbor, FL, USA, 2009. |
[MS12] | Microsoft Corporation, Security Development Lifecycle - SDL Process Guidance Version 5.2,2012. |
[CCITSE12] | Common Criteria for Information Technology Security Evaluation ver. 3.1 rev. 4, 2012. |
[MICR16] | Micrium, “Certification Kits,” 2016. [Online]. Available: https://www.micrium.com/certification/certification-kits/. |
[NIST02] | National Institute of Standards and Technology, FIPS PUB 140-2: Security Requirements for COMPANY PUBLIC Application note Cryptographic Modules, Gaithersburg, 2002. |
[GHS10] | Green Hills Software, “INTEGRITY-178B Separation Kernel Security Target v4.2,” 2010. |