Security Document Citations

[SALT75]J. H. Saltzer and M. D. Schroeder, “The protection of information in computer systems,” Proceedings ofthe IEEE, vol. 63, no. 9, pp. 1278-1308, Sep 1975.
[PAUL09]M. Paul, “The Ten Best Practices for Secure Software Development,” International Information Systems Security Certification Consortium, Inc. [(ISC)2®], Palm Harbor, FL, USA, 2009.
[MS12]Microsoft Corporation, Security Development Lifecycle - SDL Process Guidance Version 5.2,2012.
[CCITSE12]Common Criteria for Information Technology Security Evaluation ver. 3.1 rev. 4, 2012.
[MICR16]Micrium, “Certification Kits,” 2016. [Online]. Available: https://www.micrium.com/certification/certification-kits/.
[NIST02]National Institute of Standards and Technology, FIPS PUB 140-2: Security Requirements for COMPANY PUBLIC Application note Cryptographic Modules, Gaithersburg, 2002.
[GHS10]Green Hills Software, “INTEGRITY-178B Separation Kernel Security Target v4.2,” 2010.