1. Alberts, C.
,
Dorofee, A.
,
Stevens, J.
and
Woody, C.
(2003),
Introduction to the OCTAVE Approach
, Carnegie Mellon University, Pittsburgh, PA.
2. Alberts, C.J.
and
Dorofee, A.
(2002),
Managing Information Security Risks: The OCTAVE Approach
, Addison-Wesley Longman Publishing Co. Inc., Boston, MA.
3. Anderson, R.
(2001), “Why information security is hard-an economic perspective”, Computer Security Applications Conference, ACSAC 2001. Proceedings 17th Annual 2001, IEEE, pp. 358-365.
4. Beigi, M.
,
Devarakonda, M.
,
Jain, R.
,
Kaplan, M.
,
Pease, D.
,
Rubas, J.
,
Sharma, U.
and
Verma, A.
(2005), “Policy-based information lifecycle management in a large-scale file system, Policies for Distributed Systems and Networks”, Sixth IEEE International Workshop on 2005, IEEE, pp. 139-148.
5. Blakley, B.
,
Mcdermott, E.
and
Geer, D.
(2001),
Information Security is Information Risk Management, Proceedings of the 2001 Workshop on New Security Paradigms
, ACM, Cloudcroft, New Mexico, pp. 97-104.