-
1
-
-
0003513832
-
Security analysis and enhancements of computer operating systems
-
NBSIR 76-1041, National Bureau of Standards, ICST, Washington, D.C
-
ABBOTT, R. P., CHIN, J. S., DONNELLEY, J. E., KONIGSFORD, W. L., TOKUBO, S., AND WEBB, D. A. 1976. Security analysis and enhancements of computer operating systems. NBSIR 76-1041, National Bureau of Standards, ICST, Washington, D.C.
-
(1976)
-
-
ABBOTT, R.P.1
CHIN, J.S.2
DONNELLEY, J.E.3
KONIGSFORD, W.L.4
TOKUBO, S.5
WEBB, D.A.6
-
2
-
-
0004200684
-
Computer security technology planning study
-
ESD-TR-73-51, vols. I and II. NTIS AD758206, Hanscom Field, Bedford, Mass
-
ANDERSON, J. P. 1972. Computer security technology planning study. ESD-TR-73-51, vols. I and II. NTIS AD758206, Hanscom Field, Bedford, Mass.
-
(1972)
-
-
ANDERSON, J.P.1
-
3
-
-
84976735452
-
-
ISI/RR-78-13, DTIC AD A056816, USC/Information Sciences Inst., 1978
-
BISBEY R., II AND HOLLINGWORTH, D. 1978. Protection analysis project final report. ISI/RR-78-13, DTIC AD A056816, USC/Information Sciences Inst., 1978.
-
(1978)
Protection analysis project final report
-
-
BISBEY, R.1
HOLLINGWORTH, D.2
-
4
-
-
84976703490
-
Incorporating IEEE Standard 1044 into your anomaly tracking process
-
(Jan.)
-
BREHMER, C. L. AND CARL, J. R. 1993. Incorporating IEEE Standard 1044 into your anomaly tracking process. CrossTalk, J. Def. Softw. Eng. 6, 1 (Jan.), 9-16.
-
(1993)
CrossTalk, J. Def. Softw. Eng.
, vol.6
, Issue.1
, pp. 9-16
-
-
BREHMER, C.L.1
CARL, J.R.2
-
5
-
-
0026944574
-
Orthogonal defect classification-a concept for in-process measurements
-
(Nov.)
-
CHILLAREGE, R., BHANDARI, I. S., CHAAR, J. K., HALLIDAY, M. J., MOEBUS, D. S., RAY, B. K., AND WONG, M.-Y. 1992. Orthogonal defect classification-a concept for in-process measurements. IEEE Trans. Softw. Eng. 18, 11 (Nov.), 943-956.
-
(1992)
IEEE Trans. Softw. Eng.
, vol.18
, Issue.11
, pp. 943-956
-
-
CHILLAREGE, R.1
BHANDARI, I.S.2
CHAAR, J.K.3
HALLIDAY, M.J.4
MOEBUS, D.S.5
RAY, B.K.6
WONG, M.-Y.7
-
7
-
-
84962290765
-
-
DoD 5200.28-STD, U.S. Dept. of Defense, Washington, D.C.
-
DEPARTMENT OF DEFENSE. 1985. Trusted computer system evaluation criteria. DoD 5200.28-STD, U.S. Dept. of Defense, Washington, D.C.
-
(1985)
Trusted computer system evaluation criteria
-
-
-
9
-
-
0013175067
-
Computer viruses
-
(May-June)
-
DENNING, P. J. 1988. Computer viruses. Am. Sci. 76 (May-June), 236-238.
-
(1988)
Am. Sci.
, vol.76
, pp. 236-238
-
-
DENNING, P.J.1
-
10
-
-
0001717425
-
Invasion of the data snatchers
-
(Sept. 26)
-
ELMER-DEWITT, P. 1988. Invasion of the data snatchers. TIME Mag. (Sept. 26), 62-67.
-
(1988)
TIME Mag
, pp. 62-67
-
-
ELMER-DEWITT, P.1
-
12
-
-
0009619753
-
Software quality measurement: A framework for counting problems and defects
-
CMU/SEI-92-TR-22, Software Engineering Inst. Pittsburgh, Pa
-
FLORAC, W. A. 1992. Software quality measurement: A framework for counting problems and defects. CMU/SEI-92-TR-22, Software Engineering Inst. Pittsburgh, Pa.
-
(1992)
-
-
FLORAC, W.A.1
-
15
-
-
0015672289
-
A note on the confinement problem
-
(Oct.)
-
LAMPSON, B. W. 1973. A note on the confinement problem. Commun. ACM 16, 10 (Oct.), 613-615.
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
LAMPSON, B.W.1
-
16
-
-
0020780166
-
The best available technologies for computer security
-
(July)
-
LANDWEHR, C. E. 1983. The best available technologies for computer security. IEEE Comput. 16, 7 (July), 86-100.
-
(1983)
IEEE Comput
, vol.16
, Issue.7
, pp. 86-100
-
-
LANDWEHR, C.E.1
-
17
-
-
0019608720
-
Formal models for computer security
-
(Sept.)
-
LANDWEHR, C. E. 1981. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept.), 247-278.
-
(1981)
ACM Comput. Surv.
, vol.13
, Issue.3
, pp. 247-278
-
-
LANDWEHR, C.E.1
-
18
-
-
0003414571
-
-
Springer-Verlag Series in Dependable Computing and Fault-Tolerant Systems, Springer-Verlag, New York
-
LAPRIE, J. C., ED. 1992. Dependability. Basic Concepts and Terminology. Springer-Verlag Series in Dependable Computing and Fault-Tolerant Systems, vol. 6, Springer-Verlag, New York.
-
(1992)
Dependability. Basic Concepts and Terminology.
, vol.6
-
-
LAPRIE, J.C.1
-
19
-
-
0842340774
-
An investigation of the Therac-25 accidents
-
UCI TR-92-108, Information and Computer Science Dept., Univ. of California, Irvine, Ca
-
LEVESON, N. AND TURNER, C. S. 1992. An investigation of the Therac-25 accidents. UCI TR-92-108, Information and Computer Science Dept., Univ. of California, Irvine, Ca.
-
(1992)
-
-
LEVESON, N.1
TURNER, C.S.2
-
20
-
-
0016600186
-
Operating system penetration
-
AFIPS, Arlington, Va.
-
LINDE, R. R. 1975. Operating system penetration. In the AFIPS National Computer Conference. AFIPS, Arlington, Va., 361-368.
-
(1975)
AFIPS National Computer Conference
, pp. 361-368
-
-
LINDE, R.R.1
-
21
-
-
33846278859
-
A technique for removing an important class of Trojan horses from high order languages
-
NBS/NCSC, Gaithersburg, Md.
-
MCDERMOTT, J. P. 1988. A technique for removing an important class of Trojan horses from high order languages. In Proceedings of the 11th National Computer Security Conference. NBS/NCSC, Gaithersburg, Md., 114-117.
-
(1988)
Proceedings of the 11th National Computer Security Conference
, pp. 114-117
-
-
MCDERMOTT, J.P.1
-
22
-
-
0018047016
-
Computer security evaluation
-
AFIPS, Arlington, Va.
-
NEUMANN, P. G. 1978. Computer security evaluation. In the 1978 National Computer Conference, AFIPS Conference Proceedings 47. AFIPS, Arlington, Va., 1087-1095.
-
(1978)
1978 National Computer Conference, AFIPS Conference Proceedings
, vol.47
, pp. 1087-1095
-
-
NEUMANN, P.G.1
-
25
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
(June)
-
ROCHLIS, J. A. AND EICHEN, M W. 1989. With microscope and tweezers: The worm from MIT's perspective. Commun. ACM 32, 6 (June), 689-699.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 689-699
-
-
ROCHLIS, J.A.1
EICHEN, M.W.2
-
26
-
-
3943108716
-
Computer security: The Achilles heel of the electronic Air Force?
-
(Jan.-Feb.)
-
SCHELL, R. R. 1979. Computer security: The Achilles heel of the electronic Air Force? Air Univ. Rev. 30, 2 (Jan.-Feb.), 16-33.
-
(1979)
Air Univ. Rev.
, vol.30
, Issue.2
, pp. 16-33
-
-
SCHELL, R.R.1
-
27
-
-
84976720856
-
The “worm” programs-early experience with a distributed computation
-
(Mar.)
-
SCHOCH, J. F. AND HUPP, J. A. 1982. The “worm” programs-early experience with a distributed computation. Commun. ACM 25, 3 (Mar.), 172-180.
-
(1982)
Commun. ACM
, vol.25
, Issue.3
, pp. 172-180
-
-
SCHOCH, J.F.1
HUPP, J.A.2
-
28
-
-
0024681099
-
Crisis and aftermath
-
(June)
-
SPAFFORD, E. H. 1989. Crisis and aftermath. Commun. ACM 32, 6 (June), 678-687.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
SPAFFORD, E.H.1
-
29
-
-
84957056268
-
A comparison of software defects in database management systems and operating systems
-
IEEE Computer Society, Boston, Mass., (FTCS-22)(July).
-
SULLIVAN, M. R. AND CHILLAREGE, R. 1992. A comparison of software defects in database management systems and operating systems. In Proceedings of the 22nd International Symposium on Fault-Tolerant Computer Systems IEEE Computer Society, Boston, Mass., (FTCS-22) (July).
-
(1992)
Proceedings of the 22nd International Symposium on Fault-Tolerant Computer Systems
-
-
SULLIVAN, M.R.1
CHILLAREGE, R.2
-
30
-
-
84976781807
-
Reflections on trusting trust
-
(Aug.)
-
THOMPSON, K. 1984. Reflections on trusting trust. Commun. ACM 27, 8 (Aug.), 761-763.
-
(1984)
Commun. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
THOMPSON, K.1
-
31
-
-
0022012701
-
Evaluating software development by analysis of changes: Some data from the Software Engineering Laboratory
-
(Feb.)
-
WEISS, D. M. AND BASILI, V. R. 1985. Evaluating software development by analysis of changes: Some data from the Software Engineering Laboratory. IEEE Trans. Softw Eng. SE-11, 2 (Feb.), 157-168.
-
(1985)
IEEE Trans. Softw Eng. SE-11
, vol.2
, pp. 157-168
-
-
WEISS, D.M.1
BASILI, V.R.2
|