메뉴 건너뛰기




Volumn 16, Issue 1, 1997, Pages 29-46

Information system attacks: A preliminary classification scheme

Author keywords

[No Author keywords available]

Indexed keywords

ENGINEERING RESEARCH; INFORMATION TECHNOLOGY; RISK ASSESSMENT; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 0030701247     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(97)85785-9     Document Type: Article
Times cited : (57)

References (62)
  • 1
    • 85030050694 scopus 로고    scopus 로고
    • Joint Program Office for Special Technology Countermeasures, September 30, 1996
    • Agudo, 1996. Assessment of Electric Power Control Systems Security, Joint Program Office for Special Technology Countermeasures, September 30, 1996.
    • (1996) Assessment of Electric Power Control Systems Security
    • Agudo1
  • 7
    • 0017629542 scopus 로고
    • A unified method for the specification and verification of protocols
    • Toronto, 1977
    • Bochmann, G.V. and Gecsei, J., 1977. A Unified Method for the Specification and Verification of Protocols, IFIP Congress, Toronto, 1977, pp. 229-234.
    • (1977) IFIP Congress , pp. 229-234
    • Bochmann, G.V.1    Gecsei, J.2
  • 9
    • 0021558192 scopus 로고
    • Computer viruses - Theory and experiments
    • Toronto, 1984
    • Cohen, F., 1984. Computer Viruses - Theory and Experiments, IFIP TC-11 Conference, Toronto, 1984.
    • (1984) IFIP TC-11 Conference
    • Cohen, F.1
  • 10
    • 0042686337 scopus 로고
    • Algorithmic authentication of identification
    • January 1985
    • Cohen, F., 1985. Algorithmic Authentication of Identification, Information Age, January 1985, pp. 35-41, 7, 1.
    • (1985) Information Age , pp. 35-41
    • Cohen, F.1
  • 11
    • 0022131794 scopus 로고
    • A secure computer network design, IFIP, TC-11
    • 1985
    • Cohen, F., 1985b . A Secure Computer Network Design, IFIP, TC-11, Computers & Security, Vol. 4, No. 3, 1985, pp. 189-205.
    • (1985) Computers & Security , vol.4 , Issue.3 , pp. 189-205
    • Cohen, F.1
  • 13
    • 0023331449 scopus 로고
    • Protection and administration of information networks under partial orderings, IFI
    • 1987
    • Cohen, F., 1987. Protection and Administration of Information Networks under Partial Orderings, IFIP-TC11, Computers & Security, Vol. 6, 1987, pp. 118-128.
    • (1987) Computers & Security , vol.6 , pp. 118-128
    • Cohen, F.1
  • 16
    • 0042686338 scopus 로고
    • Models of practical defenses against computer viruses, IFIP-TC11
    • 1988
    • Cohen, F., 1988b. Models of Practical Defenses Against Computer Viruses, IFIP-TC11, Computers & Security, Vol. 7, No. 6, 1988.
    • (1988) Computers & Security , vol.7 , Issue.6
    • Cohen, F.1
  • 19
    • 0042686339 scopus 로고
    • Operating systems protection through program evolution, IFIP-TC11
    • 1994
    • Cohen, F., 1994b. Operating Systems Protection Through Program Evolution, IFIP-TC11, Computers & Security, 1994.
    • (1994) Computers & Security
    • Cohen, F.1
  • 20
    • 0040825839 scopus 로고
    • John Wiley and Sons, 1994
    • Cohen, F., 1994c. It's Alive!!!, John Wiley and Sons, 1994.
    • (1994) It's Alive!!!
    • Cohen, F.1
  • 22
  • 23
    • 0042185237 scopus 로고
    • Experiments on the impact of computer viruses on modern computer networks, IFIP-TC11
    • 1994
    • Cohen, F., and Mishra, S., 1994. Experiments on the Impact of Computer Viruses on Modern Computer Networks, IFIP-TC11, Computers & Security, 1994.
    • (1994) Computers & Security
    • Cohen, F.1    Mishra, S.2
  • 25
    • 85030055442 scopus 로고    scopus 로고
    • A secure world-wide-web server, IFIP-TC11
    • 1997, in press
    • Cohen, F., 1997. A Secure World-Wide-Web Server, IFIP-TC11, Computers & Security, 1997, in press.
    • (1997) Computers & Security
    • Cohen, F.1
  • 27
    • 85030040000 scopus 로고    scopus 로고
    • Power Research Institute, Draft, December 5, 1996, Palo Alto, California, USA
    • Power Research Institute, Draft, December 5, 1996, Palo Alto, California, USA.
  • 30
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • 1976
    • Denning, D.E., 1976. A Lattice Model of Secure Information Flow, Communications of the ACM, Vol. 19, No. 5, 1976, pp. 236-243.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 33
    • 0015641828 scopus 로고
    • On the advantages of tagged architecture
    • July 1973
    • Feustal, E.A., 1973. On the Advantages of Tagged Architecture, IEEE Trans. on Computers C-22, No. 7, July 1973, pp. 644-656.
    • (1973) IEEE Trans. on Computers , vol.C-22 , Issue.7 , pp. 644-656
    • Feustal, E.A.1
  • 35
    • 0020647877 scopus 로고
    • Modular verification of computer communication protocols
    • January 1983
    • Hailpern, B.T. and Owicki, S.S., 1983. Modular Verification of Computer Communication Protocols, IEEE Communications, Vol. 31, No. 1, January 1983.
    • (1983) IEEE Communications , vol.31 , Issue.1
    • Hailpern, B.T.1    Owicki, S.S.2
  • 36
    • 0016984825 scopus 로고
    • Protection in operating systems
    • August 1976
    • Harrison, M. et al., 1976. Protection in Operating Systems. CACM, Vol.19, No. 8, August 1976, pp. 461-471.
    • (1976) CACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1
  • 39
    • 0042185226 scopus 로고
    • Cryptanalysts corner
    • January 1978
    • Knight, G., 1978. Cryptanalysts Corner, Cryptologia, Vol. 1, January 1978, pp. 68-74.
    • (1978) Cryptologia , vol.1 , pp. 68-74
    • Knight, G.1
  • 40
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October 1973
    • Lampson, B.W., 1973. A Note on the Confinement Problem, CACM, 16(1), October 1973, pp. 613-615.
    • (1973) CACM , vol.16 , Issue.1 , pp. 613-615
    • Lampson, B.W.1
  • 41
    • 0020780166 scopus 로고
    • The best available technologies for computer security
    • July 1983
    • Landwehr, C.E., 1983. The Best Available Technologies for Computer Security, IEEE Computer, Vol. 16, No. 7, July 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7
    • Landwehr, C.E.1
  • 43
    • 0000524153 scopus 로고
    • Intrusion detection: Its role and validation
    • 1992
    • Liepins, G.E. and Vaccaro, H.S., 1982. Intrusion Detection: Its Role and Validation, Computers & Security, Vol. 11, 1992, pp. 347-355.
    • (1982) Computers & Security , vol.11 , pp. 347-355
    • Liepins, G.E.1    Vaccaro, H.S.2
  • 45
    • 0018541899 scopus 로고
    • Specification and validation of protocols
    • November 1979
    • Merlin, P.M., 1979. Specification and Validation of Protocols, IEEE Communications, Vol. 27, No. 11, November 1979.
    • (1979) IEEE Communications , vol.27 , Issue.11
    • Merlin, P.M.1
  • 46
    • 0004131498 scopus 로고
    • Addison Wesley, ACM Press, 1995
    • Neumann, P.G., 1995. Computer Related Risks. Addison Wesley, ACM Press, 1995. Neumann, E and Parker, D., 1989. A Summary of Computer Misuse Techniques, Proceedings of the 12th National Computer Conference, October 1989.
    • (1995) Computer Related Risks
    • Neumann, P.G.1
  • 48
    • 85030035500 scopus 로고    scopus 로고
    • note
    • NSTAC, 1996. National Security Telecommunication Advisory Committee, Information Assurance Task Force - Electric Power Information Assurance Risk Assessment, November 1996 draft.
  • 50
    • 0042185219 scopus 로고
    • Restoration in a flash - Using DS3 cross-connects
    • September 10, 1990
    • Pekarske, R., 1990. Restoration in a Flash - Using DS3 Cross-connects, Telephony, September 10, 1990.
    • (1990) Telephony
    • Pekarske, R.1
  • 53
    • 33646946462 scopus 로고
    • Some experience with test sequence generation for protocols
    • C. Sunshine editor, North-Holland Publishing, 1982
    • Sarikaya, B and Bochmann, G.V., 1982. Some Experience with Test Sequence Generation for Protocols, Protocol Specification, Testing, and Verification II, C. Sunshine editor, North-Holland Publishing, 1982.
    • (1982) Protocol Specification, Testing, and Verification II
    • Sarikaya, B.1    Bochmann, G.V.2
  • 54
    • 84890522850 scopus 로고
    • Communications theory of secrecy systems
    • 1949
    • Shannon, C., 1949. Communications Theory of Secrecy Systems, Bell Systems Technical Journal, 1949, pp. 656-715.
    • (1949) Bell Systems Technical Journal , pp. 656-715
    • Shannon, C.1
  • 55
    • 85030048142 scopus 로고
    • Software Engineering Research Center, Computer Science Department, Purdue University, March 1992
    • Spafford, E., 1992. Common System Vulnerabilities, Software Engineering Research Center, Computer Science Department, Purdue University, March 1992.
    • (1992) Common System Vulnerabilities
    • Spafford, E.1
  • 56
    • 0018520773 scopus 로고
    • Formal techniques for protocol specification and verification
    • 1979
    • Sunshine, C., 1979. Formal Techniques for Protocol Specification and Verification, IEEE Computer, 1979.
    • (1979) IEEE Computer
    • Sunshine, C.1
  • 58
    • 84960561455 scopus 로고
    • On computable numbers, with an application to the entscheidungs problem
    • November 12, 1936
    • Turing, A., 1936. On Computable Numbers, with an Application to the Entscheidungs Problem, London Math Soc. Ser 2., Vol 42, November 12, 1936, pp. 230-265.
    • (1936) London Math Soc. Ser 2 , vol.42 , pp. 230-265
    • Turing, A.1
  • 59
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk?
    • 1985
    • van Eck, W., 1985. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Computers & Security, Vol 4, 1985, pp. 269-286.
    • (1985) Computers & Security , vol.4 , pp. 269-286
    • Van Eck, W.1
  • 60
    • 0027590418 scopus 로고
    • A model for detecting the existence of software corruptions in real-time, IFIP-TC11
    • 1993
    • Voas, J. et al., 1993. A Model for Detecting the Existence of Software Corruptions in Real-Time, IFIP-TC11, Computers & Security, Vol. 12, No. 3, 1993, pp. 275-283.
    • (1993) Computers & Security , vol.12 , Issue.3 , pp. 275-283
    • Voas, J.1
  • 61
    • 0043187339 scopus 로고
    • Misdirected phone call shuts down local power
    • July 1995
    • Winkelman, 1995. Misdirected phone call shuts down local power, ACM SIGSOFT Software Engineering Notes, Vol. 20, No. 3; July 1995, pp. 7-8.
    • (1995) ACM SIGSOFT Software Engineering Notes , vol.20 , Issue.3 , pp. 7-8
    • Winkelman1
  • 62
    • 85030034393 scopus 로고    scopus 로고
    • Western systems coordinating council
    • August 10, 1996, draft
    • WSCC, 1996. Western Systems Coordinating Council, WSCC Preliminary System Disturbance Report, August 10, 1996, draft.
    • (1996) WSCC Preliminary System Disturbance Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.