메뉴 건너뛰기




Volumn 34, Issue 8, 1997, Pages 56-63

Threat from the net

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEMS PROGRAMMING; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; ELECTRONIC MAIL; NETWORK PROTOCOLS; SECURITY OF DATA; UNIX;

EID: 0031209960     PISSN: 00189235     EISSN: None     Source Type: Journal    
DOI: 10.1109/6.609475     Document Type: Article
Times cited : (21)

References (6)
  • 1
    • 0004048154 scopus 로고
    • Computer Security Threat Monitoring and Surveillance
    • James P. Anderson Co. Pa., Fort Washington
    • J. P. Anderson Computer Security Threat Monitoring and Surveillance April 1980 James P. Anderson Co. Pa., Fort Washington
    • (1980)
    • Anderson, J.P.1
  • 2
    • 0029700344 scopus 로고    scopus 로고
    • Decentralized Trust Management
    • M. Blaze J. Feigenbaum J. Lacy Decentralized Trust Management Proceedings of the IEEE Conference on Security and Privacy 164 173 Proceedings of the IEEE Conference on Security and Privacy 1996-May
    • (1996) , pp. 164-173
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.3
  • 3
    • 84856963536 scopus 로고
    • A New Paradigm for Trusted Systems
    • D. Denning A New Paradigm for Trusted Systems Proceedings of the Fifteenth National Computer Security Conference 784 791 Proceedings of the Fifteenth National Computer Security Conference 1992-October
    • (1992) , pp. 784-791
    • Denning, D.1
  • 4
    • 0009016272 scopus 로고
    • An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied
    • B. Cheswick An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied Proceedings of the Winter 1992 USENIX Conference 163 174 Proceedings of the Winter 1992 USENIX Conference 1992-January
    • (1992) , pp. 163-174
    • Cheswick, B.1
  • 5
    • 0029697575 scopus 로고    scopus 로고
    • Java Security: From HotJava to Netscape and Beyond
    • D. Dean E. Felten D. Wallach Java Security: From HotJava to Netscape and Beyond Proceedings of the 1996 IEEE Symposium on Security and Privacy 190 200 Proceedings of the 1996 IEEE Symposium on Security and Privacy 1996-May
    • (1996) , pp. 190-200
    • Dean, D.1    Felten, E.2    Wallach, D.3
  • 6
    • 0029232080 scopus 로고
    • Holding Intruders Accountable on the Internet
    • S. Staniford-Chen L. T. Heberlein Holding Intruders Accountable on the Internet Proceedings of the 1995 IEEE Symposium on Security and Privacy 39 49 Proceedings of the 1995 IEEE Symposium on Security and Privacy 1995-May
    • (1995) , pp. 39-49
    • Staniford-Chen, S.1    Heberlein, L.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.