메뉴 건너뛰기




Volumn 41, Issue 7, 1998, Pages 429-443

Protecting IT Systems from Cyber Crime

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEMS PROGRAMMING; ELECTRONIC COMMERCE; FINANCIAL DATA PROCESSING; MANAGEMENT INFORMATION SYSTEMS; SECURITY OF DATA;

EID: 0032256131     PISSN: 00104620     EISSN: None     Source Type: Journal    
DOI: 10.1093/comjnl/41.7.429     Document Type: Article
Times cited : (15)

References (23)
  • 6
    • 0542427179 scopus 로고    scopus 로고
    • Internet crime: Cyber leeches
    • 12 May
    • Hobby, J. (1996) Internet crime: cyber leeches. Computer Weekly, 12 May.
    • (1996) Computer Weekly
    • Hobby, J.1
  • 7
    • 84865892246 scopus 로고    scopus 로고
    • Washington DC
    • Presidential Commission on Critical Infrastructures Protection (1997) Commission Report, http://www.pccip.gov/report_index.html, Washington DC.
    • (1997) Commission Report
  • 8
    • 0025418427 scopus 로고
    • Security considerations in communications systems and networks
    • Benjamin, R. (1990) Security considerations in communications systems and networks. Proc. IEE, 137, Pt 1, 2.
    • (1990) Proc. IEE , vol.137 , Issue.1 PART , pp. 2
    • Benjamin, R.1
  • 10
    • 0026155432 scopus 로고
    • Intrusion tolerance in distributed computing systems
    • Oakland, California, IEEE Computer Society Press
    • Deswarte, Y., Blain, L. and Fabre, J.-C. (1991) Intrusion tolerance in distributed computing systems. In Proc. 1991 Symp. on Research in Security and Privacy, Oakland, California, pp. 110-121. IEEE Computer Society Press.
    • (1991) Proc. 1991 Symp. on Research in Security and Privacy , pp. 110-121
    • Deswarte, Y.1    Blain, L.2    Fabre, J.-C.3
  • 12
    • 0001550560 scopus 로고
    • Formal hardware verification methods: A survey
    • Kluwer AP
    • Gupta, A. (1992) Formal hardware verification methods: a survey. Formal Methods in System Design vol. 1, pp. 151-238. Kluwer AP.
    • (1992) Formal Methods in System Design , vol.1 , pp. 151-238
    • Gupta, A.1
  • 15
    • 0013451908 scopus 로고
    • Intrusion-tolerant security servers for Delta-4
    • Brussels, Kluwer Academic Publishers
    • Blain, L. and Deswarte, Y. (1990) Intrusion-tolerant security servers for Delta-4. In Proc. ESPRIT'90 Conf., Brussels, pp. 355-370. Kluwer Academic Publishers.
    • (1990) Proc. ESPRIT'90 Conf. , pp. 355-370
    • Blain, L.1    Deswarte, Y.2
  • 18
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Anderson, R. (1994) Why cryptosystems fail. Commun. ACM, 37, 32-40.
    • (1994) Commun. ACM , vol.37 , pp. 32-40
    • Anderson, R.1
  • 19
    • 0022614734 scopus 로고
    • Building reliable secure systems out of unreliable insecure components
    • Oakland. IEEE
    • Dobson, J. E. and Randell, B. (1986) Building reliable secure systems out of unreliable insecure components. In Proc. Conf. on Security and Privacy, Oakland. IEEE.
    • (1986) Proc. Conf. on Security and Privacy
    • Dobson, J.E.1    Randell, B.2
  • 20
    • 0003289939 scopus 로고
    • Delta-4: A generic architecture for dependable distributed computing
    • Springer, Berlin
    • Powell, D. (1991) Delta-4: a generic architecture for dependable distributed computing. Research Reports ESPRIT, (vol. 1). Springer, Berlin.
    • (1991) Research Reports ESPRIT , vol.1
    • Powell, D.1
  • 23
    • 0542379677 scopus 로고    scopus 로고
    • Ignored warning leads to chaos on the internet
    • 18 July
    • Markoff, J. (1997) Ignored warning leads to chaos on the internet. New York Times, 18 July.
    • (1997) New York Times
    • Markoff, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.