-
2
-
-
0012000411
-
Dependability: From concepts to limits
-
Poznan-Kiekrz, Poland, Springer, Berlin
-
Laprie, J. C. (1993) Dependability: from concepts to limits (Invited paper). In Proc. 12th Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP'93), Poznan-Kiekrz, Poland, pp. 157-168. Springer, Berlin.
-
(1993)
Proc. 12th Int. Conf. on Computer Safety, Reliability and Security (SAFECOMP'93)
, pp. 157-168
-
-
Laprie, J.C.1
-
6
-
-
0542427179
-
Internet crime: Cyber leeches
-
12 May
-
Hobby, J. (1996) Internet crime: cyber leeches. Computer Weekly, 12 May.
-
(1996)
Computer Weekly
-
-
Hobby, J.1
-
7
-
-
84865892246
-
-
Washington DC
-
Presidential Commission on Critical Infrastructures Protection (1997) Commission Report, http://www.pccip.gov/report_index.html, Washington DC.
-
(1997)
Commission Report
-
-
-
8
-
-
0025418427
-
Security considerations in communications systems and networks
-
Benjamin, R. (1990) Security considerations in communications systems and networks. Proc. IEE, 137, Pt 1, 2.
-
(1990)
Proc. IEE
, vol.137
, Issue.1 PART
, pp. 2
-
-
Benjamin, R.1
-
9
-
-
0030376048
-
The omega key management service
-
Reiter, M., Franklin, M., Lacy, J. and Wright, R. (1996) The omega key management service. J. Comput. Security, 4, 267-287.
-
(1996)
J. Comput. Security
, vol.4
, pp. 267-287
-
-
Reiter, M.1
Franklin, M.2
Lacy, J.3
Wright, R.4
-
10
-
-
0026155432
-
Intrusion tolerance in distributed computing systems
-
Oakland, California, IEEE Computer Society Press
-
Deswarte, Y., Blain, L. and Fabre, J.-C. (1991) Intrusion tolerance in distributed computing systems. In Proc. 1991 Symp. on Research in Security and Privacy, Oakland, California, pp. 110-121. IEEE Computer Society Press.
-
(1991)
Proc. 1991 Symp. on Research in Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.-C.3
-
12
-
-
0001550560
-
Formal hardware verification methods: A survey
-
Kluwer AP
-
Gupta, A. (1992) Formal hardware verification methods: a survey. Formal Methods in System Design vol. 1, pp. 151-238. Kluwer AP.
-
(1992)
Formal Methods in System Design
, vol.1
, pp. 151-238
-
-
Gupta, A.1
-
15
-
-
0013451908
-
Intrusion-tolerant security servers for Delta-4
-
Brussels, Kluwer Academic Publishers
-
Blain, L. and Deswarte, Y. (1990) Intrusion-tolerant security servers for Delta-4. In Proc. ESPRIT'90 Conf., Brussels, pp. 355-370. Kluwer Academic Publishers.
-
(1990)
Proc. ESPRIT'90 Conf.
, pp. 355-370
-
-
Blain, L.1
Deswarte, Y.2
-
18
-
-
0028532579
-
Why cryptosystems fail
-
Anderson, R. (1994) Why cryptosystems fail. Commun. ACM, 37, 32-40.
-
(1994)
Commun. ACM
, vol.37
, pp. 32-40
-
-
Anderson, R.1
-
19
-
-
0022614734
-
Building reliable secure systems out of unreliable insecure components
-
Oakland. IEEE
-
Dobson, J. E. and Randell, B. (1986) Building reliable secure systems out of unreliable insecure components. In Proc. Conf. on Security and Privacy, Oakland. IEEE.
-
(1986)
Proc. Conf. on Security and Privacy
-
-
Dobson, J.E.1
Randell, B.2
-
20
-
-
0003289939
-
Delta-4: A generic architecture for dependable distributed computing
-
Springer, Berlin
-
Powell, D. (1991) Delta-4: a generic architecture for dependable distributed computing. Research Reports ESPRIT, (vol. 1). Springer, Berlin.
-
(1991)
Research Reports ESPRIT
, vol.1
-
-
Powell, D.1
-
23
-
-
0542379677
-
Ignored warning leads to chaos on the internet
-
18 July
-
Markoff, J. (1997) Ignored warning leads to chaos on the internet. New York Times, 18 July.
-
(1997)
New York Times
-
-
Markoff, J.1
|