-
1
-
-
0004200684
-
Computer security technology planning study
-
Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC)
-
J. Anderson, et al. Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), 1972. Vol. 1.
-
(1972)
, vol.1
-
-
Anderson, J.1
-
2
-
-
0024772234
-
Kit: A study in operating system verification
-
November
-
W. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11), November 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.11
-
-
Bevier, W.1
-
3
-
-
0038620259
-
-
Cert coordination center statistics
-
Cert coordination center statistics, http://www.cert.org/stats/, 2003.
-
(2003)
-
-
-
4
-
-
0037944004
-
-
Minutes of the First Workshop on Covert Channel Analysis. IEEE Cipher, July; Los Angeles, CA
-
Minutes of the First Workshop on Covert Channel Analysis. IEEE Cipher, July 1990. Los Angeles, CA.
-
(1990)
-
-
-
6
-
-
0005340681
-
-
chapter Web Browsers and Security; Springer-Verlag
-
F. De Paoli, A. dos Santos, and R. Kremmerer. Mobile Agents and Security, volume 1419, chapter Web Browsers and Security, pages 235-256. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 235-256
-
-
De Paoli, F.1
Dos Santos, A.2
Kremmerer, R.3
-
9
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
Scottsdale, AZ, December
-
A. Ghosh, J. Wanken, and F. Charron. Detecting Anomalous and Unknown Intrusions Against Programs. In Proceedings of the Annual Computer Security Application Conference (ACSAC'98), pages 259-267, Scottsdale, AZ, December 1998.
-
(1998)
Proceedings of the Annual Computer Security Application Conference (ACSAC'98)
, pp. 259-267
-
-
Ghosh, A.1
Wanken, J.2
Charron, F.3
-
10
-
-
0018907788
-
A penetration analysis of the michigan terminal system
-
January
-
B. Hebbard, et al., A Penetration Analysis of the Michigan Terminal System. ACM Operating Systems Review, 14(1), January 1980.
-
(1980)
ACM Operating Systems Review
, vol.14
, Issue.1
-
-
Hebbard, B.1
-
11
-
-
33645604958
-
Open source security testing methodology manual
-
February
-
P. Herzog. Open source security testing methodology manual. http://www.isecom.org/projects/osstm.htm, February 2002.
-
(2002)
-
-
Herzog, P.1
-
12
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
March
-
K. Ilgun, R. Kemmerer, and P. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
14
-
-
0004118981
-
The NIDES statistical component description and justification
-
Technical report, SRI International, Menlo Park, CA, March
-
H. Javitz and A. Valdes. The NIDES Statistical Component Description and Justification. Technical report, SRI International, Menlo Park, CA, March 1994.
-
(1994)
-
-
Javitz, H.1
Valdes, A.2
-
15
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
August
-
R. Kemmerer. Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems, 1(3), August 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
-
-
Kemmerer, R.1
-
17
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen, Three systems for cryptographic protocol analysis. Journal of Cryptography, 7(2):79-130, 1994.
-
(1994)
Journal of Cryptography
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
18
-
-
0030677523
-
Execution monitoring for security-critical programs in distributed systems: A specification-based approach
-
May
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring for Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
19
-
-
0038620256
-
-
www.10pht.com/10phcrack.
-
-
-
-
20
-
-
0015672289
-
A note on the confinement problem
-
October
-
B. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16:613-615, October 1973.
-
(1973)
Communications of the ACM
, vol.16
, pp. 613-615
-
-
Lampson, B.1
-
23
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
In A. Wespi, G. Vigna, and L. Deri, editors; Springer
-
R. Lippmann, S. Webster, and D. Stetson. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In A. Wespi, G. Vigna, and L. Deri, editors, Proceedings of Recent Advances in Intrusion Detection, pages 307-326. Springer, 2002.
-
(2002)
Proceedings of Recent Advances in Intrusion Detection
, pp. 307-326
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
26
-
-
0016951438
-
Security kernel validation in practice
-
May
-
J. Millen. Security Kernel Validation in Practice. Communications of the ACM, 19:243-250, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, pp. 243-250
-
-
Millen, J.1
-
27
-
-
0242314805
-
The spread of the sapphire/slammer worm
-
February 2003
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the sapphire/slammer worm. http://www.siliconfedense.com/research/sapphire/, February 2003.
-
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
30
-
-
0003777431
-
-
Addison Wesley Professional
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. Modelling and Analysis of Security Protocols. Addison Wesley Professional, 2000.
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
31
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
32
-
-
0037605916
-
-
Sans/fbi top 20 list
-
Sans/fbi top 20 list. http://www.sans.org/top20/, 2002.
-
(2002)
-
-
-
33
-
-
0021100075
-
Reflections on the verification of the security of an operating systems kernel
-
J. Silverman. Reflections on the Verification of the Security of an Operating Systems Kernel. Communications of the ACM, 1983.
-
(1983)
Communications of the ACM
-
-
Silverman, J.1
-
34
-
-
0006062055
-
-
Sun Microsystems, Inc.; 2550 Garcia Ave., Mountain View, CA 94043, December
-
Sun Microsystems, Inc. Installing, Administering, and Using the Basic Security Module. 2550 Garcia Ave., Mountain View, CA 94043, December 1991.
-
(1991)
Installing, Administering, and Using the Basic Security Module
-
-
-
36
-
-
0018983212
-
Specification and verification of the UCLA security kernel
-
B. Walker, R. Kemmerer, and G. Popek. Specification and Verification of the UCLA Security Kernel. Communications of the ACM, 23:118-131, 1980.
-
(1980)
Communications of the ACM
, vol.23
, pp. 118-131
-
-
Walker, B.1
Kemmerer, R.2
Popek, G.3
|