메뉴 건너뛰기




Volumn , Issue , 2003, Pages 705-715

Cybersecurity

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; INTERNET; SECURITY OF DATA;

EID: 0037587236     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icse.2003.1201257     Document Type: Conference Paper
Times cited : (53)

References (36)
  • 1
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC)
    • J. Anderson, et al. Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), 1972. Vol. 1.
    • (1972) , vol.1
    • Anderson, J.1
  • 2
    • 0024772234 scopus 로고
    • Kit: A study in operating system verification
    • November
    • W. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11), November 1989.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , Issue.11
    • Bevier, W.1
  • 3
    • 0038620259 scopus 로고    scopus 로고
    • Cert coordination center statistics
    • Cert coordination center statistics, http://www.cert.org/stats/, 2003.
    • (2003)
  • 4
    • 0037944004 scopus 로고
    • Minutes of the First Workshop on Covert Channel Analysis. IEEE Cipher, July; Los Angeles, CA
    • Minutes of the First Workshop on Covert Channel Analysis. IEEE Cipher, July 1990. Los Angeles, CA.
    • (1990)
  • 10
    • 0018907788 scopus 로고
    • A penetration analysis of the michigan terminal system
    • January
    • B. Hebbard, et al., A Penetration Analysis of the Michigan Terminal System. ACM Operating Systems Review, 14(1), January 1980.
    • (1980) ACM Operating Systems Review , vol.14 , Issue.1
    • Hebbard, B.1
  • 11
    • 33645604958 scopus 로고    scopus 로고
    • Open source security testing methodology manual
    • February
    • P. Herzog. Open source security testing methodology manual. http://www.isecom.org/projects/osstm.htm, February 2002.
    • (2002)
    • Herzog, P.1
  • 12
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection system
    • March
    • K. Ilgun, R. Kemmerer, and P. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 14
    • 0004118981 scopus 로고
    • The NIDES statistical component description and justification
    • Technical report, SRI International, Menlo Park, CA, March
    • H. Javitz and A. Valdes. The NIDES Statistical Component Description and Justification. Technical report, SRI International, Menlo Park, CA, March 1994.
    • (1994)
    • Javitz, H.1    Valdes, A.2
  • 15
    • 84976667065 scopus 로고
    • Shared resource matrix methodology: An approach to identifying storage and timing channels
    • August
    • R. Kemmerer. Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Transactions on Computer Systems, 1(3), August 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3
    • Kemmerer, R.1
  • 17
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • R. Kemmerer, C. Meadows, and J. Millen, Three systems for cryptographic protocol analysis. Journal of Cryptography, 7(2):79-130, 1994.
    • (1994) Journal of Cryptography , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 18
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring for security-critical programs in distributed systems: A specification-based approach
    • May
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring for Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, May 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 19
    • 0038620256 scopus 로고    scopus 로고
    • www.10pht.com/10phcrack.
  • 20
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • B. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16:613-615, October 1973.
    • (1973) Communications of the ACM , vol.16 , pp. 613-615
    • Lampson, B.1
  • 23
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • In A. Wespi, G. Vigna, and L. Deri, editors; Springer
    • R. Lippmann, S. Webster, and D. Stetson. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In A. Wespi, G. Vigna, and L. Deri, editors, Proceedings of Recent Advances in Intrusion Detection, pages 307-326. Springer, 2002.
    • (2002) Proceedings of Recent Advances in Intrusion Detection , pp. 307-326
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 26
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • May
    • J. Millen. Security Kernel Validation in Practice. Communications of the ACM, 19:243-250, May 1976.
    • (1976) Communications of the ACM , vol.19 , pp. 243-250
    • Millen, J.1
  • 31
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 32
    • 0037605916 scopus 로고    scopus 로고
    • Sans/fbi top 20 list
    • Sans/fbi top 20 list. http://www.sans.org/top20/, 2002.
    • (2002)
  • 33
    • 0021100075 scopus 로고
    • Reflections on the verification of the security of an operating systems kernel
    • J. Silverman. Reflections on the Verification of the Security of an Operating Systems Kernel. Communications of the ACM, 1983.
    • (1983) Communications of the ACM
    • Silverman, J.1
  • 36
    • 0018983212 scopus 로고
    • Specification and verification of the UCLA security kernel
    • B. Walker, R. Kemmerer, and G. Popek. Specification and Verification of the UCLA Security Kernel. Communications of the ACM, 23:118-131, 1980.
    • (1980) Communications of the ACM , vol.23 , pp. 118-131
    • Walker, B.1    Kemmerer, R.2    Popek, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.