-
1
-
-
0003400251
-
Secure computer systems: A mathematical model
-
Mitre Corporation, Bedford, MA, May
-
D. E. Bell and L. LaPadula. Secure computer systems: A mathematical model Technical report MTR-2547 Vol II. Mitre Corporation, Bedford, MA, May 1973.
-
(1973)
Technical Report
, vol.2 MTR-2547
-
-
Bell, D.E.1
LaPadula, L.2
-
3
-
-
0025211594
-
Specifying and Modeling of Computer Security
-
Jan.
-
John McLean. Specifying and Modeling of Computer Security. IEEE Computer 23(1) pp. 9-16. Jan. 1989.
-
(1989)
IEEE Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
5
-
-
0003487594
-
A Critical Analysis of Vulnerability Taxonomies
-
Department of Computer Science, University of California at Davis (Sep.)
-
M. Bishop and D. Bailey, A Critical Analysis of Vulnerability Taxonomies, Technical Report 96-11, Department of Computer Science, University of California at Davis (Sep. 1996).
-
(1996)
Technical Report
, vol.96
, Issue.11
-
-
Bishop, M.1
Bailey, D.2
-
8
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws, with Examples
-
Sep
-
C. Landwehr, A. Bull, J. McDermott, W. Choi, A Taxonomy of Computer Program Security Flaws, with Examples, ACM Computing Surveys 26, no. 3 (Sep 1994).
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.1
Bull, A.2
McDermott, J.3
Choi, W.4
-
9
-
-
0003513832
-
-
NBSIR 76-1041, Institute for Computer Sciences and Technology, National Bureau of Standards, Apr.
-
R. P. Abbott, J. S. Chin, J. E. Donnelley, et al. Security Analysis and Enhancement of Computer Operating Systems. NBSIR 76-1041, Institute for Computer Sciences and Technology, National Bureau of Standards, Apr. 1976.
-
(1976)
Security Analysis and Enhancement of Computer Operating Systems
-
-
Abbott, R.P.1
Chin, J.S.2
Donnelley, J.E.3
-
11
-
-
0030676601
-
How to Systematically Classify Computer Security Intrusions
-
Oakland, CA, May 4-7
-
U. Lindqvist and E. Jonsson. How to Systematically Classify Computer Security Intrusions. In Proc. of the 1997 IEEE Symposium on Security and Privacy, pages 154-163, Oakland, CA, May 4-7, 1997.
-
(1997)
Proc. of the 1997 IEEE Symposium on Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
13
-
-
84862051915
-
-
http://www.securityfocus.com
-
-
-
-
14
-
-
84862046143
-
-
http://www.cert.org
-
-
-
-
16
-
-
12344316966
-
Compiler and Architecture Support for Defense against Buffer Overflow Attacks
-
San Jose, CA, October
-
J. Xu, Z. Kalbarczyk, S. Patel and R. K. Iyer. Compiler and Architecture Support for Defense against Buffer Overflow Attacks. 2nd Workshop on Evaluating and Architecting System Dependability (EASY), San Jose, CA, October, 2002.
-
(2002)
2nd Workshop on Evaluating and Architecting System Dependability (EASY)
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Iyer, R.K.4
-
17
-
-
0033325475
-
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
-
Sept.
-
R. Ortalo, Y. Deswarte and M. Kaaniche, Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Transactions on Software Engineering, vol. 25, no. 5, pp.633-650, Sept. 1999
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
19
-
-
84882800335
-
Simple, state-based approaches to program-based anomaly detection
-
Aug.
-
C. Michael, A. Ghosh. Simple, state-based approaches to program-based anomaly detection. ACM Transactions on Information and System Security. Pages: 203-237. Vol.5 No.3. Aug. 2002
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.1
Ghosh, A.2
|