-
1
-
-
0002179618
-
Protection
-
B. Lampson, “Protection,” ACM Operating Systems Rev., vol. 8, no. 1, 1974, pp. 18-24.
-
(1974)
ACM Operating Systems Rev.
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.1
-
2
-
-
0016081584
-
Protection and the Control of Information Sharing in Multics
-
July
-
J.H. Saltzer, “Protection and the Control of Information Sharing in Multics,” Comm. ACM, July 1974, pp. 388-402.
-
(1974)
Comm. ACM
, pp. 388-402
-
-
Saltzer, J.H.1
-
3
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D.E. Denning, “A Lattice Model of Secure Information Flow,” Comm. ACM, May 1976, pp. 236-243.
-
(1976)
Comm. ACM
, pp. 236-243
-
-
Denning, D.E.1
-
4
-
-
0031543270
-
A Decentralized Model for Information Flow Control
-
ACM Press, www.acm.org/pubs/citations/proceedings/ops/268998/p129-myers.
-
A.C. Myers and B. Liskov, “A Decentralized Model for Information Flow Control,” Proc. 16th ACM Symp. Operating Systems Principles, ACM Press, 1997, pp. 129-142; www.acm.org/pubs/citations/proceedings/ops/268998/p129-myers.
-
(1997)
Proc. 16th ACM Symp. Operating Systems Principles
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
6
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Feb.
-
R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, Feb. 1978, pp. 120-126.
-
(1978)
Comm. ACM
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
7
-
-
0002885224
-
Prudent Engineering Practice for Cryptographic Protocols
-
M. Abadi and R.M. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” IEEE Trans. Software Eng., vol. 22, no. 1, 1995, pp. 2-15.
-
(1995)
IEEE Trans. Software Eng.
, vol.22
, Issue.1
, pp. 2-15
-
-
Abadi, M.1
Needham, R.M.2
-
8
-
-
85008043824
-
Stealing Credit Cards from Babies
-
ZDNet News, 12 Jan. www.zdnet.com/zdnn/stories/news/0,4586,2421377,00.html.
-
ZDNet, “Stealing Credit Cards from Babies,” ZDNet News, 12 Jan. 2000; www.zdnet.com/zdnn/stories/news/0,4586,2421377,00.html.
-
(2000)
ZDNet
-
-
-
9
-
-
85008027275
-
Major Online Credit Card Theft Exposed
-
ZDNet News, 17 Mar. www.zdnet.com/zdnn/stories/news/0,4586,2469820,00.html.
-
ZDNet, “Major Online Credit Card Theft Exposed,” ZDNet News, 17 Mar. 2000; www.zdnet.com/zdnn/stories/news/0,4586,2469820,00.html.
-
(2000)
ZDNet
-
-
-
10
-
-
85008057409
-
CERT Advisory CA-2000-04 Love Letter Worm
-
www.cert.org/advisories/CA-2000-04.html.
-
CERT Coordination Center, “CERT Advisory CA-2000-04 Love Letter Worm,” 2000; www.cert.org/advisories/CA-2000-04.html.
-
(2000)
CERT Coordination Center
-
-
-
11
-
-
27944446755
-
-
Computers at Risk, National Academies Press, http://books.nap.edu/catalog/1581.html.
-
National Research Council, Computers at Risk, National Academies Press, 1991; http://books.nap.edu/catalog/1581.html.
-
(1991)
National Research Council
-
-
-
12
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
IEEE CS Press
-
D.D. Clark and D.R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 1987, pp. 184-194.
-
(1987)
Proc. IEEE Symp. Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
13
-
-
84976845043
-
End-to-End Arguments in System Design
-
Nov. http://Web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf.
-
J.H. Saltzer et al., “End-to-End Arguments in System Design,” ACM Trans. Computer Systems, Nov. 1984, pp. 277-288; http://Web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf.
-
(1984)
ACM Trans. Computer Systems
, pp. 277-288
-
-
Saltzer, J.H.1
-
14
-
-
0028532579
-
Why Cryptosystems Fail
-
Nov.
-
R. Anderson, “Why Cryptosystems Fail,” Comm. ACM, Nov. 1994, pp. 32-40.
-
(1994)
Comm. ACM
, pp. 32-40
-
-
Anderson, R.1
-
17
-
-
0003593599
-
SPKI Certificate Theory
-
Oct. www.faqs.org/rfcs/rfc2693.html.
-
C. Ellison et al., “SPKI Certificate Theory,” Internet RFC 2693, Oct. 1999; www.faqs.org/rfcs/rfc2693.html.
-
(1999)
Internet RFC 2693
-
-
Ellison, C.1
-
19
-
-
0026684778
-
Authentication in Distributed Systems: Theory and Practice
-
ACM Press, www.acm.org/pubs/citations/journals/tocs/1992-10-4/p265-lampson.
-
B. Lampson et al., “Authentication in Distributed Systems: Theory and Practice,” ACM Trans. Computer Systems, vol. 10, no. 4, ACM Press, 1992, pp. 265-310; www.acm.org/pubs/citations/journals/tocs/1992-10-4/p265-lampson.
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
-
20
-
-
0028380781
-
Authentication in the Taos Operating System
-
Feb. www.acm.org/pubs/citations/journals/tocs/1994-12-1/p3-wobber.
-
E. Wobber et al., “Authentication in the Taos Operating System,” ACM Trans. Computer Systems, Feb. 1994, pp. 3-32; www.acm.org/pubs/citations/journals/tocs/1994-12-1/p3-wobber.
-
(1994)
ACM Trans. Computer Systems
, pp. 3-32
-
-
Wobber, E.1
-
22
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
Sept. gost.isi.edu/publications/kerberos-neuman-tso.html.
-
B.C. Neuman and T. Ts'o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Comm., Sept. 1994, pp. 33-38; gost.isi.edu/publications/kerberos-neuman-tso.html.
-
(1994)
IEEE Comm.
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
23
-
-
0004146915
-
Domain Name System Security Extensions
-
Jan. www.faqs.org/rfcs/rfc2065.html.
-
D. Eastlake and C. Kaufman, “Domain Name System Security Extensions,” Internet RFC 2065, Jan. 1997; www.faqs.org/rfcs/rfc2065.html.
-
(1997)
Internet RFC 2065
-
-
Eastlake, D.1
Kaufman, C.2
-
24
-
-
0042349623
-
A Trusted Open Platform
-
July
-
P. England et al., “A Trusted Open Platform,” Computer, July 2003, pp. 55-62.
-
(2003)
Computer
, pp. 55-62
-
-
England, P.1
|