메뉴 건너뛰기




Volumn 37, Issue 6, 2004, Pages 37-46

Computer Security in the Real World

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; DATA PRIVACY; DATA STRUCTURES; REAL TIME SYSTEMS;

EID: 17544394392     PISSN: 00189162     EISSN: None     Source Type: Journal    
DOI: 10.1109/MC.2004.17     Document Type: Article
Times cited : (140)

References (24)
  • 2
    • 0016081584 scopus 로고
    • Protection and the Control of Information Sharing in Multics
    • July
    • J.H. Saltzer, “Protection and the Control of Information Sharing in Multics,” Comm. ACM, July 1974, pp. 388-402.
    • (1974) Comm. ACM , pp. 388-402
    • Saltzer, J.H.1
  • 3
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • D.E. Denning, “A Lattice Model of Secure Information Flow,” Comm. ACM, May 1976, pp. 236-243.
    • (1976) Comm. ACM , pp. 236-243
    • Denning, D.E.1
  • 4
    • 0031543270 scopus 로고    scopus 로고
    • A Decentralized Model for Information Flow Control
    • ACM Press, www.acm.org/pubs/citations/proceedings/ops/268998/p129-myers.
    • A.C. Myers and B. Liskov, “A Decentralized Model for Information Flow Control,” Proc. 16th ACM Symp. Operating Systems Principles, ACM Press, 1997, pp. 129-142; www.acm.org/pubs/citations/proceedings/ops/268998/p129-myers.
    • (1997) Proc. 16th ACM Symp. Operating Systems Principles , pp. 129-142
    • Myers, A.C.1    Liskov, B.2
  • 6
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Feb.
    • R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, Feb. 1978, pp. 120-126.
    • (1978) Comm. ACM , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 0002885224 scopus 로고
    • Prudent Engineering Practice for Cryptographic Protocols
    • M. Abadi and R.M. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” IEEE Trans. Software Eng., vol. 22, no. 1, 1995, pp. 2-15.
    • (1995) IEEE Trans. Software Eng. , vol.22 , Issue.1 , pp. 2-15
    • Abadi, M.1    Needham, R.M.2
  • 8
    • 85008043824 scopus 로고    scopus 로고
    • Stealing Credit Cards from Babies
    • ZDNet News, 12 Jan. www.zdnet.com/zdnn/stories/news/0,4586,2421377,00.html.
    • ZDNet, “Stealing Credit Cards from Babies,” ZDNet News, 12 Jan. 2000; www.zdnet.com/zdnn/stories/news/0,4586,2421377,00.html.
    • (2000) ZDNet
  • 9
    • 85008027275 scopus 로고    scopus 로고
    • Major Online Credit Card Theft Exposed
    • ZDNet News, 17 Mar. www.zdnet.com/zdnn/stories/news/0,4586,2469820,00.html.
    • ZDNet, “Major Online Credit Card Theft Exposed,” ZDNet News, 17 Mar. 2000; www.zdnet.com/zdnn/stories/news/0,4586,2469820,00.html.
    • (2000) ZDNet
  • 10
    • 85008057409 scopus 로고    scopus 로고
    • CERT Advisory CA-2000-04 Love Letter Worm
    • www.cert.org/advisories/CA-2000-04.html.
    • CERT Coordination Center, “CERT Advisory CA-2000-04 Love Letter Worm,” 2000; www.cert.org/advisories/CA-2000-04.html.
    • (2000) CERT Coordination Center
  • 11
    • 27944446755 scopus 로고
    • Computers at Risk, National Academies Press, http://books.nap.edu/catalog/1581.html.
    • National Research Council, Computers at Risk, National Academies Press, 1991; http://books.nap.edu/catalog/1581.html.
    • (1991) National Research Council
  • 12
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • IEEE CS Press
    • D.D. Clark and D.R. Wilson, “A Comparison of Commercial and Military Computer Security Policies,” Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 1987, pp. 184-194.
    • (1987) Proc. IEEE Symp. Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 13
    • 84976845043 scopus 로고
    • End-to-End Arguments in System Design
    • Nov. http://Web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf.
    • J.H. Saltzer et al., “End-to-End Arguments in System Design,” ACM Trans. Computer Systems, Nov. 1984, pp. 277-288; http://Web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf.
    • (1984) ACM Trans. Computer Systems , pp. 277-288
    • Saltzer, J.H.1
  • 14
    • 0028532579 scopus 로고
    • Why Cryptosystems Fail
    • Nov.
    • R. Anderson, “Why Cryptosystems Fail,” Comm. ACM, Nov. 1994, pp. 32-40.
    • (1994) Comm. ACM , pp. 32-40
    • Anderson, R.1
  • 17
    • 0003593599 scopus 로고    scopus 로고
    • SPKI Certificate Theory
    • Oct. www.faqs.org/rfcs/rfc2693.html.
    • C. Ellison et al., “SPKI Certificate Theory,” Internet RFC 2693, Oct. 1999; www.faqs.org/rfcs/rfc2693.html.
    • (1999) Internet RFC 2693
    • Ellison, C.1
  • 18
    • 84961968703 scopus 로고    scopus 로고
    • End-to-End Authorization
    • Usenix Assoc., www.usenix.org/publications/library/proceedings/osdi2000/howell.html.
    • J. Howell and D. Kotz, “End-to-End Authorization,” Proc. 4th Usenix Symp. Operating Systems Design and Implementation, Usenix Assoc., 2000; www.usenix.org/publications/library/proceedings/osdi2000/howell.html.
    • (2000) Proc. 4th Usenix Symp. Operating Systems Design and Implementation
    • Howell, J.1    Kotz, D.2
  • 19
    • 0026684778 scopus 로고
    • Authentication in Distributed Systems: Theory and Practice
    • ACM Press, www.acm.org/pubs/citations/journals/tocs/1992-10-4/p265-lampson.
    • B. Lampson et al., “Authentication in Distributed Systems: Theory and Practice,” ACM Trans. Computer Systems, vol. 10, no. 4, ACM Press, 1992, pp. 265-310; www.acm.org/pubs/citations/journals/tocs/1992-10-4/p265-lampson.
    • (1992) ACM Trans. Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1
  • 20
    • 0028380781 scopus 로고
    • Authentication in the Taos Operating System
    • Feb. www.acm.org/pubs/citations/journals/tocs/1994-12-1/p3-wobber.
    • E. Wobber et al., “Authentication in the Taos Operating System,” ACM Trans. Computer Systems, Feb. 1994, pp. 3-32; www.acm.org/pubs/citations/journals/tocs/1994-12-1/p3-wobber.
    • (1994) ACM Trans. Computer Systems , pp. 3-32
    • Wobber, E.1
  • 22
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • Sept. gost.isi.edu/publications/kerberos-neuman-tso.html.
    • B.C. Neuman and T. Ts'o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Comm., Sept. 1994, pp. 33-38; gost.isi.edu/publications/kerberos-neuman-tso.html.
    • (1994) IEEE Comm. , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 23
    • 0004146915 scopus 로고    scopus 로고
    • Domain Name System Security Extensions
    • Jan. www.faqs.org/rfcs/rfc2065.html.
    • D. Eastlake and C. Kaufman, “Domain Name System Security Extensions,” Internet RFC 2065, Jan. 1997; www.faqs.org/rfcs/rfc2065.html.
    • (1997) Internet RFC 2065
    • Eastlake, D.1    Kaufman, C.2
  • 24
    • 0042349623 scopus 로고    scopus 로고
    • A Trusted Open Platform
    • July
    • P. England et al., “A Trusted Open Platform,” Computer, July 2003, pp. 55-62.
    • (2003) Computer , pp. 55-62
    • England, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.