-
1
-
-
19544370133
-
-
British Security Standard BS 7799 (British Standards)
-
British Security Standard, BS 7799 (British Standards, 1999).
-
(1999)
-
-
-
2
-
-
0033718563
-
Building trust in electronic commerce
-
V. Ahuja, Building trust in electronic commerce, IT Professional 2(3) (2000) 61-63
-
(2000)
IT Professional
, vol.2
, Issue.3
, pp. 61-63
-
-
Ahuja, V.1
-
3
-
-
0023327666
-
Cost-effectiveness modeling for a decision support system in computer security
-
T. Bui and T.R. Sivasankaran, Cost-effectiveness modeling for a decision support system in computer security, Computers and Security 6 (1987) 139-151.
-
(1987)
Computers and Security
, vol.6
, pp. 139-151
-
-
Bui, T.1
Sivasankaran, T.R.2
-
5
-
-
19544391758
-
-
Cohen (1997) http://citeseer.nj.nec.com/lee00toward.html
-
(1997)
-
-
Cohen1
-
7
-
-
0011119081
-
Active security a proactive approach for computer security systems
-
G. Eschellbeck, Active Security A Proactive Approach for Computer Security Systems, Journal of Network and Computer Applications 23(2000) 109-130.
-
(2000)
Journal of Network and Computer Applications
, vol.23
, pp. 109-130
-
-
Eschellbeck, G.1
-
9
-
-
77954468090
-
Enslow Managing Vulnerabilities of Information Systems to Security Incidents
-
ICEC (Pittsburgh, Sept.)
-
F. Farahmand, S.B. Navathe, Gunter P. Sharp and P.H. Enslow, Managing Vulnerabilities of Information Systems to Security Incidents, in: ACM International Conference on Electronic Commerce, ICEC 2003 (Pittsburgh, Sept. 2003) 348-354.
-
(2003)
ACM International Conference on Electronic Commerce 2003
, pp. 348-354
-
-
Farahmand, F.1
Navathe, S.B.2
Gunter, P.3
Sharp, P.H.4
-
11
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security (TISSEC) 4(3) (2001) 224-274.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
19544384091
-
Issues in the Law of Electronic Commerce
-
R.L. Field, Issues in the Law of Electronic Commerce, Networker (ACM Press) 1(3) (1997) 28-37.
-
(1997)
Networker (ACM Press)
, vol.1
, Issue.3
, pp. 28-37
-
-
Field, R.L.1
-
13
-
-
0002544658
-
Software security and privacy risks in mobile e-commerce
-
A.K. Ghosh and T.M. Swaminatha, Software security and privacy risks in mobile e-commerce, Communications of the ACM 44(2) (2001) 51-57.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 51-57
-
-
Ghosh, A.K.1
Swaminatha, T.M.2
-
15
-
-
0003767375
-
Information Processing Systems-Open Systems Interconnection-Basic Reference Model, Part 2: Security Architecture
-
ISO ISO 7498-2
-
ISO, Information Processing Systems-Open Systems Interconnection-Basic Reference Model, Part 2: Security Architecture, ISO 7498-2 (1989).
-
(1989)
-
-
-
16
-
-
0000206310
-
Security models for web-Based applications
-
J. Joshi et al., Security Models for Web-Based Applications, Communications of the ACM 44(2) (2001) 38-44.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.1
-
17
-
-
12844284330
-
A taxonomy of computer program security flaws, with examples
-
Naval Research Laboratory (Nov.)
-
C.E. Landwehr et al., A Taxonomy of Computer Program Security Flaws, with Examples, Naval Research Laboratory (Nov. 1993).
-
(1993)
-
-
Landwehr, C.E.1
-
18
-
-
0031378491
-
Security Issues in Networks with Internet Access
-
10.1109/5.650183
-
C.E. Landwehr and D.M. Goldschlag, Security Issues in Networks with Internet Access, in: Proceedings of the IEEE 85(12) (1997) 2034 2034-2051 10.1109/5.650183
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.12
, pp. 2034-2051
-
-
Landwehr, C.E.1
Goldschlag, D.M.2
-
19
-
-
0032298328
-
Internet risks for computers
-
S. Lichtenstein, Internet Risks for Computers, Computers & Security 17 (1998) 143-150.
-
(1998)
Computers & Security
, vol.17
, pp. 143-150
-
-
Lichtenstein, S.1
-
22
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
10.1016/S1389-1286(00)00139-0
-
R. Lipmann, et al., The 1999 DARPA off-line Intrusion Detection Evaluation, Computer Networks 34 (2000) 579-595. 10.1016/ S1389-1286(00)00139-0
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lipmann, R.1
-
23
-
-
0033893895
-
E-commerce trust metrics and models
-
10.1109/4236.832944
-
D.W. Manchala, E-commerce trust metrics and models, IEEE Internet Computing 4(2) (2000) 36-44. 10.1109/4236.832944
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.2
, pp. 36-44
-
-
Manchala, D.W.1
-
24
-
-
0036737236
-
Developing and validating trust measures for e-Commerce: An integrative typology
-
10.1287/isre.13.3.334.81
-
D.H. McKnight, C. Choudhury and C. Kacmar, Developing and Validating Trust Measures for e-Commerce: An Integrative Typology, Information Systems Research 13(3) (2002) 334-359. 10.1287/isre.13.3.334.81
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, C.2
Kacmar, C.3
-
25
-
-
0000565716
-
A summary of computer misuse techniques
-
(Oct.) National Institute of Standards and Technology/National Computer Security Center
-
P.G. Neumann and D.B. Parker, A Summary of Computer Misuse Techniques, in: Proceedings of the 12th National Computer Security Conference (Oct. 1989) 396-407. National Institute of Standards and Technology/National Computer Security Center.
-
(1989)
Proceedings of the 12th National Computer Security Conference
, pp. 396-407
-
-
Neumann, P.G.1
Parker, D.B.2
-
26
-
-
0003508568
-
-
National Bureau of Standards (NBS) (FIPS Publ. 46, Jan)
-
National Bureau of Standards (NBS), Data Encryption Standards (FIPS Publ. 46, Jan 1977).
-
(1977)
Data Encryption Standards
-
-
-
28
-
-
0005001185
-
Probabilistic modeling of terrorist attacks: A system analysis approach to setting priorities among countermeasures
-
(Oct.)
-
E. Pate-Cornell and S. Guikema, Probabilistic Modeling of Terrorist Attacks: A System Analysis Approach to Setting Priorities Among Countermeasures, Military Operation Research (Oct. 2002).
-
(2002)
Military Operation Research
-
-
Pate-Cornell, E.1
Guikema, S.2
-
31
-
-
0017930809
-
A method for obtaining digital signatures and public-Key cryptosystems
-
R.L. Rivest, A. Shamir and L.M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, CACM 21(2) (1978) 120-126.
-
(1978)
CACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|