메뉴 건너뛰기




Volumn 1975, Issue , 2000, Pages 277-291

The role of the development process in operating system security

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 23044524265     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44456-4_21     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 1
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • November
    • Ross Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32-40, November 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.1
  • 2
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Richard Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375-414, 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 5
    • 0011588485 scopus 로고
    • Trusted products evaluation
    • Santosh Chokhani. Trusted products evaluation. Communications of the ACM, 35(7):64-76, 1992.
    • (1992) Communications of the ACM , vol.35 , Issue.7 , pp. 64-76
    • Chokhani, S.1
  • 6
    • 84944192252 scopus 로고    scopus 로고
    • Practical Unix and Internet Security
    • Second edition
    • Simson Garfinkel and Eugene Spafiord. Practical Unix and Internet Security. O'Reilly & Associates, second edition, 1996.
    • (1996) O'Reilly & Associates
    • Garfinkel, S.1    Spafiord, E.2
  • 7
    • 0031173082 scopus 로고    scopus 로고
    • Mathematics, technology, and trust: Formal verification, computer security and the U.S. military
    • Donald Mackenzie and Garrell Pottinger. Mathematics, technology, and trust: Formal verification, computer security and the U.S. military. IEEE Annals of the History of Computing, 19(3):41-59, 1997.
    • (1997) IEEE Annals of the History of Computing , vol.19 , Issue.3 , pp. 41-59
    • Mackenzie, D.1    Pottinger, G.2
  • 8
    • 0022012611 scopus 로고
    • A comment on the "Basic Security Theorem" of Bell and LaPadula
    • John McLean. A comment on the "Basic Security Theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, 1985.
    • (1985) Information Processing Letters , vol.20 , Issue.2 , pp. 67-70
    • McLean, J.1
  • 9
    • 0029392060 scopus 로고
    • A technique to include computer security, safety, and resilience requirements as part of the requirements specification
    • D.N.J. Mostert and S.H. von Solms. A technique to include computer security, safety, and resilience requirements as part of the requirements specification. Journal of Systems Software, 31:45-53, 1995.
    • (1995) Journal of Systems Software , vol.31 , pp. 45-53
    • Mostert, D.1    Von Solms, S.H.2
  • 10
    • 84944247974 scopus 로고
    • Bright Blue Book
    • NCSC-TG-002 Trusted Product Evaluations - A Guide for Vendors, 22 June, Available Online
    • National Computer Security Center. NCSC-TG-002 Trusted Product Evaluations - A Guide for Vendors, 22 June 1990. "Bright Blue Book", Available Online: http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-002.html.
    • (1990) National Computer Security Center
  • 11
    • 0012130280 scopus 로고    scopus 로고
    • Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, 2 October 1995. SRI Project 6401, Prepared for the US Department of Defense
    • Peter G. Neumann. Architectures and formal representations for secure systems. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, 2 October 1995. SRI Project 6401, Prepared for the US Department of Defense.
    • Architectures and Formal Representations for Secure Systems
    • Neumann, P.G.1
  • 12
    • 84944271307 scopus 로고    scopus 로고
    • Security Through Design as a Paradigm for Systems Development, 1999. Murdoch University, Perth, Western Australia
    • Christian Payne. Security Through Design as a Paradigm for Systems Development, 1999. Murdoch University, Perth, Western Australia.
    • Payne, C.1
  • 13
    • 0004198635 scopus 로고    scopus 로고
    • Prentice-Hall, Upper Saddle River, New Jersey
    • Charles P. Pfleeger. Security in Computing. Prentice-Hall, Upper Saddle River, New Jersey, 1997.
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 16
    • 84944258630 scopus 로고    scopus 로고
    • SecurityFocus.Com. BUGTRAQ VulDB Stats. Online, May
    • SecurityFocus.Com. BUGTRAQ VulDB Stats. Online: http://www.securityfocus.com/vdb/stats.html, May 2000.
    • (2000)
  • 17
    • 84944201039 scopus 로고    scopus 로고
    • U.S. Department of Defense, Washington, D.C., Trusted Computer System Evaluation Criteria, 1985. DOD 5200.28-STD
    • U.S. Department of Defense, Washington, D.C. Trusted Computer System Evaluation Criteria, 1985. DOD 5200.28-STD.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.