-
1
-
-
0028532579
-
Why cryptosystems fail
-
November
-
Ross Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32-40, November 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.1
-
2
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
Richard Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375-414, 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
5
-
-
0011588485
-
Trusted products evaluation
-
Santosh Chokhani. Trusted products evaluation. Communications of the ACM, 35(7):64-76, 1992.
-
(1992)
Communications of the ACM
, vol.35
, Issue.7
, pp. 64-76
-
-
Chokhani, S.1
-
6
-
-
84944192252
-
Practical Unix and Internet Security
-
Second edition
-
Simson Garfinkel and Eugene Spafiord. Practical Unix and Internet Security. O'Reilly & Associates, second edition, 1996.
-
(1996)
O'Reilly & Associates
-
-
Garfinkel, S.1
Spafiord, E.2
-
7
-
-
0031173082
-
Mathematics, technology, and trust: Formal verification, computer security and the U.S. military
-
Donald Mackenzie and Garrell Pottinger. Mathematics, technology, and trust: Formal verification, computer security and the U.S. military. IEEE Annals of the History of Computing, 19(3):41-59, 1997.
-
(1997)
IEEE Annals of the History of Computing
, vol.19
, Issue.3
, pp. 41-59
-
-
Mackenzie, D.1
Pottinger, G.2
-
8
-
-
0022012611
-
A comment on the "Basic Security Theorem" of Bell and LaPadula
-
John McLean. A comment on the "Basic Security Theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, 1985.
-
(1985)
Information Processing Letters
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
9
-
-
0029392060
-
A technique to include computer security, safety, and resilience requirements as part of the requirements specification
-
D.N.J. Mostert and S.H. von Solms. A technique to include computer security, safety, and resilience requirements as part of the requirements specification. Journal of Systems Software, 31:45-53, 1995.
-
(1995)
Journal of Systems Software
, vol.31
, pp. 45-53
-
-
Mostert, D.1
Von Solms, S.H.2
-
10
-
-
84944247974
-
Bright Blue Book
-
NCSC-TG-002 Trusted Product Evaluations - A Guide for Vendors, 22 June, Available Online
-
National Computer Security Center. NCSC-TG-002 Trusted Product Evaluations - A Guide for Vendors, 22 June 1990. "Bright Blue Book", Available Online: http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-002.html.
-
(1990)
National Computer Security Center
-
-
-
11
-
-
0012130280
-
-
Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, 2 October 1995. SRI Project 6401, Prepared for the US Department of Defense
-
Peter G. Neumann. Architectures and formal representations for secure systems. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA 94025-3493, 2 October 1995. SRI Project 6401, Prepared for the US Department of Defense.
-
Architectures and Formal Representations for Secure Systems
-
-
Neumann, P.G.1
-
12
-
-
84944271307
-
-
Security Through Design as a Paradigm for Systems Development, 1999. Murdoch University, Perth, Western Australia
-
Christian Payne. Security Through Design as a Paradigm for Systems Development, 1999. Murdoch University, Perth, Western Australia.
-
-
-
Payne, C.1
-
13
-
-
0004198635
-
-
Prentice-Hall, Upper Saddle River, New Jersey
-
Charles P. Pfleeger. Security in Computing. Prentice-Hall, Upper Saddle River, New Jersey, 1997.
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
16
-
-
84944258630
-
-
SecurityFocus.Com. BUGTRAQ VulDB Stats. Online, May
-
SecurityFocus.Com. BUGTRAQ VulDB Stats. Online: http://www.securityfocus.com/vdb/stats.html, May 2000.
-
(2000)
-
-
-
17
-
-
84944201039
-
-
U.S. Department of Defense, Washington, D.C., Trusted Computer System Evaluation Criteria, 1985. DOD 5200.28-STD
-
U.S. Department of Defense, Washington, D.C. Trusted Computer System Evaluation Criteria, 1985. DOD 5200.28-STD.
-
-
-
|