-
1
-
-
0034427834
-
The byte stops here: Duty and liability for negligent internet security
-
Fall
-
E. Kenneally, "The Byte Stops Here: Duty and Liability for Negligent Internet Security," Computer Security J., vol. 16, no. 4, Fall 2000, pp. 1-26.
-
(2000)
Computer Security J.
, vol.16
, Issue.4
, pp. 1-26
-
-
Kenneally, E.1
-
2
-
-
0347762494
-
Opening statement
-
Jan
-
T.C. Redman, "Opening Statement," Cutter IT J., Jan. 2003, pp. 2-5.
-
(2003)
Cutter IT J.
, pp. 2-5
-
-
Redman, T.C.1
-
3
-
-
0347762461
-
To clean or not to clean, That is the question
-
Jan
-
R.W. Pautke, "To Clean or Not to Clean, That Is the Question," Cutter IT J., Jan. 2003, pp. 11-12.
-
(2003)
Cutter IT J.
, pp. 11-12
-
-
Pautke, R.W.1
-
4
-
-
85008057868
-
Good enough is not good enough
-
Sept.-Oct
-
K. Reed, "Good Enough Is Not Good Enough," IEEE Software, Sept.-Oct. 2003, p. 109.
-
(2003)
IEEE Software
, pp. 109
-
-
Reed, K.1
-
5
-
-
0032097883
-
A map of security risks associated with using COTS
-
June
-
U. Lindqvist and E. Jonsson, "A Map of Security Risks Associated with Using COTS," Computer, June 1998, pp. 60-66.
-
(1998)
Computer
, pp. 60-66
-
-
Lindqvist, U.1
Jonsson, E.2
-
7
-
-
3242789458
-
Distributed denial of service attacks: Who pays?
-
Int'l Ed., Aug
-
M.J. Radin, "Distributed Denial of Service Attacks: Who Pays?" Computer Economics Report, Int'l Ed., Aug. 2001, pp. 12-15.
-
(2001)
Computer Economics Report
, pp. 12-15
-
-
Radin, M.J.1
-
8
-
-
3242772195
-
Decision support: You can't outsource liability for security
-
Aug
-
R. Weiler, "Decision Support: You Can't Outsource Liability for Security," Information Week, Aug. 2002; www.informationweek.com/story/IWK20020822S0003.
-
(2002)
Information Week
-
-
Weiler, R.1
-
9
-
-
3042744350
-
Two views on security software liability: Let the legal system decide
-
Jan.-Feb
-
D.J. Ryan, "Two Views on Security Software Liability: Let the Legal System Decide," IEEE Security & Privacy, Jan.-Feb. 2003, pp. 70-72.
-
(2003)
IEEE Security and Privacy
, pp. 70-72
-
-
Ryan, D.J.1
-
10
-
-
3242785680
-
Who's liable for insecure networks?
-
June
-
E. Kenneally, "Who's Liable for Insecure Networks?" Computer, June 2002, pp. 93-94.
-
(2002)
Computer
, pp. 93-94
-
-
Kenneally, E.1
-
11
-
-
3042780586
-
Two views on security software liability: Using the right legal tools
-
Jan.-Feb
-
C. Heckman, "Two Views on Security Software Liability: Using the Right Legal Tools," IEEE Security & Privacy, Jan.-Feb. 2003, pp. 73-75.
-
(2003)
IEEE Security and Privacy
, pp. 73-75
-
-
Heckman, C.1
-
15
-
-
3242790967
-
Proponents drop support for controversial software proposal
-
Oct
-
L.D. Paulson, "Proponents Drop Support for Controversial Software Proposal," Computer, Oct. 2003, p. 18.
-
(2003)
Computer
, pp. 18
-
-
Paulson, L.D.1
-
18
-
-
25944480475
-
Suit holds microsoft responsible for worm holes
-
3 Oct
-
J. Krim, "Suit Holds Microsoft Responsible for Worm Holes," Washington Post, 3 Oct. 2003, p. E05.
-
(2003)
Washington Post
-
-
Krim, J.1
-
19
-
-
0347790577
-
-
tech. report CMU/SEI-2001-TN-030, Software Eng. Inst., Carnegie Mellon Univ., Dec
-
H.F. Lipson, N.R. Mead, and A.P. Moore, "Can We Ever Build Survivable Systems from COTS Components?" tech. report CMU/SEI-2001-TN-030, Software Eng. Inst., Carnegie Mellon Univ., Dec. 2002; www.sei.cmu.edu/publications/documents/01.reports/01tn030.html.
-
(2002)
Can We Ever Build Survivable Systems from COTS Components?
-
-
Lipson, H.F.1
Mead, N.R.2
Moore, A.P.3
-
20
-
-
3042720722
-
Information security: Why the future belongs to the quants
-
July-Aug
-
D. Geer, K. Soo Hoo, and A. Jaquity, "Information Security: Why the Future Belongs to the Quants," IEEE Security & Privacy, July-Aug. 2003, pp. 24-32.
-
(2003)
IEEE Security and Privacy
, pp. 24-32
-
-
Geer, D.1
Soo Hoo, K.2
Jaquity, A.3
|