-
1
-
-
0030643872
-
Secure software architectures
-
Moriconi, M., Xiaolei, Q., Riemenschneider, R.A., and Li, G., "Secure software architectures", Proc. IEEE Symposium on Security and Privacy, 1997, pp. 84 - 93.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 84-93
-
-
Moriconi, M.1
Xiaolei, Q.2
Riemenschneider, R.A.3
Li, G.4
-
3
-
-
35048897235
-
Engineering Principles for Information Technology Security (a Baseline for Achieving Security)
-
June
-
Stoneburner, G., Hayden, C., and Feringa, A. "Engineering Principles for Information Technology Security (A Baseline for Achieving Security)" NIST Special Publication 800-27, June 2001.
-
(2001)
NIST Special Publication
, vol.800
, Issue.27
-
-
Stoneburner, G.1
Hayden, C.2
Feringa, A.3
-
4
-
-
0003507850
-
-
Prentice-Hall, Upper Saddle River, New Jersey
-
Stallings, W., Network Security Essentials, Prentice-Hall, Upper Saddle River, New Jersey, 2000, pp 6 - 11.
-
(2000)
Network Security Essentials
, pp. 6-11
-
-
Stallings, W.1
-
5
-
-
0032218229
-
A security architecture for computational grid
-
San Francisco, California, November
-
Foster, I., Kesselman, C., Tsudik G. and Tuecke S. "A Security Architecture for Computational Grid," Proceedings of the 5th ACM Conference on Computer and Communications Security Conference, San Francisco, California, November 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security Conference
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
6
-
-
0004198635
-
-
Prentice Hall, Upper Saddle River, NJ
-
Pfleeger, C. P., Pfleeger, S. L., Security In Computing. Professional Technical Reference, Prentice Hall, Upper Saddle River, NJ, 2003.
-
(2003)
Security in Computing. Professional Technical Reference
-
-
Pfleeger, C.P.1
Pfleeger, S.L.2
-
7
-
-
0003339136
-
The digital distributed system security architecture
-
Baltimore, October
-
Gasser, M., Goldstein, A., Kaufman, C., and Lampson, B. "The Digital Distributed System Security Architecture," Proceedings of the 1989 National Computer Security Conference, Baltimore, October 1989, pp. 305-319.
-
(1989)
Proceedings of the 1989 National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
8
-
-
33745437561
-
A survey of 802.11a wireless security threats and security mechanisms
-
Welch, C., Lathrop, S. "A Survey of 802.11a Wireless Security Threats and Security Mechanisms," A Technical Report to the Army G6, 2003.
-
(2003)
A Technical Report to the Army
, vol.G6
-
-
Welch, C.1
Lathrop, S.2
-
13
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
Washington, DC, August
-
Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D. and Lepreau J. "The Flask Security Architecture: System Support for Diverse Security Policies," Proceedings of the 8th USENIX Security Symposium, pages 123-139, Washington, DC, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
14
-
-
0031542975
-
Extensible security architectures for java
-
Saint Malo, France, October
-
Wallach, D. S., Balfanz, D, Dean, D. and Felten, E. W. "Extensible Security Architectures for Java," Proceedings of the Sixteenth ACM Symposium on Operating System Principles, pages 116-128, Saint Malo, France, October 1997.
-
(1997)
Proceedings of the Sixteenth ACM Symposium on Operating System Principles
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
|