-
1
-
-
0021199968
-
Optimizing preventive service of software products
-
E. N. Adams, "Optimizing preventive service of software products", IBM Journal of Research and Development, vol. 28, No. 1, pp. 2-14, 1984.
-
(1984)
IBM Journal of Research and Development
, vol.28
, Issue.1
, pp. 2-14
-
-
Adams, E.N.1
-
2
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Jan-Mar
-
A. Avizienis, J-C. Laprie, B. Randell and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing", IEEE Transactions on Dependable and Secure Computing, Vol.1, No.1, Jan-Mar 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
3
-
-
0013301913
-
-
TAB Professional and Reference Books, McGraw-Hill Inc, ISBN 0-8306-7592-2
-
R. H. Baker, Computer Security Handbook, 2nd Edition, TAB Professional and Reference Books, McGraw-Hill Inc, ISBN 0-8306-7592-2, 1991.
-
(1991)
Computer Security Handbook, 2nd Edition
-
-
Baker, R.H.1
-
4
-
-
85029644174
-
The emperor's Old armor
-
Lake Arrowhead, California, United States, ISBN:0-89791-944-0
-
Blakley, R., "The Emperor's old armor", New Security Paradigms Workshop, Lake Arrowhead, California, United States, 1996, Pages: 2 - 16, ISBN:0-89791-944-0
-
(1996)
New Security Paradigms Workshop
, pp. 2-16
-
-
Blakley, R.1
-
6
-
-
0023829319
-
Noninterference and the composability of security properties
-
sp
-
McCullough, D., "Noninterference and the Composability of Security Properties," sp, p. 177, 1988 IEEE Symposium on Security and Privacy, 1988
-
(1988)
1988 IEEE Symposium on Security and Privacy
, pp. 177
-
-
McCullough, D.1
-
7
-
-
32044443362
-
-
Technical Note CMU/SEI-2003-TN-033, Carnegie-Mellon University, Pittsburg, USA
-
Firesmith. D. G., "Common Concepts Underlying Safety, Security, and Survivability Engineering", Technical Note CMU/SEI-2003-TN-033, Carnegie-Mellon University, Pittsburg, USA.
-
Common Concepts Underlying Safety, Security, and Survivability Engineering
-
-
Firesmith, D.G.1
-
8
-
-
3743114813
-
-
Information Technology Security Evaluation Criteria (ITSEC): ISBN 92-826-7024-4
-
Information Technology Security Evaluation Criteria (ITSEC): Provisional Harmonized Criteria, December 1993. ISBN 92-826-7024-4.
-
Provisional Harmonized Criteria, December 1993
-
-
-
9
-
-
84888061178
-
Toward a taxonomy and costing method for security services
-
Proceedings. 15th Annual, 6-10 Dec.
-
C. Irvine, T. Levin, "Toward a taxonomy and costing method for security services", Computer Security Applications Conference, 1999. (ACSAC '99) Proceedings. 15th Annual, 6-10 Dec. 1999 Page(s):183-188
-
(1999)
Computer Security Applications Conference, 1999. (ACSAC '99)
, pp. 183-188
-
-
Irvine, C.1
Levin, T.2
-
10
-
-
0039101844
-
Trust requirements in e-business
-
Dec
-
S. Jones, M. Wilikens, P. Morris, M. Masera, "Trust Requirements in E-Business", Communications of the ACM, Vol. 43, No. 12, Dec 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
-
-
Jones, S.1
Wilikens, M.2
Morris, P.3
Masera, M.4
-
11
-
-
0013193898
-
On the integration of security and dependability in computer systems
-
Nov. 4-6, 1992. ISBN 0-88986-171-4
-
E. Jonsson, T. Olovsson, "On the Integration of Security and Dependability in Computer Systems", LASTED International Conference on Reliability, Quality Control and Risk Assessment in Washington, Nov. 4-6, 1992. ISBN 0-88986-171-4
-
LASTED International Conference on Reliability, Quality Control and Risk Assessment in Washington
-
-
Jonsson, E.1
Olovsson, T.2
-
12
-
-
0013190261
-
A unified approach to dependability impairments in computer systems
-
Cambridge, MA, Oct. 18-20 ISBN 0-88986-181-1
-
E. Jonsson, "A Unified Approach to Dependability Impairments in Computer Systems", IASTED International Conference on Reliability, Quality Control and Risk Assessment, Cambridge, MA, Oct. 18-20 1993, ISBN 0-88986-181-1, pp. 173-178.
-
(1993)
IASTED International Conference on Reliability, Quality Control and Risk Assessment
, pp. 173-178
-
-
Jonsson, E.1
-
13
-
-
84884727787
-
An integrated framework for security and dependability
-
Charlottesville Sept. VA, USA
-
E. Jonsson, "An Integrated Framework for Security and Dependability". New Security Paradigms Workshop 1998, Charlottesville Sept. 22-25, VA, USA
-
New Security Paradigms Workshop 1998
, pp. 22-25
-
-
Jonsson, E.1
-
14
-
-
0033489651
-
On the functional relation between security and dependbility impairments
-
Caledon Hills, Canada, September (NSPW 1999)
-
E. Jonsson, L. Strömberg, S. Lindskog, "On the Functional Relation Between Security and Dependbility Impairments", ACM New Security Paradigms Workshop, Caledon Hills, Canada, 23-25 September 1999 (NSPW 1999)
-
(1999)
ACM New Security Paradigms Workshop
, pp. 23-25
-
-
Jonsson, E.1
Strömberg, L.2
Lindskog, S.3
-
19
-
-
0000228328
-
Performability: A retrospective and some pointers to the future
-
Elsevier
-
Meyer, J.F., "Performability: A Retrospective and Some Pointers to the Future", Performance Evaluation, Vol. 14, No. 3-4, p. 139-156, Elsevier, 1992.
-
(1992)
Performance Evaluation
, vol.14
, Issue.3-4
, pp. 139-156
-
-
Meyer, J.F.1
-
20
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Jan
-
Nicol, D.M.; Sanders, W.H.; Trivedi, K.S., "Model-based evaluation: from dependability to security", Dependable and Secure Computing, IEEE Transactions on Volume 1, Issue 1, Jan 2004 Page(s):48-65
-
(2004)
Dependable and Secure Computing, IEEE Transactions on
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
22
-
-
0013244582
-
Errors, faults and failures: A model
-
T. Anderson editor, Blackwell Scientific Publications ISBN 0-632-01819-4
-
B.K. Daniels, "Errors, faults and failures: A model", in Safe and Secure Computing Systems, T. Anderson editor, Blackwell Scientific Publications 1989. ISBN 0-632-01819-4.
-
(1989)
Safe and Secure Computing Systems
-
-
Daniels, B.K.1
-
23
-
-
0030649935
-
A theory for system security
-
1997. Proceedings., 10-12 June
-
Zhang, K., "A theory for system security", Computer Security Foundations Workshop, 1997. Proceedings., 10-12 June 1997 Page(s):148-155
-
(1997)
Computer Security Foundations Workshop
, pp. 148-155
-
-
Zhang, K.1
|