-
1
-
-
0024914229
-
Security-Control Methods for Statistical Databases: A Comparative Study
-
Dec.
-
N.R. Adam and J.C. Wortmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, Vol. 21, No. 4, Dec. 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
35048843609
-
A Fault Tolerance Approach to Survivability
-
IEEE Computer Society Press, Los Alamitos, CA
-
P. Ammann, S. Jajodia, and P. Liu, "A Fault Tolerance Approach to Survivability," in Computer Security, Dependability, and Assurance: From Needs to Solutions, IEEE Computer Society Press, Los Alamitos, CA, 1999.
-
(1999)
Computer Security, Dependability, and Assurance: from Needs to Solutions
-
-
Ammann, P.1
Jajodia, S.2
Liu, P.3
-
4
-
-
0034501876
-
Windows of Vulnerability: A Case Study Analysis
-
Dec.
-
W.A. Arbaugh, et al., "Windows of Vulnerability: A Case Study Analysis," IEEE Computer, pp. 52-59, Vol. 33 (12), Dec. 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
-
5
-
-
0004141256
-
Fundamental Concepts of Dependability
-
LAAS-CNRS, Apr.
-
A. Avizienis, J.C. Laprie, and B. Randell, "Fundamental Concepts of Dependability," Research Report N01145, LAAS-CNRS, Apr. 2001.
-
(2001)
Research Report N01145
-
-
Avizienis, A.1
Laprie, J.C.2
Randell, B.3
-
9
-
-
35048847849
-
Vulnerabilities and Fraud in Computing Systems
-
Sv. Stefan, Serbia and Montenegro, Oct.
-
B. Bhargava, "Vulnerabilities and Fraud in Computing Systems," Proc. Intl. Conf. IPSI, Sv. Stefan, Serbia and Montenegro, Oct. 2003.
-
(2003)
Proc. Intl. Conf. IPSI
-
-
Bhargava, B.1
-
10
-
-
0242622301
-
Fault-tolerant authentication and group key management in mobile computing
-
Las Vegas, June
-
B. Bhargava, S. Kamisetty and S. Madria, "Fault-tolerant authentication and group key management in mobile computing," Intl. Conf. on Internet Camp., Las Vegas, June 2000.
-
(2000)
Intl. Conf. on Internet Camp.
-
-
Bhargava, B.1
Kamisetty, S.2
Madria, S.3
-
13
-
-
35048832215
-
Fraud Formalization and Detection
-
Prague, Czechia, Sep.
-
B. Bhargava, Y. Zhong, and Y. Lu, "Fraud Formalization and Detection," Proc. Intl. Conf. on Data Warehousing and Knowledge Discovery DaWaK-2003, Prague, Czechia, Sep. 2003.
-
(2003)
Proc. Intl. Conf. on Data Warehousing and Knowledge Discovery DaWaK-2003
-
-
Bhargava, B.1
Zhong, Y.2
Lu, Y.3
-
14
-
-
2542607810
-
Quantitative Assessment of Operational Security: Models and Tools
-
May
-
M. Dacier, Y. Deswarte, and M. Kaâniche, "Quantitative Assessment of Operational Security: Models and Tools," Technical Report, LAAS Report 96493, May 1996.
-
(1996)
Technical Report, LAAS Report 96493
-
-
Dacier, M.1
Deswarte, Y.2
Kaâniche, M.3
-
15
-
-
0001924088
-
A Model for Secure Protocols and Their Compositions
-
N. Heintze and J.D. Tygar, "A Model for Secure Protocols and Their Compositions," IEEE Transactions on Software Engineering, Vol. 22, No. 1, 1996, pp. 16-30.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
16
-
-
0033489651
-
On the Functional Relation between Security and Dependability Impairments
-
Sep.
-
E. Jonsson et al., "On the Functional Relation Between Security and Dependability Impairments," Proc. 1999 Workshop on New Security Paradigms, Sep. 1999, pp. 104-111.
-
(1999)
Proc. 1999 Workshop on New Security Paradigms
, pp. 104-111
-
-
Jonsson, E.1
-
17
-
-
12344294075
-
Computer Vulnerability Analysis
-
Dept. of Computer Sciences, Purdue University
-
I. Krsul, E.H. Spafford, and M. Tripunitara, "Computer Vulnerability Analysis," Technical Report, COAST TR 98-07, Dept. of Computer Sciences, Purdue University, 1998.
-
(1998)
Technical Report, COAST TR 98-07
-
-
Krsul, I.1
Spafford, E.H.2
Tripunitara, M.3
-
18
-
-
84974774507
-
Towards Operational Measures of Computer Security
-
B. Littlewood at al., "Towards Operational Measures of Computer Security", Journal of Computer Security, Vol. 2, 1993, pp. 211-229.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 211-229
-
-
Littlewood, B.1
-
19
-
-
35048853440
-
The Unified Information Security Architecture
-
Oct.
-
F. Maymir-Ducharme, P.C. Clements, K. Wallnau, and R. W. Krut, "The Unified Information Security Architecture," Technical Report, CMU/SEI-95-TR-015, Oct. 1995.
-
(1995)
Technical Report, CMU/SEI-95-TR-015
-
-
Maymir-Ducharme, F.1
Clements, P.C.2
Wallnau, K.3
Krut, R.W.4
-
20
-
-
0042457632
-
Survivable Network Analysis Method
-
Pittsburgh, PA, Sep.
-
N.R. Mead, R.J. Ellison, R.C. Linger, T. Longstaff, and J. McHugh, "Survivable Network Analysis Method," Tech. Rep. CMU/SEI-2000-TR-OI3, Pittsburgh, PA, Sep. 2000.
-
(2000)
Tech. Rep. CMU/SEI-2000-TR-OI3
-
-
Mead, N.R.1
Ellison, R.J.2
Linger, R.C.3
Longstaff, T.4
McHugh, J.5
-
21
-
-
84955619209
-
Applying the Dependability Paradigm to Computer Security
-
Sep.
-
C. Meadows, "Applying the Dependability Paradigm to Computer Security," Proc. Workshop on New Security Paradigms, Sep. 1995, pp. 75-81.
-
(1995)
Proc. Workshop on New Security Paradigms
, pp. 75-81
-
-
Meadows, C.1
-
23
-
-
35048857252
-
Model-Based Analysis of Configuration Vulnerabilities
-
Pisa, Italy
-
C. R. Ramakrishnan and R. Sekar, "Model-Based Analysis of Configuration Vulnerabilities," Proc. Second Intl. Workshop on Verification, Model Checking, and Abstract Interpretation (VMCAI'98), Pisa, Italy, 2000.
-
(2000)
Proc. Second Intl. Workshop on Verification, Model Checking, and Abstract Interpretation (VMCAI'98)
-
-
Ramakrishnan, C.R.1
Sekar, R.2
-
24
-
-
35248863946
-
Dependability - A Unifying Concept
-
IEEE Computer Society Press, Los Alamitos, CA
-
B. Randell, "Dependability - a Unifying Concept," in: Computer Security, Dependability, and Assurance: From Needs to Solutions, IEEE Computer Society Press, Los Alamitos, CA, 1999.
-
(1999)
Computer Security, Dependability, and Assurance: from Needs to Solutions
-
-
Randell, B.1
-
25
-
-
23544459288
-
Formal Methods for the Analysis of Authentication Protocols
-
Dept. of Electrical Engineering and Computer Science, University of Michigan, Nov.
-
A.D. Rubin and P. Honeyman, "Formal Methods for the Analysis of Authentication Protocols," Tech. Rep. 93-7, Dept. of Electrical Engineering and Computer Science, University of Michigan, Nov. 1993.
-
(1993)
Tech. Rep. 93-7
-
-
Rubin, A.D.1
Honeyman, P.2
-
26
-
-
35048822327
-
CERIAS Classic Vulnerability Database User Manual
-
CERIAS, Purdue University, West Lafayette, IN
-
G. Song et al., "CERIAS Classic Vulnerability Database User Manual," Technical Report 2000-17, CERIAS, Purdue University, West Lafayette, IN, 2000.
-
(2000)
Technical Report 2000-17
-
-
Song, G.1
-
27
-
-
17644399080
-
Risk Management Guide for Information Technology Systems
-
Washington, DC
-
G. Stoneburner, A. Goguen, and A. Feringa, "Risk Management Guide for Information Technology Systems," NIST Special Publication 800-30, Washington, DC, 2001.
-
(2001)
NIST Special Publication 800-30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
29
-
-
33746922743
-
Dynamic Trust Production Based on Interaction Sequence
-
Dept. Comp. Sciences, Purdue Univ., Mar.
-
Y. Zhong, Y. Lu, and B. Bhargava, "Dynamic Trust Production Based on Interaction Sequence," Tech. Rep. CSD-TR 03-006, Dept. Comp. Sciences, Purdue Univ., Mar.2003.
-
(2003)
Tech. Rep. CSD-TR 03-006
-
-
Zhong, Y.1
Lu, Y.2
Bhargava, B.3
|