-
1
-
-
33745593513
-
The Insider Problem Revisited
-
CA, USA, Septenber, ACM Press, NewYork
-
Bishop, M.: The Insider Problem Revisited. In: Proc. of New Security Paradigms Workshop 2005, Lake Arrowhead, CA, USA, Septenber 2005. ACM Press, NewYork (2005)
-
(2005)
Proc. of New Security Paradigms Workshop 2005, Lake Arrowhead
-
-
Bishop, M.1
-
4
-
-
27544447707
-
Towards a theory of insider threat assessment
-
IEEE Computer Society Press, Los Alamitos
-
Chinchani, R., Iyer, A., Ngo, H.Q., Upadhyaya, S.: Towards a theory of insider threat assessment. In: Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp. 108-117. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceedings of the 2005 International Conference on Dependable Systems and Networks
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
6
-
-
84957808033
-
Insider Fraud
-
Christianson, B, Crispo, B, Harbison, W.S, Roe, M, eds, Security Protocols, Springer, Heidelberg
-
Gollmann, D.: Insider Fraud. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols. LNCS, vol. 1550, pp. 213-219. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1550
, pp. 213-219
-
-
Gollmann, D.1
-
7
-
-
0006057299
-
Formalising fault trees
-
Redmill, F, Anderson, T, eds, Brighton, pp, Springer, Heidelberg
-
Gorski, J., Wardzinski, A.: Formalising fault trees. In: Redmill, F., Anderson, T. (eds.) Achievement and Assurance of Safety: Proceedings of the 3rd Safety-critical Systems Symposium, Brighton, pp. 311-328. Springer, Heidelberg (1995)
-
(1995)
Achievement and Assurance of Safety: Proceedings of the 3rd Safety-critical Systems Symposium
, pp. 311-328
-
-
Gorski, J.1
Wardzinski, A.2
-
8
-
-
33750949205
-
-
Hansen, R.R., Probst, C.W., Nielson, F.: Sandboxing in myKlaim. In: ARES'06. The First International Conference on Availability, Reliability and Security, Vienna, Austria, April 2006, IEEE Computer Society, Los Alamitos (2006)
-
Hansen, R.R., Probst, C.W., Nielson, F.: Sandboxing in myKlaim. In: ARES'06. The First International Conference on Availability, Reliability and Security, Vienna, Austria, April 2006, IEEE Computer Society, Los Alamitos (2006)
-
-
-
-
9
-
-
0000372791
-
KLAIM: A Kernel Language for Agents Interaction and Mobility
-
Nicola, R.D., Ferrari, G., Pugliese, R.: KLAIM: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering 24(5), 315-330 (1998)
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 315-330
-
-
Nicola, R.D.1
Ferrari, G.2
Pugliese, R.3
-
10
-
-
35048839066
-
Flow Logic: A multi-paradigmatic approach to static analysis
-
Mogensen, T.E, Schmidt, D.A, Sudborough, I.H, eds, The Essence of Computation, Springer, Heidelberg
-
Nielson, H.R., Nielson, F.: Flow Logic: a multi-paradigmatic approach to static analysis. In: Mogensen, T.E., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol. 2566, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2566
-
-
Nielson, H.R.1
Nielson, F.2
-
11
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo, R., Deswarte, Y., Kaâniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25(5), 633-650 (1999)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
13
-
-
38149079272
-
-
RAND Corporation, Santa Monica, CA, U.S.A, March
-
Anderson, R.H., Brackney, R.C.: Understanding the Insider Threat. RAND Corporation, Santa Monica, CA, U.S.A., March 2005 (2005)
-
(2005)
Understanding the Insider Threat
-
-
Anderson, R.H.1
Brackney, R.C.2
-
14
-
-
0010886652
-
The insider threat to information systems
-
Department of Defense Security Institute September
-
Shaw, E.D., Ruby, K.G., Post, J.M.: The insider threat to information systems. Security Awareness Bulletin No. 2-98, Department of Defense Security Institute September 1998 (1998)
-
(1998)
Security Awareness Bulletin
, vol.2-98
-
-
Shaw, E.D.1
Ruby, K.G.2
Post, J.M.3
-
15
-
-
38149013444
-
-
June 12
-
Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool (June 12, 2001)
-
(2001)
Computer-attack graph generation tool
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
|