메뉴 건너뛰기




Volumn 4691 LNCS, Issue , 2007, Pages 127-142

Where can an insider attack?

Author keywords

[No Author keywords available]

Indexed keywords

ENGINEERING RESEARCH; INFORMATION ANALYSIS; LAW ENFORCEMENT; PROBLEM SOLVING;

EID: 38149049950     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75227-1_9     Document Type: Conference Paper
Times cited : (37)

References (15)
  • 6
    • 84957808033 scopus 로고    scopus 로고
    • Insider Fraud
    • Christianson, B, Crispo, B, Harbison, W.S, Roe, M, eds, Security Protocols, Springer, Heidelberg
    • Gollmann, D.: Insider Fraud. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols. LNCS, vol. 1550, pp. 213-219. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1550 , pp. 213-219
    • Gollmann, D.1
  • 8
    • 33750949205 scopus 로고    scopus 로고
    • Hansen, R.R., Probst, C.W., Nielson, F.: Sandboxing in myKlaim. In: ARES'06. The First International Conference on Availability, Reliability and Security, Vienna, Austria, April 2006, IEEE Computer Society, Los Alamitos (2006)
    • Hansen, R.R., Probst, C.W., Nielson, F.: Sandboxing in myKlaim. In: ARES'06. The First International Conference on Availability, Reliability and Security, Vienna, Austria, April 2006, IEEE Computer Society, Los Alamitos (2006)
  • 10
    • 35048839066 scopus 로고    scopus 로고
    • Flow Logic: A multi-paradigmatic approach to static analysis
    • Mogensen, T.E, Schmidt, D.A, Sudborough, I.H, eds, The Essence of Computation, Springer, Heidelberg
    • Nielson, H.R., Nielson, F.: Flow Logic: a multi-paradigmatic approach to static analysis. In: Mogensen, T.E., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol. 2566, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2566
    • Nielson, H.R.1    Nielson, F.2
  • 11
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo, R., Deswarte, Y., Kaâniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25(5), 633-650 (1999)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaâniche, M.3
  • 14
    • 0010886652 scopus 로고    scopus 로고
    • The insider threat to information systems
    • Department of Defense Security Institute September
    • Shaw, E.D., Ruby, K.G., Post, J.M.: The insider threat to information systems. Security Awareness Bulletin No. 2-98, Department of Defense Security Institute September 1998 (1998)
    • (1998) Security Awareness Bulletin , vol.2-98
    • Shaw, E.D.1    Ruby, K.G.2    Post, J.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.