메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 205-216

Information security: Science, pseudoscience, and flying pigs

Author keywords

Computer networks; Computer security; Information security; Information systems; Information technology; Information theory; Internet; Power system protection; Power system security; Pressing

Indexed keywords

COMPUTER NETWORKS; ELECTRIC POWER SYSTEM PROTECTION; INFORMATION SYSTEMS; INFORMATION TECHNOLOGY; INFORMATION THEORY; INTERNET; PRESSING (FORMING); SECURITY OF DATA; SECURITY SYSTEMS;

EID: 4544282487     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991537     Document Type: Conference Paper
Times cited : (8)

References (39)
  • 1
    • 3943093761 scopus 로고
    • Information security: An elusive goal
    • Harvard University, Cambridge, MA, June
    • Jelen, George F., Information Security: An Elusive Goal, Program on Information Resources Policy, Harvard University, Cambridge, MA, June 1985
    • (1985) Program on Information Resources Policy
    • Jelen George, F.1
  • 2
    • 0003053039 scopus 로고
    • Concepts and terminology for computer security
    • M. Abrams, S.Jajodia, and H.Podell, eds., IEEE Computer Society Press, Los Alamitos, Calif
    • Brinkley, D.L. and Schell, R.R., Concepts and Terminology for Computer Security, Information Security, M. Abrams, S.Jajodia, and H.Podell, eds., IEEE Computer Society Press, Los Alamitos, Calif., 1995
    • (1995) Information Security
    • Brinkley, D.L.1    Schell, R.R.2
  • 3
    • 84949270504 scopus 로고    scopus 로고
    • Novell certificate extension attributes-novell security attributes
    • Novell Inc., August
    • Jueneman, R.R., Novell Certificate Extension Attributes-Novell Security Attributes, Tutorial and Detailed Design, Document Version 0.998, Novell Inc., August 1998
    • (1998) Tutorial and Detailed Design, Document Version 0.998
    • Jueneman, R.R.1
  • 4
    • 84949223114 scopus 로고
    • Department of defense trusted computer security evaluation criteria, DOD 5200.28-STD
    • December
    • Department of Defense Trusted Computer Security Evaluation Criteria, DOD 5200.28-STD, National Computer Security Center, December 1985
    • (1985) National Computer Security Center
  • 5
    • 84949270505 scopus 로고    scopus 로고
    • Final evaluation report, novell, incorporated netware 4.1.1 server
    • June
    • Final Evaluation Report, Novell, Incorporated Netware 4.1.1 Server, National Computer Security Center, June 1998
    • (1998) National Computer Security Center
  • 6
    • 0033895110 scopus 로고    scopus 로고
    • Platform security: What is lacking?
    • Elsevier Advanced Technology
    • Schell, R.R. and Thompson, M.F., Platform Security: What is Lacking? Information Security Technical Report, Vol 5, No. 1, 2000, Elsevier Advanced Technology
    • (2000) Information Security Technical Report , vol.5 , Issue.1
    • Schell, R.R.1    Thompson, M.F.2
  • 8
    • 84949270506 scopus 로고
    • Trusted network interpretation of trusted computer system evaluation criteria, NCSC-TG-005
    • 31 July
    • Trusted Network Interpretation of Trusted Computer System Evaluation Criteria, NCSC-TG-005, National Computer Security Center Version 1, 31 July 1987
    • (1987) National Computer Security Center Version 1
  • 9
    • 84949270507 scopus 로고    scopus 로고
    • Common criteria for information technology security evaluation
    • ISO/IEC, May
    • Common Criteria for Information Technology Security Evaluation, CCIB-98-026, ISO/IEC, May 1998
    • (1998) CCIB-98-026
  • 12
    • 0003714340 scopus 로고    scopus 로고
    • National Academy Press, Washington, D.C., Fred B. Schneider, Editor
    • Trust In Cyberspace, National Academy Press, Washington, D.C. 1998, Fred B. Schneider, Editor
    • (1998) Trust in Cyberspace
  • 13
    • 3943108716 scopus 로고
    • Computer security: The achilles' heel of the electronic air force
    • Jan.-Feb
    • R.R. Schell, Computer Security: the Achilles' Heel of the Electronic Air Force, Air University Review, Vol. 30:2, Jan.-Feb., 1979
    • (1979) Air University Review , vol.30 , Issue.2
    • Schell, R.R.1
  • 14
    • 0006291871 scopus 로고
    • Security controls for computer systems: Report of defense science board task force on computer security, ad # a076617/0
    • Santa Monica, Calif., February, reissued October 1979
    • Ware, W. H., ed., Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security, AD # A076617/0, Rand Corporation, Santa Monica, Calif., February 1970, reissued October 1979
    • (1970) Rand Corporation
    • Ware, W.H.1
  • 16
    • 0020778471 scopus 로고
    • SCOMP: A solution to the multilevel security problem
    • July
    • Fraim, L.J., SCOMP: A Solution to the Multilevel Security Problem, IEEE Computer, July 1983
    • (1983) IEEE Computer
    • Fraim, L.J.1
  • 18
    • 4544284713 scopus 로고
    • Security controls in the ADEPT-50 time-sharing system
    • Weissman, C., Security Controls in the ADEPT-50 Time-Sharing System, Fall Joint Computer Conference, 1969
    • (1969) Fall Joint Computer Conference
    • Weissman, C.1
  • 19
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J.H. Saltzer and M.R. Schroeder. The Protection of Information in Computer Systems, Proc. IEEE Vol. 63, No. 9, September 1975
    • (1975) Proc. IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.R.2
  • 20
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Denning, D.E. A Lattice Model of Secure Information Flow. Communications of the ACM, Vol 19. No 5, May 1976
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 21
    • 66749185396 scopus 로고
    • Computer security model: Unified exposition and multics interpretation
    • Bedford MA, June
    • Bell, D.E. and LaPadula, L.J., Computer Security Model: Unified Exposition and Multics Interpretation, ESD-TR-75-306. MITRE Corporation, Bedford MA, June 1975
    • (1975) ESD-TR-75-306. MITRE Corporation
    • Bell, D.E.1    LaPadula, L.J.2
  • 22
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Bedford, MA, April
    • Biba, K.J., Integrity Considerations for Secure Computer Systems, ESD-TR-76-372, MITRE Corporation, Bedford, MA, April 1977
    • (1977) ESD-TR-76-372, MITRE Corporation
    • Biba, K.J.1
  • 24
    • 0020777709 scopus 로고
    • Security kernel design and implementation: An introduction
    • July
    • Ames, S.R., et al, Security Kernel Design and Implementation: An Introduction, Computer, IEEE, July 1983
    • (1983) Computer, IEEE
    • Ames, S.R.1
  • 26
    • 0015346655 scopus 로고
    • A technique for software module specification with examples
    • May
    • Parnas, D.L., A Technique for Software Module Specification with Examples, Communications of the ACM, Vol. 13, No. 5, May, 1972
    • (1972) Communications of the ACM , vol.13 , Issue.5
    • Parnas, D.L.1
  • 27
    • 0018434466 scopus 로고
    • Synchronization with eventcounts and sequencers
    • February
    • D.P. Reed, and R.K. Kanodia, Synchronization with Eventcounts and Sequencers, Communications of the ACM, Vol.22, No. 2, February 1979
    • (1979) Communications of the ACM , vol.22 , Issue.2
    • Reed, D.P.1    Kanodia, R.K.2
  • 28
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • May
    • Millen, J.K. Security Kernel Validation in Practice. Communications of the ACM. Vol 19. No 5, May 1976
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Millen, J.K.1
  • 30
    • 53349127055 scopus 로고
    • Limitations of end-to-end encryption in secure computer networks
    • May (ESD TR 78-158, DTIC AD A059221)
    • Padlipsky, M. A., Snow, D. P., and Karger, P. A., Limitations of End-to-End Encryption in Secure Computer Networks, The MITRE Corporation, MTR-3592, Vol. I, May 1978 (ESD TR 78-158, DTIC AD A059221)
    • (1978) The MITRE Corporation, MTR-3592 , vol.1
    • Padlipsky, M.A.1    Snow, D.P.2    Karger, P.A.3
  • 31
    • 84949270516 scopus 로고
    • Final evaluation report, gemini network processor, version 1.01
    • June
    • Final Evaluation Report, Gemini Network Processor, Version 1.01, National Computer Security Center, pp 123-124, June 1995
    • (1995) National Computer Security Center , pp. 123-124
  • 34
    • 0026254933 scopus 로고
    • A retrospective of the VAX VMM security kernel
    • Nov
    • Karger, P. A., et al., A Retrospective of the VAX VMM Security Kernel, IEEE Transactions on Software Engineering, Vol. 17, No. 11, Nov. 1991
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.11
    • Karger, P.A.1
  • 38
    • 84949270519 scopus 로고
    • Trusted database management system interpretation of the trusted computer system evaluation criteria
    • April
    • Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-021, National Computer Security Center, April 1991
    • (1991) NCSC-TG-021, National Computer Security Center
  • 39
    • 84949270520 scopus 로고    scopus 로고
    • Bring in e-trading PIN pads
    • Sydney, Australia, 24 October
    • Bill Caelli, Bring in E-Trading PIN Pads, The Australian newspaper, Sydney, Australia, 24 October 2000
    • (2000) The Australian Newspaper
    • Caelli, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.