메뉴 건너뛰기




Volumn , Issue , 2008, Pages 427-432

Exploring security countermeasures along the attack sequence

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SECURITY; INTERNATIONAL CONFERENCES; NEW APPROACHES; SECURITY COUNTERMEASURES;

EID: 51349142613     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISA.2008.112     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 1
    • 51349159431 scopus 로고    scopus 로고
    • P. A Loscocco, S. D. Smalley, et al. The inevitability of failure, The flawed assumption of security in modern computing environments, 21st National Information Systems Security Conference, 1998.
    • P. A Loscocco, S. D. Smalley, et al. The inevitability of failure, The flawed assumption of security in modern computing environments, 21st National Information Systems Security Conference, 1998.
  • 2
    • 51349084767 scopus 로고    scopus 로고
    • Common Criteria for Information Technology Security Evaluation, Part2: Security Functional Requirements, 2004.
    • Common Criteria for Information Technology Security Evaluation, Part2: Security Functional Requirements, 2004.
  • 3
    • 0015315880 scopus 로고
    • A Hardware Architecture for Implementing Protection Rings
    • M. D. Schroeder, J. H.,Saltzer. A Hardware Architecture for Implementing Protection Rings, Communications of ACM, Vol. 15, No. 3, pp. 157-170, 1972.
    • (1972) Communications of ACM , vol.15 , Issue.3 , pp. 157-170
    • Schroeder, M.D.1    Saltzer, J.H.2
  • 4
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic Adaptive Detection and Prevention of Buffer Overflow Attacks
    • C. Cowan, et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer Overflow Attacks, Proc. of 7th USENK Security Symposium, pp. 63-78, 1998.
    • (1998) Proc. of 7th USENK Security Symposium , pp. 63-78
    • Cowan, C.1
  • 5
    • 51349088377 scopus 로고    scopus 로고
    • NSA. Information Assurance Technical Framework Release 3.1, 2002
    • NSA. Information Assurance Technical Framework Release 3.1, 2002.
  • 6
    • 51349131638 scopus 로고    scopus 로고
    • Survey on Security Policy Model about Access Control, Information Promotion Agency, Japan, 2005. (in Japanese)
    • Survey on Security Policy Model about Access Control, Information Promotion Agency, Japan, 2005. (in Japanese)
  • 8
    • 0030086382 scopus 로고    scopus 로고
    • Role Based Access Control Models
    • R. Sandhu, E. J. Coyne, et al. Role Based Access Control Models, IEEE Computer, Vol.29, No.2, pp.38-47, 1996
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2
  • 14
    • 51349163297 scopus 로고    scopus 로고
    • available at, 2003
    • CyLab, Cyberdiversity, available at http://www/cylab.cmu.edu/default. aspx?id=186, 2003.
    • CyLab, Cyberdiversity


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.