-
1
-
-
0003400251
-
-
Bedford, MA: Mitre Corporation, November
-
Bell, D.E., & LaPadula, L. J. (1973). Secure Computer Systems: Mathematical Foundations. Mitre TR-2547, Vol. 1. Bedford, MA: Mitre Corporation, November.
-
(1973)
Secure Computer Systems: Mathematical Foundations. Mitre TR-2547
, vol.1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
33746455182
-
Using contextual security policies for threat response
-
Debar, H., Thomas, Y., Boulahia-Cuppens, N., & Cuppens, F. (2006). Using contextual security policies for threat response, Lecture Notes in Computer Science, 109-128.
-
(2006)
Lecture Notes in Computer Science
, pp. 109-128
-
-
Debar, H.1
Thomas, Y.2
Boulahia-Cuppens, N.3
Cuppens, F.4
-
6
-
-
0003563348
-
-
New York: Van Nostrand Reinhold Co., Inc.
-
Gasser, M. (1988). Building a Secure Computer System. New York: Van Nostrand Reinhold Co., Inc., pp. 57-72.
-
(1988)
Building a Secure Computer System
, pp. 57-72
-
-
Gasser, M.1
-
7
-
-
0020299523
-
-
Oakland, CA: IEEE Computer Society Press
-
Goguen, J., & Meseguer, J. (1982). Security policies and security models, Proceedings of the 1982 IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, p.11.
-
(1982)
Security Policies and Security Models, Proceedings of the 1982 IEEE Symposium on Security and Privacy
, pp. 11
-
-
Goguen, J.1
Meseguer, J.2
-
8
-
-
84873387771
-
-
London, June
-
Information Technology Security Evaluation Criteria (ITSEC). (1991). Department of Trade and Industry, London, June.
-
(1991)
Department of Trade and Industry
-
-
-
9
-
-
0019608720
-
Formal models for computer security
-
September
-
Landwehr, C. (1981). Formal models for computer security, ACM Computing Surveys, 13: 3, p. 247, September.
-
(1981)
ACM Computing Surveys
, Issue.3
, pp. 247
-
-
Landwehr, C.1
-
10
-
-
0025211594
-
The specification and modeling of computer security
-
9-16, January
-
Mclean, J. (1990). The specification and modeling of computer security, Computer, 23(1):9-16, January.
-
(1990)
Computer
, vol.23
, Issue.1
-
-
McLean, J.1
-
12
-
-
85024077883
-
-
Volumes, II, version 1, December
-
National institute of Standards and Technology and the National Security Agency. (1992). Federal Criteria (FC) for Information Technology Security, Volumes I and II, version 1, December.
-
(1992)
Federal Criteria (FC) for Information Technology Security
, vol.1
-
-
-
14
-
-
0016555241
-
The protection of information in computer systems, proc
-
Available at
-
Salzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems, Proc. IEEE, vol. 63. pp. 1278-1308. Available at http://www.ieee.org/web/publications/procieee/
-
(1975)
IEEE
, vol.63
, pp. 1278-1308
-
-
Salzer, J.H.1
Schroeder, M.D.2
-
18
-
-
0030377647
-
Information security management: The second generation
-
von Solms, R. (1996). Information security management: the second generation, Computers & Security, 15: No.4, pp. 281-288.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 281-288
-
-
Von Solms, R.1
-
19
-
-
0141917862
-
A framework for information security evaluation
-
von Solms, R., van de Haar, H., von Solms, S. H., & Caelli, W. J. (1994). A framework for information security evaluation, Information & Management, 143-153.
-
(1994)
Information & Management
, pp. 143-153
-
-
Von Solms, R.1
Van De Haar, H.2
Von Solms, S.H.3
Caelli, W.J.4
-
20
-
-
85127993111
-
-
Boca Raton, FL: CRC Press
-
White, G. B., Fisch, E. A., and Pooch, U. W. (1996). Computer System and Network Security. Boca Raton, FL: CRC Press.
-
(1996)
Computer System and Network Security
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
21
-
-
1242265154
-
In defense of the realm: Understanding the threats to information security
-
Whitman, M. E. (2004). In defense of the realm: Understanding the threats to information security. International Journal of Information Management, 24: 43-57.
-
(2004)
International Journal of Information Management
, vol.24
, pp. 43-57
-
-
Whitman, M.E.1
|