-
1
-
-
0004200684
-
Computer Security Technology Planning Study. ESD-TR-73-51
-
Hanscom AFB, Bedford, MA
-
Anderson, J.P. (1972). Computer Security Technology Planning Study. ESD-TR-73-51, Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA.
-
(1972)
Air Force Electronic Systems Division
-
-
Anderson, J.P.1
-
2
-
-
1142305232
-
Cryptography and competition policy: issues with 'trusted computing'
-
July, Boston, Massachusetts
-
Anderson, R.J. (2003). Cryptography and competition policy: issues with 'trusted computing'. In Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003), July 13-16, Boston, Massachusetts, pp 3-10.
-
(2003)
In Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003)
, vol.13-16
, pp. 3-10
-
-
Anderson, R.J.1
-
5
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
The MITRE Corp., Bedford MA
-
Bell, D.E. and LaPadula, L.J (1973). Secure computer systems: Mathematical foundations and model. Technical Report M74 244, The MITRE Corp., Bedford MA.
-
(1973)
Technical Report M74
, vol.244
-
-
Bell, D.E.1
Lapadula, L.J.2
-
6
-
-
85161809546
-
The Darknet and the future of content protection
-
LNCS 2770, Springer
-
Biddle, P., England, P., Peinado, M. and Willman, B. (2003). The Darknet and the future of content protection. In Digital Rights Management-Technological, Economic, Legal and Political Aspects. LNCS 2770, Springer, pp 344-365.
-
(2003)
In Digital Rights Management-Technological, Economic, Legal and Political Aspects
, pp. 344-365
-
-
Biddle, P.1
England, P.2
Peinado, M.3
Willman, B.4
-
8
-
-
0038570707
-
Digital Rights Management Report
-
CEN/ISSS, Accessed 18 August 2004
-
CEN/ISSS, (2003). Digital Rights Management Report http://europa.eu.int/comm/enterprise/ict/policy/doc/drm.pdf. Accessed 18 August 2004.
-
(2003)
-
-
-
9
-
-
0002262722
-
Role Based Access Control (RBAC): Features and motivations
-
New Orleans, Louisianna, December 11-15, IEEE Computer Society Press
-
Ferraiolo, D. Cugini, J. and Kuhn, R. (1995). Role Based Access Control (RBAC): Features and motivations. In Proceedings of the Annual Computer Security Applications Conference, New Orleans, Louisianna, December 11-15, IEEE Computer Society Press.
-
(1995)
In Proceedings of the Annual Computer Security Applications Conference
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
10
-
-
0016984825
-
Protection in Operating Systems
-
Harrison, M., Ruzzo, W. and Ullman, J. (1976). Protection in Operating Systems. Communications of the ACM, 19(8) pp. 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
11
-
-
33745846830
-
DRM Under Attack: Weaknesses in Existing Systems
-
LNCS 2770, Springer
-
Hauser, T. and Wenz, C. (2003): DRM Under Attack: Weaknesses in Existing Systems. In Digital Rights Management-Technological, Economic, Legal and Political Aspects. LNCS 2770, Springer, pp 206-223.
-
(2003)
In Digital Rights Management-Technological, Economic, Legal and Political Aspects
, pp. 206-223
-
-
Hauser, T.1
Wenz, C.2
-
12
-
-
0031333085
-
Music on the Internet and the intellectual property protection problem
-
Lacy, J., Snyder, J.H. and Maher, D.P. (1997). Music on the Internet and the intellectual property protection problem. In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE 97), Vol 1, pp 77-83.
-
(1997)
In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE 97)
, vol.1
, pp. 77-83
-
-
Lacy, J.1
Snyder, J.H.2
Maher, D.P.3
-
13
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
Arlington, VA., August
-
Loscocco, P.A. Smalley, S.D. et al. (1998). The inevitability of failure: The flawed assumption of security in modern computing environments. In 21st National Information Systems Security Conference, Arlington, VA., August.
-
(1998)
In 21st National Information Systems Security Conference
-
-
Loscocco, P.A.1
Smalley, S.D.2
-
15
-
-
84944878354
-
Handbook of Applied Cryptography
-
CRC Press, ISBN 0849385237
-
Menezes, A.J. Van Oorschot, P.C. and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press, ISBN 0849385237.
-
(1996)
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
16
-
-
84871254090
-
Next Generation Secure Computing Base-Product Information
-
Microsoft, accessed 20 July 2004, available at
-
Microsoft, (2004), Next Generation Secure Computing Base-Product Information, available at: http://www.microsoft.com/resources/ngscb/productinfo.mspx, accessed 20 July 2004.
-
(2004)
-
-
-
17
-
-
35348942716
-
NGSCB: A Trusted Open System
-
Sydney, Australia, July 13-15
-
Peinado, M. Chen, Y. et al. (2004), NGSCB: A Trusted Open System. In Proceedings of 9th Australasian Conference on Information Security and Privacy ACISP, Sydney, Australia, July 13-15.
-
(2004)
In Proceedings of 9th Australasian Conference on Information Security and Privacy ACISP
-
-
Peinado, M.1
Chen, Y.2
-
18
-
-
85084161596
-
Analysis of the Intel Pentium' s ability to support a secure virtual machine monitor
-
Denver, Colorado, USA, August 14-17
-
Robin, J. and Irvine, C. (2000). Analysis of the Intel Pentium' s ability to support a secure virtual machine monitor. In Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17.
-
(2000)
In Proceedings of the 9th USENIX Security Symposium
-
-
Robin, J.1
Irvine, C.2
-
19
-
-
84871219465
-
Microsoft Shelves NGSCB Project as NX Moves to Centre Stage. 5 May 2004
-
accessed 7 May 2004
-
Rooney, P. (2004). Microsoft Shelves NGSCB Project as NX Moves to Centre Stage. 5 May 2004, http://www.crn.com/sections/BreakingNews/dailyarchives.asp?ArticleID=49936 accessed 7 May 2004.
-
(2004)
-
-
Rooney, P.1
-
20
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
San Diego, August 9-13
-
Sailer, R. Zhang, X. et al. (2004). Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th Usenix Security Symposium, San Diego, August 9-13.
-
(2004)
In Proceedings of the 13th Usenix Security Symposium
-
-
Sailer, R.1
Zhang, X.2
-
21
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
Saltzer, J.H. and Schroeder, M.D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sept.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
23
-
-
0032657326
-
Access Control to Prevent Piracy of Digital Information
-
Schneck, P. (1999). Access Control to Prevent Piracy of Digital Information. Proceedings of the IEEE, 87(7):1239-1250.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1239-1250
-
-
Schneck, P.1
-
25
-
-
0003337920
-
Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing
-
137-159
-
Stefik, M. (1997). Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing. Berkeley Technology Law Journal Vol. 12. No.1. pp 137-159.
-
(1997)
Berkeley Technology Law Journal
, vol.12
, Issue.1
-
-
Stefik, M.1
-
26
-
-
14844287953
-
Trusted Platform Module Main Specification
-
Trusted Computing Group, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, October 2003, Version 1.2, Revision 62, available at, accessed 26 May 2004
-
Trusted Computing Group, (2003), Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, October 2003, Version 1.2, Revision 62, available at http://www.trustedcomputinggroup.org, accessed 26 May 2004.
-
(2003)
-
-
-
27
-
-
84871248861
-
World Intellectual Property Organization
-
WIPO, Accessed 15 April 2004.
-
WIPO, (1996). World Intellectual Property Organization. Wipo copyright treaty. http://www.wipo.org/eng/diplconf/distrib/treaty01.htm Accessed 15 April 2004.
-
(1996)
Wipo copyright treaty
-
-
|