-
1
-
-
33846674492
-
-
CarnegieMellon, Pittsburgh, PA, USA, August
-
C. Alberts, A. Dorofee, J. Stevens, and C. Woody. Introduction to the OCTAVE Approach. CarnegieMellon, Pittsburgh, PA, USA, August 2003.
-
(2003)
Introduction to the OCTAVE Approach
-
-
Alberts, C.1
Dorofee, A.2
Stevens, J.3
Woody, C.4
-
4
-
-
0025641511
-
Providing a exible security override for trusted systems
-
L. Badger. Providing a exible security override for trusted systems. In CSFW, pages 115-121, 1990.
-
(1990)
CSFW
, pp. 115-121
-
-
Badger, L.1
-
5
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville. Information systems security design methods: implications for information systems development. ACM Comput. Surv., 25(4):375-414, 1993.
-
(1993)
ACM Comput. Surv.
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
7
-
-
77958031811
-
-
Bundesamt füherheit in der Informationstechnik (BSI). Version 2.0
-
Bundesamt füherheit in der Informationstechnik (BSI). BSI-Standard 100-2: IT-Grundschutz-Vorgehensweise. Version 2.0, 2008.
-
(2008)
BSI-Standard 100-2: IT-Grundschutz-Vorgehensweise
-
-
-
9
-
-
51249123658
-
-
Technical report, CarnegieMellon, January
-
D. Cappelli, A. Moore, R. F. Trzeciak, and T. J. Shimeall. Common sense guide to prevention and detection of insider threats 3rd edition - version 3.1. Technical report, CarnegieMellon, January 2009.
-
(2009)
Common Sense Guide to Prevention and Detection of Insider Threats 3rd edition - Version 3.1
-
-
Cappelli, D.1
Moore, A.2
Trzeciak, R.F.3
Shimeall, T.J.4
-
10
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
Washington, DC, USA. IEEE Computer Society
-
P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 222-230, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 222-230
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
11
-
-
33745451609
-
A policy based architecture for NSA RAdAC model
-
June
-
R. Choudhary. A policy based architecture for NSA RAdAC model. In Information Assurance Workshop (IAW 05), pages 294-301, June 2005.
-
(2005)
Information Assurance Workshop (IAW 05)
, pp. 294-301
-
-
Choudhary, R.1
-
12
-
-
0033562565
-
Privacy in clinical information systems in secondary care
-
May
-
I. Denley and S. W. Smith. Privacy in clinical information systems in secondary care. BMJ, 318(7194):1328-31, May 1999.
-
(1999)
BMJ
, vol.318
, Issue.7194
, pp. 1328-1331
-
-
Denley, I.1
Smith, S.W.2
-
13
-
-
34547371707
-
Enforcing access control using risk assessment
-
feb.
-
N. N. Diep, L. X. Hung, Y. Zhung, S. Lee, Y.-K. Lee, and H. Lee. Enforcing access control using risk assessment. In Universal Multiservice Networks, 2007. ECUMN '07. Fourth European Conference on, pages 419-424, feb. 2007.
-
(2007)
Universal Multiservice Networks 2007. ECUMN '07. Fourth European Conference on
, pp. 419-424
-
-
Diep, N.N.1
Hung, L.X.2
Zhung, Y.3
Lee, S.4
Lee, Y.-K.5
Lee, H.6
-
14
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
New York, NY, USA. ACM
-
N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody. Using trust and risk in role-based access control policies. In SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 156-162, New York, NY, USA, 2004. ACM.
-
(2004)
SACMAT '04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
16
-
-
0001073135
-
The use of knowledge in society
-
September. Reprinted in F.A. Hayek (ed.), Individualism and Economic Order. London: Routledge and Kegan Paul
-
F. A. Hayek. The use of knowledge in society. American Economic Review, 35:519-530, September 1945. Reprinted in F.A. Hayek (ed.), Individualism and Economic Order. London: Routledge and Kegan Paul.
-
(1945)
American Economic Review
, vol.35
, pp. 519-530
-
-
Hayek, F.A.1
-
19
-
-
17844381878
-
Isram: Information security risk analysis method
-
B. Karabacak and I. Sogukpinar. Isram: information security risk analysis method. Computers & Security, 24(2):147-159, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
20
-
-
35048862465
-
Information security risk assessment, aggregation, and mitigation
-
H. Wang, J. Pieprzyk, and V. Varadharajan, editors, ACISP. Springer
-
A. K. Lenstra and T. Voss. Information security risk assessment, aggregation, and mitigation. In H. Wang, J. Pieprzyk, and V. Varadharajan, editors, ACISP, volume 3108 of Lecture Notes in Computer Science, pages 391-401. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 391-401
-
-
Lenstra, A.K.1
Voss, T.2
-
21
-
-
0033646048
-
A model of accountability, confidentiality and override for healthcare and other applications
-
New York, NY, USA. ACM
-
J. J. Longstaff, M. A. Lockyer, and M. G. Thick. A model of accountability, confidentiality and override for healthcare and other applications. In RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control, pages 71-76, New York, NY, USA, 2000. ACM.
-
(2000)
RBAC '00: Proceedings of the Fifth ACM Workshop on Role-based Access Control
, pp. 71-76
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Thick, M.G.3
-
22
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of it misuse
-
G. Magklaras and S. Furnell. Insider threat prediction tool: Evaluating the probability of it misuse. Computers & Security, 21(1):62-73, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.1
Furnell, S.2
-
23
-
-
0008235326
-
-
Technical report, UGA-CS-LDIS, University of Georgia
-
J. A. Miller, M. Fan, S. Wu, I. B. Arpinar, A. P. Sheth, and K. J. Kochut. Security for the METEORworkow management system. Technical report, UGA-CS-LDIS, University of Georgia, 1999.
-
(1999)
Security for the METEORworkow Management System
-
-
Miller, J.A.1
Fan, M.2
Wu, S.3
Arpinar, I.B.4
Sheth, A.P.5
Kochut, K.J.6
-
29
-
-
32644465248
-
-
Technical Report CMU/SEI-2004-TR-021 CarnegieMellon, June
-
M. R. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore. Insider threat study: Illicit cyber activity in the banking and finance sector. Technical Report CMU/SEI-2004-TR-021, CarnegieMellon, June 2005.
-
(2005)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
30
-
-
33749681754
-
Towards a mechanism for discretionary overriding of access control
-
B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop. Springer
-
E. Rissanen, B. S. Firozabadi, and M. J. Sergot. Towards a mechanism for discretionary overriding of access control. In B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, editors, Security Protocols Workshop, volume 3957 of Lecture Notes in Computer Science, pages 312-319. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3957
, pp. 312-319
-
-
Rissanen, E.1
Firozabadi, B.S.2
Sergot, M.J.3
-
31
-
-
39049126192
-
A study of access control requirements for healthcare systems based on audit trails from access logs
-
IEEE Computer Society
-
L. Røstad and O. Edsberg. A study of access control requirements for healthcare systems based on audit trails from access logs. In ACSAC, pages 175-186. IEEE Computer Society, 2006.
-
(2006)
ACSAC
, pp. 175-186
-
-
Røstad, L.1
Edsberg, O.2
-
33
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
34
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
E. E. Schultz. A framework for understanding and predicting insider attacks. Computers & Security, 21(6):526-531, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
36
-
-
0038336804
-
A new dimension in access control: Studying maintenance engineering across organizational boundaries
-
New York, NY, USA. ACM
-
G. Stevens and V. Wulf. A new dimension in access control: studying maintenance engineering across organizational boundaries. In CSCW '02: Proceedings of the 2002 ACM conference on Computer supported cooperative work, pages 196-205, New York, NY, USA, 2002. ACM.
-
(2002)
CSCW '02: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work
, pp. 196-205
-
-
Stevens, G.1
Wulf, V.2
-
38
-
-
85041101752
-
-
The CRAMM Manager. Technical report, Insight Consulting
-
The CRAMM Manager. Cramm user guide issue 5.1. Technical report, Insight Consulting, 2005.
-
(2005)
Cramm User Guide Issue 5.1
-
-
-
39
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organisational context
-
R. Willison. Understanding the perpetration of employee computer crime in the organisational context. Information and Organization, 16(4):304-324, 2006.
-
(2006)
Information and Organization
, vol.16
, Issue.4
, pp. 304-324
-
-
Willison, R.1
-
40
-
-
33749351964
-
Opportunities for computer crime: Considering systems risk from a criminological perspective
-
R. Willison and J. Backhouse. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal, 15(4), 2006.
-
(2006)
European Journal
, vol.15
, Issue.4
-
-
Willison, R.1
Backhouse, J.2
-
41
-
-
24644478392
-
An insider threat model for adversary simulation
-
R. H. Anderson, T. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. Van Wyk, editors. RAND
-
B. Wood. An insider threat model for adversary simulation. In R. H. Anderson, T. Bozek, T. Longstaff, W. Meitzler, M. Skroch, and K. Van Wyk, editors, Research on Mitigating the Insier Threat to Information Systems #2. RAND, 2000.
-
(2000)
Research on Mitigating the Insier Threat to Information Systems
, vol.2
-
-
Wood, B.1
-
43
-
-
77958071874
-
The value of escalation and incentives in managing information access
-
Springer-Verlag New York, Inc.
-
X. Zhao and M. E. Johnson. The value of escalation and incentives in managing information access. In Managing Information Risk and the Economics of Security. Springer-Verlag New York, Inc., 2009.
-
(2009)
Managing Information Risk and the Economics of Security
-
-
Zhao, X.1
Johnson, M.E.2
|