-
1
-
-
70149090395
-
-
Carnegie Mel-lon University, Dec. Software Engineering Institute Technical Report CMU/SEI-2006-TR-026
-
S. R. Band, D. M. Cappelli, L.F. Fischer, A. P. Moore, E.D. Shaw, and R.F. Trzeciak, Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, Software Engineering Institute Technical Report CMU/SEI-2006-TR-026, Carnegie Mel-lon University, Dec. 2006.
-
(2006)
Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
-
-
Band, S.R.1
Cappelli, D.M.2
Fischer, L.F.3
Moore, A.P.4
Shaw, E.D.5
Trzeciak, R.F.6
-
6
-
-
84886931577
-
Management and education of the risk of insider threat (MERIT): Mitigating the risk of sabotage to employers' information, systems, or networks
-
Nijmegen, Netherlands, July
-
D. M. Cappelli, A. G. Desai, A. P. Moore, T. J. Shimeall, E. A. Weaver, B. J. and Willke, "Management and education of the risk of insider threat (MERIT): Mitigating the risk of sabotage to employers' information, systems, or networks," Proceedings of the 24th International System Dynamics Conference, Nijmegen, Netherlands, July 2006.
-
(2006)
Proceedings of the 24th International System Dynamics Conference
-
-
Cappelli, D.M.1
Desai, A.G.2
Moore, A.P.3
Shimeall, T.J.4
Weaver, E.A.5
Willke, B.J.6
-
7
-
-
51349124362
-
Security engineering environment based on iso/iec standards: Providing standard, formal, and consistent supports for design, development, operation, and maintenance of secure information systems
-
J. Cheng, G. Yuichi, S. Morimoto, H. A. Daisuke, "Security engineering environment based on iso/iec standards: Providing standard, formal, and consistent supports for design, development, operation, and maintenance of secure information systems," International Conference on Information Security and Assurance, pp. 350-354, 2008.
-
(2008)
International Conference on Information Security and Assurance
, pp. 350-354
-
-
Cheng, J.1
Yuichi, G.2
Morimoto, S.3
Daisuke, H.A.4
-
10
-
-
84992227458
-
Proposed NIST standard for rolebased access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for rolebased access control," ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
57349141482
-
A meta model for access control: Why is it needed and is it even possible to achieve
-
New York, NY
-
D. Ferraiolo, and V. Atluri, "A meta model for access control: Why is it needed and is it even possible to achieve?," Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 153-154, New York, NY, 2008.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 153-154
-
-
Ferraiolo, D.1
Atluri, V.2
-
13
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia et al., "A unified framework for enforcing multiple access control policies," Proceedings ACM SIGMOD Conference, pp. 474-485, 1997.
-
(1997)
Proceedings ACM SIGMOD Conference
, pp. 474-485
-
-
Jajodia, S.1
-
15
-
-
27844543023
-
-
Joint SEI and U.S. Secret Service Report, May
-
M. M. Keeney, E.F. Kowalski, D.M. Cappelli, A.P. Moore, T.J. Shimeall, and S.N. Rogers, Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Joint SEI and U.S. Secret Service Report, May 2005.
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.M.1
Kowalski, E.F.2
Cappelli, D.M.3
Moore, A.P.4
Shimeall, T.J.5
Rogers, S.N.6
-
16
-
-
33646397613
-
Applying the Common Criteria in Systems Engineering
-
Mar.
-
F. Keblawi, and D. Sullivan, "Applying the Common Criteria in Systems Engineering," IEEE Security and Privacy, vol. 4, no. 2, pp. 50-55, Mar. 2006.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.2
, pp. 50-55
-
-
Keblawi, F.1
Sullivan, D.2
-
18
-
-
84875290233
-
-
5th Princeton Symposium on Information Sciences and Systems
-
B. Lampson, "Protection," 5th Princeton Symposium on Information Sciences and Systems, pp. 417-429, 1971.
-
(1971)
Protection
, pp. 417-429
-
-
Lampson, B.1
-
19
-
-
0345097590
-
A CC-based security engineering process evaluation model
-
IEEE Computer Society, Nov.
-
J. Lee, S. Lee, and B. Choi, "A CC-based security engineering process evaluation model," Proceedings of the 27th Annual international Conference on Computer Software and Applications COMPSAC, pp. 130-137, IEEE Computer Society, Nov. 2003.
-
(2003)
Proceedings of the 27th Annual international Conference on Computer Software and Applications COMPSAC
, pp. 130-137
-
-
Lee, J.1
Lee, S.2
Choi, B.3
-
20
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
Feb.
-
D. Mellado, E. Fernåndez-Medina, and M. Piattini, "A common criteria based security requirements engineering process for the development of secure information systems," Computer Standard Interfaces, vol. 29, no. 2, Feb. 2007.
-
(2007)
Computer Standard Interfaces
, vol.29
, Issue.2
-
-
Mellado, D.1
Fernåndez-Medina, E.2
Piattini, M.3
-
22
-
-
33751030558
-
A security specification verification technique based on the international standard ISO/IEC 15408
-
France, Apr.
-
S. Morimoto, S. Shigematsu, Y. Goto, and J. Cheng, "A security specification verification technique based on the international standard ISO/IEC 15408," Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 1802-1803, France, Apr. 2006.
-
(2006)
Proceedings of the 2006 ACM Symposium on Applied Computing
, pp. 1802-1803
-
-
Morimoto, S.1
Shigematsu, S.2
Goto, Y.3
Cheng, J.4
-
23
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
24
-
-
0033652039
-
The NIST model for role-based access control: Towards a uni-fied standard
-
26-28, Berlin, Germany
-
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST model for role-based access control: Towards a uni-fied standard," Proceedings of the 5th ACM Work-shop on Role-Based Access Control, pp. 47-61, 26-28, Berlin, Germany, 2000.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control
, pp. 47-61
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
25
-
-
51949113164
-
Security functional com-ponents for building a secure network computing environment
-
Nov.
-
M. Singh, and M. Patterh, "Security functional com-ponents for building a secure network computing environment," International Journal of Information Systems Security, vol. 16, no. 6, pp. 332-343, Nov. 2007.
-
(2007)
International Journal of Information Systems Security
, vol.16
, Issue.6
, pp. 332-343
-
-
Singh, M.1
Patterh, M.2
-
26
-
-
22944455834
-
Developerfocused assurance requirements
-
G. Stoneburner, "Developerfocused assurance requirements," Computer, vol. 38, no. 7, pp. 91-93, 2005.
-
(2005)
Computer
, vol.38
, Issue.7
, pp. 91-93
-
-
Stoneburner, G.1
-
27
-
-
0038348212
-
Secure systems development based on the common criteria: The PalME project
-
Nov.
-
M. Vetterling, G. Wimmel, and A. Wisspeintner, "Secure systems development based on the common criteria: The PalME project," SIGSOFT Software Engineering Notes, vol. 27, no. 6, Nov. 2002
-
(2002)
SIGSOFT Software Engineering Notes
, vol.27
, Issue.6
-
-
Vetterling, M.1
Wimmel, G.2
Wisspeintner, A.3
|