-
1
-
-
0022719806
-
Dependable Computing: From Concepts to Design Diversity
-
May
-
A. Avizienis and J.-C. Laprie, Dependable Computing: From Concepts to Design Diversity, Proceedings of the IEEE, vol. 74, no. 5, May 1986.
-
(1986)
Proceedings of the IEEE
, vol.5
, pp. 74
-
-
Avizienis, A.1
Laprie, J.-C.2
-
2
-
-
12344308304
-
Basic Concepts and Taxonomy of Dependable and Secure Computing
-
Jan-Mar
-
A. Avizienis, J.-C. Laprie, B. Rendell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol.1, no. 1, Jan-Mar 2004
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
-
-
Avizienis, A.1
Laprie, J.-C.2
Rendell, B.3
Landwehr, C.4
-
3
-
-
48049098067
-
Administering Access Control In Dynamic Coalitions
-
San Diego, CA, December
-
R. Bobba, S.I. Gavrila, V.D. Gligor, H. Khurana, and R. Koleva, "Administering Access Control in Dynamic Coalitions," Proc. of the 19th USENIX Large Installation System Administration Conference (LISA), San Diego, CA, December 2005.
-
(2005)
Proc. of the 19th USENIX Large Installation System Administration Conference (LISA)
-
-
Bobba, R.1
Gavrila, S.I.2
Gligor, V.D.3
Khurana, H.4
Koleva, R.5
-
4
-
-
4243114091
-
Efficinet Generation of Shared RSA Keys
-
July
-
D. Boneh and M. Franklin, "Efficinet Generation of Shared RSA Keys," Journal of the ACM (JACM), Vol. 48, Issue 4, July 2001
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
84882791267
-
-
Report of the Invitational Workshop on Data Integrity, Z. Ruthberg and W.T. Polk (eds.) NIST Special Publication 500=168, Appendix A, September
-
D. D. Clark and D.R. Wilson, "Evolution of a Model for Computer Security," in Report of the Invitational Workshop on Data Integrity, Z. Ruthberg and W.T. Polk (eds.) NIST Special Publication 500=168, Appendix A, September 1989.
-
Evolution of a Model For Computer Security
, pp. 1989
-
-
Clark, D.D.1
Wilson, D.R.2
-
6
-
-
0031682433
-
On the Formal Definition of Separation-of-Duty Policies and Their Composition
-
Oakland, California, May
-
V.D. Gligor, S. I. Gavrila and D. Ferraiolo, "On the Formal Definition of Separation-of-Duty Policies and their Composition," IEEE Symposium on Security and Privacy, Oakland, California, May 1998, pp. 172-185.
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 172-185
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferraiolo, D.3
-
7
-
-
0002978817
-
The Transaction Concept: Virtues and Limitations
-
Cannes, France
-
J. Gray, "The Transaction Concept: Virtues and Limitations, Proceedings of the VLDB, Cannes, France, 1981.
-
(1981)
Proceedings of the VLDB
-
-
Gray, J.1
-
9
-
-
84863111931
-
Unix Without the Superuser
-
Phoenix, Arizona, June
-
M.S. Hecht, M.E. Carson, C.S. Chandersekaran, R.S. Chapman, L.J. Dotterer, V.D. Gligor, W.D. Jiang, A. Johri, G. L. Luckenbaugh, and N. Vasudevan, "Unix without the Superuser," Proc. of the USENIX Conference, Phoenix, Arizona, June 1987, pp. 243-256.
-
(1987)
Proc. of the USENIX Conference
, pp. 243-256
-
-
Hecht, M.S.1
Carson, M.E.2
Chandersekaran, C.S.3
Chapman, R.S.4
Dotterer, L.J.5
Gligor, V.D.6
Jiang, W.D.7
Johri, A.8
Luckenbaugh, G.L.9
Vasudevan, N.10
-
10
-
-
23044527599
-
Efficient Password-Based Authenticated Key Exchange Using Human-Memorable Passwords
-
Innsbruck, Austria, May
-
J. Katz, R. Ostrovsky and M. Yung, "Efficient Password-Based Authenticated Key Exchange Using Human-Memorable Passwords," Advanced in Cryptography - Eurocrypt 2001, Innsbruck, Austria, May 2001.
-
(2001)
Advanced in Cryptography - Eurocrypt 2001
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
11
-
-
33749548996
-
Two-Server Password-Only Authenticated Key Exchange
-
in, N.Y
-
"Two-Server Password-Only Authenticated Key Exchange," J. Katz, P. MacKenzie, G.Taban, and V. Gligor, in Proccedings of Applied Cryptography and Network Security (ACNS), N.Y. 2005
-
(2005)
Proccedings of Applied Cryptography and Network Security (ACNS)
-
-
Katz, J.1
MacKenzie, P.2
Taban, G.3
Gligor, V.4
-
12
-
-
0036375159
-
Reasoning About Joint Administration of Access Policies For Coalition Resources
-
Vienna, Austria, July
-
H. Khurana, V.D. Gligor, and J. Linn, "Reasoning about Joint Administration of Access Policies for Coalition Resources," Proc. of the IEEE International Conference for Distributed Computer Systems - ICDCS, Vienna, Austria, July 2002.
-
(2002)
Proc. of the IEEE International Conference for Distributed Computer Systems - ICDCS
-
-
Khurana, H.1
Gligor, V.D.2
Linn, J.3
-
13
-
-
84882761043
-
A Guide to Understanding Trusted Facility Management
-
National Security Agency
-
National Security Agency, "A Guide to Understanding Trusted Facility Management," National Computer Security Center, NCSC-TG-015, Version 1, 1989.
-
(1989)
National Computer Security Center, NCSC-TG-015, Version
, pp. 1
-
-
-
14
-
-
84882762323
-
A Guide to Understanding Audit in Trusted Systems
-
National Security Agency
-
National Security Agency, "A Guide to Understanding Audit in Trusted Systems," National Computer Security Center, NCSC-TG-001, Version 1, 1988
-
(1988)
National Computer Security Center, NCSC-TG-001, Version
, pp. 1
-
-
-
16
-
-
27544434179
-
-
June, International Conference on Dependable Systems and Networks, Yokohama, Japan
-
R. Reeder and R. Maxion, "User Interface Dependability through Goal-Error Prevention," International Conference on Dependable Systems and Networks, Yokohama, Japan, June 2005.
-
(2005)
User Interface Dependability Through Goal-Error Prevention
-
-
Reeder, R.1
Maxion, R.2
-
17
-
-
0016555241
-
The Protection of Information In Computer Systems
-
Sept
-
J. H. Saltzer and M.D. Schroeder, "The Protection of Information in Computer Systems, " Proccedings of the IEEE, vol. 63, no. 9, Sept. 1975.
-
(1975)
Proccedings of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
|