메뉴 건너뛰기




Volumn 39, Issue , 2008, Pages 153-163

Surviving Insider Attacks: A Call for System Experiments

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84864046807     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-77322-3_9     Document Type: Article
Times cited : (2)

References (18)
  • 1
    • 0022719806 scopus 로고
    • Dependable Computing: From Concepts to Design Diversity
    • May
    • A. Avizienis and J.-C. Laprie, Dependable Computing: From Concepts to Design Diversity, Proceedings of the IEEE, vol. 74, no. 5, May 1986.
    • (1986) Proceedings of the IEEE , vol.5 , pp. 74
    • Avizienis, A.1    Laprie, J.-C.2
  • 4
    • 4243114091 scopus 로고    scopus 로고
    • Efficinet Generation of Shared RSA Keys
    • July
    • D. Boneh and M. Franklin, "Efficinet Generation of Shared RSA Keys," Journal of the ACM (JACM), Vol. 48, Issue 4, July 2001
    • (2001) Journal of the ACM , vol.48 , Issue.4
    • Boneh, D.1    Franklin, M.2
  • 5
    • 84882791267 scopus 로고    scopus 로고
    • Report of the Invitational Workshop on Data Integrity, Z. Ruthberg and W.T. Polk (eds.) NIST Special Publication 500=168, Appendix A, September
    • D. D. Clark and D.R. Wilson, "Evolution of a Model for Computer Security," in Report of the Invitational Workshop on Data Integrity, Z. Ruthberg and W.T. Polk (eds.) NIST Special Publication 500=168, Appendix A, September 1989.
    • Evolution of a Model For Computer Security , pp. 1989
    • Clark, D.D.1    Wilson, D.R.2
  • 6
    • 0031682433 scopus 로고    scopus 로고
    • On the Formal Definition of Separation-of-Duty Policies and Their Composition
    • Oakland, California, May
    • V.D. Gligor, S. I. Gavrila and D. Ferraiolo, "On the Formal Definition of Separation-of-Duty Policies and their Composition," IEEE Symposium on Security and Privacy, Oakland, California, May 1998, pp. 172-185.
    • (1998) IEEE Symposium on Security and Privacy , pp. 172-185
    • Gligor, V.D.1    Gavrila, S.I.2    Ferraiolo, D.3
  • 7
    • 0002978817 scopus 로고
    • The Transaction Concept: Virtues and Limitations
    • Cannes, France
    • J. Gray, "The Transaction Concept: Virtues and Limitations, Proceedings of the VLDB, Cannes, France, 1981.
    • (1981) Proceedings of the VLDB
    • Gray, J.1
  • 10
    • 23044527599 scopus 로고    scopus 로고
    • Efficient Password-Based Authenticated Key Exchange Using Human-Memorable Passwords
    • Innsbruck, Austria, May
    • J. Katz, R. Ostrovsky and M. Yung, "Efficient Password-Based Authenticated Key Exchange Using Human-Memorable Passwords," Advanced in Cryptography - Eurocrypt 2001, Innsbruck, Austria, May 2001.
    • (2001) Advanced in Cryptography - Eurocrypt 2001
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 13
    • 84882761043 scopus 로고
    • A Guide to Understanding Trusted Facility Management
    • National Security Agency
    • National Security Agency, "A Guide to Understanding Trusted Facility Management," National Computer Security Center, NCSC-TG-015, Version 1, 1989.
    • (1989) National Computer Security Center, NCSC-TG-015, Version , pp. 1
  • 14
    • 84882762323 scopus 로고
    • A Guide to Understanding Audit in Trusted Systems
    • National Security Agency
    • National Security Agency, "A Guide to Understanding Audit in Trusted Systems," National Computer Security Center, NCSC-TG-001, Version 1, 1988
    • (1988) National Computer Security Center, NCSC-TG-001, Version , pp. 1
  • 17
    • 0016555241 scopus 로고
    • The Protection of Information In Computer Systems
    • Sept
    • J. H. Saltzer and M.D. Schroeder, "The Protection of Information in Computer Systems, " Proccedings of the IEEE, vol. 63, no. 9, Sept. 1975.
    • (1975) Proccedings of the IEEE , vol.63 , Issue.9
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.