메뉴 건너뛰기




Volumn Part F129230, Issue , 1998, Pages 22-29

An integrated framework for security and dependability

Author keywords

Computer security; Concepts; Confidentiality; Dependability; Measure; Modelling

Indexed keywords

MODELS; SYSTEMS ENGINEERING;

EID: 84884727787     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/310889.310903     Document Type: Conference Paper
Times cited : (36)

References (46)
  • 1
    • 0347104960 scopus 로고
    • Assessing computer security vulnerability
    • July
    • J. Alves-Foss, S. Barbosa, "Assessing Computer Security Vulnerability", Operating Systems Review, Vol. 29, No. 3, July 1995. pp. 3-13.
    • (1995) Operating Systems Review , vol.29 , Issue.3 , pp. 3-13
    • Alves-Foss, J.1    Barbosa, S.2
  • 2
    • 0025418952 scopus 로고
    • Dependability modeling and evaluation of software fault-tolerant systems
    • April
    • J. Arlat, K. Kanoun, J-C. Laprie, "Dependability Modeling and Evaluation of Software Fault-tolerant Systems" in IEEE Transactions on Computers, Vol. 39, No. 4, April 1990. pp. 504-513.
    • (1990) IEEE Transactions on Computers , vol.39 , Issue.4 , pp. 504-513
    • Arlat, J.1    Kanoun, K.2    Laprie, J.-C.3
  • 3
    • 3142618544 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Nov.
    • D. Bell, L. LaPadula, "Secure Computer Systems: Mathematical Foundations and Model", MITRE Report MTR 2547, Vol. 2, Nov. 1973.
    • (1973) MITRE Report MTR 2547 , vol.2
    • Bell, D.1    LaPadula, L.2
  • 6
    • 25444520915 scopus 로고
    • On the meaning of safety and security
    • A. Burns, J. McDermid, J. Dobson, On the Meaning of Safety and Security, The Computer Journal, Vol. 35, No. 1, 1992. pp. 3-15.
    • (1992) The Computer Journal , vol.35 , Issue.1 , pp. 3-15
    • Burns, A.1    McDermid, J.2    Dobson, J.3
  • 8
    • 0003615058 scopus 로고
    • Version 3.0e, Canadian System Security center, Communications Security Establishment Government of Canada
    • Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e, Canadian System Security center, Communications Security Establishment Government of Canada, 1993.
    • (1993) Canadian Trusted Computer Product Evaluation Criteria
  • 9
    • 33749052613 scopus 로고
    • Vers une evaluation quantitative de la securite informatique
    • Doctoral thesis LAAS/CNRS, Toulouse, December (In French)
    • M. Dacier: Vers une evaluation quantitative de la securite informatique, Doctoral thesis, LAAS Report No 94488, LAAS/CNRS, Toulouse, December 1994. (In French).
    • (1994) LAAS Report
    • Dacier, M.1
  • 11
    • 84910078402 scopus 로고
    • 5th edition, pp. 429ff, Addison-Wesley
    • C. J. Date, "An Introduction to Database Systems", Vol. 1, 5th edition, pp. 429ff, Addison-Wesley 1990, ISBN 0-201-51381-1.
    • (1990) An Introduction to Database Systems , vol.1
    • Date, C.J.1
  • 12
    • 0013294740 scopus 로고
    • Secure databases and safety: Some unexpected conflicts
    • T. Anderson (editor) Blackwell Scientific Publications
    • D. E. Denning: "Secure Databases and Safety: Some unexpected conflicts," pp. 101-111 in T. Anderson (editor): Safe & Secure Computing Systems, Blackwell Scientific Publications, ISBN 0-632-01819-4, 1989.
    • (1989) Safe & Secure Computing Systems , pp. 101-111
    • Denning, D.E.1
  • 14
    • 0026155432 scopus 로고
    • Intrusion tolerance in distributed computer systems
    • IEEE Computer Society Press
    • Y. Deswarte, L. Blain, J-C. Fabre, "Intrusion Tolerance in Distributed Computer Systems", IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1991. pp. 110-121.
    • (1991) IEEE Symposium on Security and Privacy , pp. 110-121
    • Deswarte, Y.1    Blain, L.2    Fabre, J.-C.3
  • 16
    • 85029227700 scopus 로고    scopus 로고
    • Federal Criteria for Information Security Technology, Draft, National Institute of Standards and technology (NIST) and National Security Agency (NSA), 1992
    • Federal Criteria for Information Security Technology, Draft, National Institute of Standards and technology (NIST) and National Security Agency (NSA), 1992.
  • 26
    • 84947931944 scopus 로고    scopus 로고
    • On the quantitative assessment of behavioural security
    • 24-26 June Wollongong, Australia. In Lecture Notes in Computer Science 1172, Springer-Verlag 1996
    • E. Jonsson, M. Andersson, "On the Quantitative Assessment of Behavioural Security". Proc. of the First Australasian Conference on Information Security and Privacy, ACISP'96, 24-26 June 1996, Wollongong, Australia. In Lecture Notes in Computer Science 1172, Springer-Verlag 1996. ISBN 3-540-61991-7. pp. 228-241.
    • (1996) Proc. of the First Australasian Conference on Information Security and Privacy, ACISP'96 , pp. 228-241
    • Jonsson, E.1    Andersson, M.2
  • 27
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • April
    • E. Jonsson, T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior", IEEE Transactions on Software Engineering, Vol. 23, No. 4, April 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , Issue.4
    • Jonsson, E.1    Olovsson, T.2
  • 28
    • 85029214341 scopus 로고
    • Integration problems in fault-tolerant, secure computer design
    • A. Avizienis. J.C. Laprie (editors) Springer-Verlag, N.Y.
    • M.K. Joseph: "Integration Problems in Fault-Tolerant, Secure Computer Design," pp. 347-364 in A. Avizienis. J.C. Laprie (editors): Dependable Computing for Critical Applications, Springer-Verlag, N.Y., ISBN 3-211-82249-6, 1991.
    • (1991) Dependable Computing for Critical Applications , pp. 347-364
    • Joseph, M.K.1
  • 31
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C. E. Landwehr, "Formal Models for Computer Security", ACM Computing Surveys, Vol. 13, No. 3, 1981. pp. 247-278.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 35
    • 3342934249 scopus 로고
    • On dependability, its measurement and its management
    • Oxford University Press
    • J. McDermid, "On Dependability, Its Measurement and Its Management", in High Integrity Systems, Vol. 1, No. 1, 1994, Oxford University Press, pp. 17-26.
    • (1994) High Integrity Systems , vol.1 , Issue.1 , pp. 17-26
    • McDermid, J.1
  • 38
    • 85029234885 scopus 로고
    • National Institute of Standards and Technology; Glossary of Computer Security Terms ("Aqua Book"), Oct. 21
    • National Institute of Standards and Technology; Glossary of Computer Security Terms, NSC-TG-004 version. 1, ("Aqua Book"), Oct. 21, 1988.
    • (1988) NSC-TG-004 Version , vol.1
  • 40
    • 3743090260 scopus 로고
    • Data collection for security fault forecasting: Pilot experiment
    • Chalmers University of Technology ESPRIT/BRA Project No 6362 (PDCS2) First Year Report, Toulouse Sept.
    • T. Olovsson, E. Jonsson, S. Brocklehurst, B. Little-wood: "Data Collection for Security Fault Forecasting: Pilot Experiment", Technical Report No 167, Department of Computer Engineering, Chalmers University of Technology, 1992 and ESPRIT/BRA Project No 6362 (PDCS2) First Year Report, Toulouse Sept. 1993, pp 515-540.
    • (1992) Technical Report no 167, Department of Computer Engineering , pp. 515-540
    • Olovsson, T.1    Jonsson, E.2    Brocklehurst, S.3    Little-Wood, B.4
  • 41
    • 3743122627 scopus 로고
    • Towards operational measures of computer security: Experimentation and modelling
    • Chalmers University of Technology, 1995 and in B. Randell et al. (editors.): Predictably Dependable Computing Systems, ESPRIT Basic Research Series, Springer Verlag
    • T. Olovsson, E. Jonsson, S. Brocklehurst, B. Little-wood: "Towards Operational Measures of Computer Security: Experimentation and Modelling", Technical Report No 236, Department of Computer Engineering, Chalmers University of Technology, 1995 and in B. Randell et al. (editors.): Predictably Dependable Computing Systems, ESPRIT Basic Research Series, Springer Verlag, 1995, ISBN 3-540-59334-9, pp 555-572.
    • (1995) Technical Report no 236, Department of Computer Engineering , pp. 555-572
    • Olovsson, T.1    Jonsson, E.2    Brocklehurst, S.3    Little-Wood, B.4
  • 42
    • 4243163437 scopus 로고
    • Successive operational periods as measures of dependability
    • (editors A. Avizieniz et al.), Springer Verlag
    • G. Rubino, B. Sericola, "Successive Operational Periods as Measures of Dependability" in Dependable Computing for Critical Applications (editors A. Avizieniz et al.), Springer Verlag, ISBN 3-211-82249-6, 1991, pp. 239-254.
    • (1991) Dependable Computing for Critical Applications , pp. 239-254
    • Rubino, G.1    Sericola, B.2
  • 44
    • 85029223925 scopus 로고
    • System intrusion detection: Model, design and analysis
    • Dec. 16-17 (PRFTS'93), Melbourne, Australia, CRT Publishing Ltd, London
    • B. C. Soh, T. S. Dillon," System Intrusion Detection: Model, Design and Analysis", Pacific Rim International Symposium on Fault-Tolerant Computing, Dec. 16-17, 1993, (PRFTS'93), Melbourne, Australia, CRT Publishing Ltd, London, pp. 85-90.
    • (1993) Pacific Rim International Symposium on Fault-Tolerant Computing , pp. 85-90
    • Soh, B.C.1    Dillon, T.S.2
  • 46
    • 0003969633 scopus 로고
    • ("orange book"), National Computer Security Center, Department of Defense, No DOD 5200.28.STD
    • Trusted Computer System Evaluation Criteria ("orange book"), National Computer Security Center, Department of Defense, No DOD 5200.28.STD, 1985.
    • (1985) Trusted Computer System Evaluation Criteria


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.