메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-694

Security in computing systems: Challenges, approaches and solutions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84891390279     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-3-540-78442-5     Document Type: Book
Times cited : (42)

References (509)
  • 4
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • Abadi, M., On SDSI's linked local name spaces, Journal of Computer Security 6(1998), pp. 3-22.
    • (1998) Journal of Computer Security , vol.6 , pp. 3-22
    • Abadi, M.1
  • 20
    • 84891410721 scopus 로고
    • Special Issue FTCS-25 Silver Jubilee, IEEE, Los Alamitos etc.
    • Avizienis, A. (ed.), Fault-Tolerant Computing, Special Issue FTCS-25 Silver Jubilee, IEEE, Los Alamitos etc., 1995.
    • (1995) Fault-Tolerant Computing
    • Avizienis, A.1
  • 22
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Chalmers University of Technology, Göteborg
    • Axelsson, S., Intrusion detection systems: A survey and taxonomy, Technical Report 99-15, Chalmers University of Technology, Göteborg, 2000.
    • (2000) Technical Report 99-15
    • Axelsson, S.1
  • 23
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S., The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security 3(3) (2000), pp. 186-205.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 24
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis
    • Bace, R. G.., Intrusion Detection, Macmillan Technical Publishing, Indianapolis, 2000.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 25
    • 35048854169 scopus 로고    scopus 로고
    • A general theorem for secure reactive systems
    • TCC 2004, Lecture Notes in Computer Science 2951, Springer, Berlin etc.
    • Backes, M., Pfitzmann, B., Waidner, M., A general theorem for secure reactive systems. In: 1st Theory of Cryptography Conference, TCC 2004, Lecture Notes in Computer Science 2951, Springer, Berlin etc., 2004, pp. 336-354.
    • (2004) 1st Theory of Cryptography Conference , pp. 336-354
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 26
    • 19744374538 scopus 로고    scopus 로고
    • Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library
    • Backes, M., Pfitzmann, B., Waidner, M., Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library, International Journal of Information Security 4(3) (2005), pp. 135-154.
    • (2005) International Journal of Information Security , vol.4 , Issue.3 , pp. 135-154
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 28
    • 33750265393 scopus 로고    scopus 로고
    • Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
    • ESORICS 2006, Lecture Notes in Computer Science 4189, Springer, Berlin etc.
    • Backes, M., Pfitzmann, B., Waidner, M., Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes. In: Proc. 11th European Symposium on Research in Computer Security, ESORICS 2006, Lecture Notes in Computer Science 4189, Springer, Berlin etc., 2006, pp. 404-423.
    • (2006) Proc. 11th European Symposium on Research in Computer Security , pp. 404-423
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 29
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Bacon, J., Moody, K., Yao, W., A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security 5(4) (2002), pp. 492-540.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 30
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Barker, S., Stuckey, P. J., Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security 6(4) (2003), pp. 501-546.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 31
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Bass, T., Intrusion detection systems and multisensor data fusion, Communications of the ACM 43(4) (2000), pp. 99-105..
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 34
    • 0024133011 scopus 로고
    • A generalization of Hellman's extension to Shannon's approach to cryptrography
    • Beauchemin, P., Brassard, G., A generalization of Hellman's extension to Shannon's approach to cryptrography, Journal of Cryptology 1(1988), pp. 129-131.
    • (1988) Journal of Cryptology , vol.1 , pp. 129-131
    • Beauchemin, P.1    Brassard, G.2
  • 35
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority
    • Beaver, D., Secure multiparty protocols and zero knowledge proof systems tolerating a faulty minority, Journal of Cryptology 4(2) (1991), pp. 75-122.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 37
    • 49049100147 scopus 로고    scopus 로고
    • Secure computer systems: A mathematical model
    • Reprinted, in
    • Bell, D. E., LaPadula, L. J., Secure computer systems: A mathematical model, Volume II. Reprinted in: Journal of Computer Security 4 (2 /3) (1996), pp. 229-263.
    • (1996) Journal of Computer Security , vol.2-4 , Issue.2-3 , pp. 229-263
    • Bell, D.E.1    LaPadula, L.J.2
  • 38
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Lecture Notes in Computer Science 435, Springer, Berlin etc.
    • Bellare, M., Micali, S., Non-interactive oblivious transfer and applications. In: Proc. Crypto 89, Lecture Notes in Computer Science 435, Springer, Berlin etc., 1989, pp. 547-557.
    • (1989) Proc. Crypto 89 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 40
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J., Rogaway, P., The security of the cipher block chaining message authentication code, Journal of Computer and System Sciences 61(3) (2000), pp. 362-399.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 44
    • 84958777954 scopus 로고    scopus 로고
    • An authorization model and its formal semantics
    • ESORICS 1998, Sept.1998, Lecture Notes in Computer Science 1485, Springer, Berlin etc.
    • Bertino, E., Buccafurri, F., Ferrari, E., Rullo, P., An authorization model and its formal semantics. In: Proc. 5th European Symposium on Research in Computer Security, ESORICS 1998, Sept.1998, Lecture Notes in Computer Science 1485, Springer, Berlin etc., 1998, pp. 127-142.
    • (1998) Proc. 5th European Symposium on Research in Computer Security , pp. 127-142
    • Bertino, E.1    Buccafurri, F.2    Ferrari, E.3    Rullo, P.4
  • 46
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V., The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security 2(1) (1999), pp. 65-104.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 53
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE Corporation, Bedford, MA
    • Biba, K. J., Integrity considerations for secure computer systems, Technical Report ESDTR-76-372 (MTR-3153), MITRE Corporation, Bedford, MA, 1977.
    • (1977) Technical Report ESDTR-76-372 (MTR-3153)
    • Biba, K.J.1
  • 54
    • 84974754345 scopus 로고
    • A logical view of secure dependencies
    • Bieber, P., Cuppens, F., A logical view of secure dependencies, Journal of Computer Security 1(1) (1992), pp. 99-130.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 99-130
    • Bieber, P.1    Cuppens, F.2
  • 56
    • 0030376097 scopus 로고    scopus 로고
    • Conspiracy and information flow in the take-grant protection model
    • Bishop, M., Conspiracy and information flow in the take-grant protection model, Journal of Computer Security 4(1996), pp. 331-359.
    • (1996) Journal of Computer Security , vol.4 , pp. 331-359
    • Bishop, M.1
  • 58
    • 0021510318 scopus 로고
    • Some variants of the take-grant protection model
    • Biskup, J., Some variants of the take-grant protection model, Information Processing Letters 19(1984), pp. 151-156.
    • (1984) Information Processing Letters , vol.19 , pp. 151-156
    • Biskup, J.1
  • 60
    • 84891410474 scopus 로고
    • Privacy respecting permissions and rights
    • Landwehr, C. E. ed., Elsevier Science North Holland, Amsterdam etc.
    • Biskup, J., Privacy respecting permissions and rights. In: Landwehr, C. E. (ed.), Database Security: Status and Prospects, Elsevier Science (North Holland), Amsterdam etc., 1988, pp. 173-185.
    • (1988) Database Security: Status and Prospects , pp. 173-185
    • Biskup, J.1
  • 62
    • 84891453823 scopus 로고
    • Sicherheit von IT-Systemen als "sogar wenn - Sonst nichts - Eigenschaft"
    • Weck, G., Horster, P. eds., VIS 93, DuD Fachbeiträge 16, Vieweg, Wiesbaden
    • Biskup, J., Sicherheit von IT-Systemen als "sogar wenn - sonst nichts - Eigenschaft". In: Weck, G., Horster, P. (eds.), Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS 93, DuD Fachbeiträge 16, Vieweg, Wiesbaden, 1993, pp. 239-254.
    • (1993) Proc. GI-Fachtagung Verläßliche Informationssysteme , pp. 239-254
    • Biskup, J.1
  • 64
    • 0028585034 scopus 로고
    • Reflections on security of database and datatransfer systems in health care
    • Brunnstein, K., Raubold, E. eds., Elsevier Science North Holland, Amsterdam etc.
    • Biskup, J., Bleumer, G., Reflections on security of database and datatransfer systems in health care. In: Brunnstein, K., Raubold, E. (eds.), Proc. 13th World Computer Congress 94, Volume 2, Elsevier Science (North Holland), Amsterdam etc., 1994, pp. 549-556.
    • (1994) Proc. 13th World Computer Congress 94 , vol.2 , pp. 549-556
    • Biskup, J.1    Bleumer, G.2
  • 65
    • 0005060120 scopus 로고    scopus 로고
    • Technical enforcement of informational assurances
    • Jajodia, S. ed., Kluwer, Boston etc.
    • Biskup, J., Technical enforcement of informational assurances. In: Jajodia, S. (ed.), Database Security XXII: Status and Prospects, Kluwer, Boston etc., 1999, pp. 17-40.
    • (1999) Database Security XXII: Status and Prospects , pp. 17-40
    • Biskup, J.1
  • 66
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • Biskup, J., For unknown secrecies refusal is better than lying, Data & Knowledge Engineering 33(2000), pp. 1-23.
    • (2000) Data & Knowledge Engineering , vol.33 , pp. 1-23
    • Biskup, J.1
  • 67
    • 84944184545 scopus 로고    scopus 로고
    • Transaction-based pseudonyms in audit data for privacy respecting intrusion detection
    • RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc.
    • Biskup, J., Flegel, U., Transaction-based pseudonyms in audit data for privacy respecting intrusion detection. In: Proc. 3rd International Symposium on Recent Advances in Intrusion Detection, RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc., 2000, pp. 28-48.
    • (2000) Proc. 3rd International Symposium on Recent Advances in Intrusion Detection , pp. 28-48
    • Biskup, J.1    Flegel, U.2
  • 68
    • 84862620665 scopus 로고    scopus 로고
    • On pseudonymization of audit data for intrusion detection
    • PET 2000, Lecture Notes in Computer Science 2009, Springer, Berlin etc.
    • Biskup, J., Flegel, U., On pseudonymization of audit data for intrusion detection. In: Proc. 1st International Symposium on Privacy Enhancing Technologies, PET 2000, Lecture Notes in Computer Science 2009, Springer, Berlin etc., 2000, pp. 161-180.
    • (2000) Proc. 1st International Symposium on Privacy Enhancing Technologies , pp. 161-180
    • Biskup, J.1    Flegel, U.2
  • 69
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup, J., Bonatti, P. A., Lying versus refusal for known potential secrets, Data & Knowledge Engineering 38(2001), pp. 199-222.
    • (2001) Data & Knowledge Engineering , vol.38 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 72
    • 84904350804 scopus 로고    scopus 로고
    • A hybrid PKI model: Application to secure mediation
    • Gudes, E., Shenoi, S. eds., Kluwer, Boston etc.
    • Biskup, J., Karabulut, Y., A hybrid PKI model: Application to secure mediation. In: Gudes, E., Shenoi, S. (eds.), Research Directions in Data and Applications Security, Kluwer, Boston etc., 2003, pp. 271-282.
    • (2003) Research Directions in Data and Applications Security , pp. 271-282
    • Biskup, J.1    Karabulut, Y.2
  • 73
    • 84882741913 scopus 로고    scopus 로고
    • Mediating between strangers: A trust management based approach
    • Gaithersburg, MD, USA, April
    • Biskup, J., Karabulut, Y., Mediating between strangers: A trust management based approach. In: Proc. 2nd Annual PKI Research Workshop, Gaithersburg, MD, USA, April 2003, pp. 80-95.
    • (2003) Proc. 2nd Annual PKI Research Workshop , pp. 80-95
    • Biskup, J.1    Karabulut, Y.2
  • 74
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Biskup, J., Bonatti, P. A., Controlled query evaluation for known policies by combining lying and refusal, Annals of Mathematics and Artificial Intelligence 40(2004), pp. 37-62.
    • (2004) Annals of Mathematics and Artificial Intelligence , vol.40 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 75
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P. A., Controlled query evaluation for enforcing confidentiality in complete information systems, International Journal of Information Security 3(1) (2004), pp. 14-27.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 76
    • 4143055831 scopus 로고    scopus 로고
    • Towards a credential-based implementation of compound access control policies
    • SACMAT 04, Yorktown Heights
    • Biskup, J., Wortmann, S., Towards a credential-based implementation of compound access control policies. In: Proc. 9th ACM Symposium on Access Control Models and Technologies, SACMAT 04, Yorktown Heights, 2004, pp. 31-40.
    • (2004) Proc. 9th ACM Symposium on Access Control Models and Technologies , pp. 31-40
    • Biskup, J.1    Wortmann, S.2
  • 77
    • 74549139700 scopus 로고    scopus 로고
    • Optimistic anonymous participation in inter-organizational workflow instances
    • ICISS 2006, Lecture Notes in Computer Science 4332, Springer, Berlin etc.
    • Biskup, J., Parthe, J., Optimistic anonymous participation in inter-organizational workflow instances. In: Proc. 2nd International Conference on Information Systems Security, ICISS 2006, Lecture Notes in Computer Science 4332, Springer, Berlin etc., 2006, pp. 86-100.
    • (2006) Proc. 2nd International Conference on Information Systems Security , pp. 86-100
    • Biskup, J.1    Parthe, J.2
  • 78
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Biskup, J., Bonatti, P. A., Controlled query evaluation with open queries for a decidable relational submodel, Annals of Mathematics and Artificial Intelligence 50(2007), pp. 39-77.
    • (2007) Annals of Mathematics and Artificial Intelligence , vol.50 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 79
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • Biskup, J., Embley, D. W., Lochner, J.-H., Reducing inference control to access control for normalized database schemas, Information Processing Letters 106(2008), pp. 8-12.
    • (2008) Information Processing Letters , vol.106 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 80
    • 38149019240 scopus 로고    scopus 로고
    • Enforcing confidentiality in relational databases by reducing inference control to access control
    • ISC 07, Lecture Notes in Computer Science 4779, Springer, Berlin etc.
    • Biskup, J., Lochner, J.-H., Enforcing confidentiality in relational databases by reducing inference control to access control. In: Information Security Conference, ISC 07, Lecture Notes in Computer Science 4779, Springer, Berlin etc., 2007, pp. 407-422.
    • (2007) Information Security Conference , pp. 407-422
    • Biskup, J.1    Lochner, J.-H.2
  • 82
    • 48249156214 scopus 로고    scopus 로고
    • Preprocessing for controlled query evaluation with availability policy
    • Biskup, J., Wiese, L., Preprocessing for controlled query evaluation with availability policy, Journal of Computer Security 16(4) (2008), pp. 477-494.
    • (2008) Journal of Computer Security , vol.16 , Issue.4 , pp. 477-494
    • Biskup, J.1    Wiese, L.2
  • 90
    • 20544431698 scopus 로고
    • Coin flipping by telephone
    • University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04
    • Blum, M., Coin flipping by telephone. In: Proc. Crypto 81, University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, 1982, pp. 11-15.
    • (1982) Proc. Crypto 81 , pp. 11-15
    • Blum, M.1
  • 91
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • Blum, M., Micali, S., How to generate cryptographically strong sequences of pseudorandom bits, SIAM Journal on Computing 13(1984), pp. 850-864.
    • (1984) SIAM Journal on Computing , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 95
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • Bonatti, P. A., Samarati, P., A uniform framework for regulating service access and information release on the web, Journal of Computer Security 10(3) (2002), pp. 241-272.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.A.1    Samarati, P.2
  • 100
    • 84867248592 scopus 로고
    • Untraceable off-line cash in wallets with observers (extended abstract)
    • Lecture Notes in Computer Science 773, Springer, Berlin etc.
    • Brands, S. A., Untraceable off-line cash in wallets with observers (extended abstract). In: Proc. Crypto 93, Lecture Notes in Computer Science 773, Springer, Berlin etc., 1994, pp. 302-318.
    • (1994) Proc. Crypto 93 , pp. 302-318
    • Brands, S.A.1
  • 104
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • Brickell, E., Davenport, D., On the classification of ideal secret sharing schemes, Journal of Cryptology 4(1991), pp. 123-134.
    • (1991) Journal of Cryptology , vol.4 , pp. 123-134
    • Brickell, E.1    Davenport, D.2
  • 110
    • 84891384628 scopus 로고
    • Bundesverfassungsgericht, Bundesanzeiger 35, 241a, see
    • Bundesverfassungsgericht, Urteil vom 15. Dezember 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a, 1983 (see http://www.datenschutz-berlin. de/sonstige/volksz.html).
    • (1983) Urteil Vom 15. Dezember 1983 zum Volkszählungsgesetz 1983
  • 112
  • 114
    • 35048847167 scopus 로고    scopus 로고
    • Better privacy for trusted computing platforms
    • ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc.
    • Camenisch, J., Better privacy for trusted computing platforms. In: Proc. 9th European Symposium on Research in Computer Security, ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc., 2004, pp. 73-88.
    • (2004) Proc. 9th European Symposium on Research in Computer Security , pp. 73-88
    • Camenisch, J.1
  • 115
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • Canetti, R., Security and composition of multiparty cryptographic protocols, Journal of Cryptology 13(2000), pp. 143-202.
    • (2000) Journal of Cryptology , vol.13 , pp. 143-202
    • Canetti, R.1
  • 116
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • FOCS
    • Canetti, R., Universally composable security: A new paradigm for cryptographic protocols. In: 42nd IEEE Symposium on Foundations of Computer Science, FOCS 2001, pp. 136-145.
    • (2001) 42nd IEEE Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 117
    • 38049064364 scopus 로고    scopus 로고
    • Universally composable security with global setup
    • TCC 2007, Lecture Notes in Computer Science 4392, Springer, Berlin etc.
    • Canetti, R., Dodis, Y., Pass, R., Walfish, S., Universally composable security with global setup. In: 4th Theory of Cryptography Conference, TCC 2007, Lecture Notes in Computer Science 4392, Springer, Berlin etc., 2007, pp. 61-85.
    • (2007) 4th Theory of Cryptography Conference , pp. 61-85
    • Canetti, R.1    Dodis, Y.2    Pass, R.3    Walfish, S.4
  • 120
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum, New York
    • Chaum, D., Blind signatures for untraceable payments. In: Proc. Crypto 82, Plenum, New York, 1983, pp. 199-203.
    • (1983) Proc. Crypto 82 , pp. 199-203
    • Chaum, D.1
  • 122
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return adresses, and digital pseudonyms
    • Chaum, D., Untraceable electronic mail, return adresses, and digital pseudonyms, Communications of the ACM 24(2) (1981), pp. 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 123
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • Chaum, D., Security without identification: Transaction systems to make Big Brother obsolete, Communications of the ACM 28(10) (1985), pp. 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 124
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D., The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology 1(1) (1988), pp. 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 125
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Lecture Notes in Computer Science 435, Springer, Berlin etc.
    • Chaum, D., van Antwerpen, H., Undeniable signatures. In: Proc. Crypto 89, Lecture Notes in Computer Science 435, Springer, Berlin etc., 1990, pp. 212-216.
    • (1990) Proc. Crypto 89 , pp. 212-216
    • Chaum, D.1    Van Antwerpen, H.2
  • 126
    • 85043778396 scopus 로고
    • Zero-knowledge undeniable signatures
    • Lecture Notes in Computer Science 473, Springer, Berlin etc.
    • Chaum, D., Zero-knowledge undeniable signatures. In: Proc. Eurocrypt 90, Lecture Notes in Computer Science 473, Springer, Berlin etc., 1991, pp. 458-464.
    • (1991) Proc. Eurocrypt 90 , pp. 458-464
    • Chaum, D.1
  • 127
    • 84947955350 scopus 로고
    • Cryptographically strong undeniable signatures unconditionally secure for the signer
    • Lecture Notes in Computer Science 576, Springer, Berlin etc.
    • Chaum, D., van Heijst, E., Pfitzmann. B., Cryptographically strong undeniable signatures unconditionally secure for the signer. In: Proc. Crypto 91, Lecture Notes in Computer Science 576, Springer, Berlin etc., 1992, pp. 470-484.
    • (1992) Proc. Crypto 91 , pp. 470-484
    • Chaum, D.1    Van Heijst, E.2    Pfitzmann, B.3
  • 128
    • 85024290278 scopus 로고
    • Group signatures
    • Lecture Notes in Computer Science 547, Springer, Berlin etc.
    • Chaum, D., van Heijst, E., Group signatures. In: Proc. Eurocrypt 91, Lecture Notes in Computer Science 547, Springer, Berlin etc., 1991, pp. 257-265.
    • (1991) Proc. Eurocrypt 91 , pp. 257-265
    • Chaum, D.1    Van Heijst, E.2
  • 129
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Lecture Notes in Computer Science 740, Springer, Berlin etc.
    • Chaum, D., Pedersen, T. P., Wallet databases with observers. In: Proc. Crypto 92, Lecture Notes in Computer Science 740, Springer, Berlin etc., 1993, pp. 89-105.
    • (1993) Proc. Crypto 92 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 130
    • 84948980067 scopus 로고
    • New group signature schemes
    • Lecture Notes in Computer Science 950, Springer, Berlin etc.
    • Chen, L., Pedersen, T. P., New group signature schemes. In: Proc. Eurocrypt 94, Lecture Notes in Computer Science 950, Springer, Berlin etc., 1995, pp. 171-181.
    • (1995) Proc. Eurocrypt 94 , pp. 171-181
    • Chen, L.1    Pedersen, T.P.2
  • 132
    • 0017943805 scopus 로고
    • Security in statistical databases for queries with small counts
    • Chin, F. Y., Security in statistical databases for queries with small counts, ACM Transactions on Database Systems 3(1) (1978), pp. 92-104.
    • (1978) ACM Transactions on Database Systems , vol.3 , Issue.1 , pp. 92-104
    • Chin, F.Y.1
  • 133
  • 135
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland
    • Clark, D. D., Wilson, D. R., A comparison of commercial and military computer security policies. In: Proc. IEEE Symposium on Security and Privacy, 1987, Oakland, pp. 184-194.
    • (1987) Proc. IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 137
    • 0014797273 scopus 로고
    • A relational model of data for large shared data banks
    • Codd, E. F., A relational model of data for large shared data banks, Communications of the ACM 13(1970), pp. 377-387.
    • (1970) Communications of the ACM , vol.13 , pp. 377-387
    • Codd, E.F.1
  • 138
    • 8344220516 scopus 로고    scopus 로고
    • Towards web service access control
    • Coetzee, M., Eloff, J. H. P., Towards web service access control, Computers & Security 23(7) (2004), 559-570.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 559-570
    • Coetzee, M.1    Eloff, J.H.P.2
  • 141
    • 0003765587 scopus 로고    scopus 로고
    • Common Criteria Editorial Board, Version 1.0, Jan. 1996; Version 2, May, see
    • Common Criteria Editorial Board, Common Criteria for Information Technology Security Evaluation, Version 1.0, Jan. 1996; Version 2, May 1998 (see http://csrc.nist.gov/cc).
    • (1998) Common Criteria for Information Technology Security Evaluation
  • 142
    • 0028428941 scopus 로고
    • The Data Encryption Standard (DES) and its strength against attacks
    • Coppersmith, D., The Data Encryption Standard (DES) and its strength against attacks, IBM Journal of Research and Development 38(3) (1994), pp. 243-250.
    • (1994) IBM Journal of Research and Development , vol.38 , Issue.3 , pp. 243-250
    • Coppersmith, D.1
  • 144
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Lecture Notes in Computer Science 839, Springer, Berlin etc.
    • Cramer, R., Damgard, I., Schoenmakers, B., Proofs of partial knowledge and simplified design of witness hiding protocols. In: Proc. Crypto 94, Lecture Notes in Computer Science 839, Springer, Berlin etc., 1994, pp. 174-187.
    • (1994) Proc. Crypto 94 , pp. 174-187
    • Cramer, R.1    Damgard, I.2    Schoenmakers, B.3
  • 145
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • Lecture Notes in Computer Science 2045, Springer, Berlin etc.
    • Cramer, R., Damgard, I., Nielsen, J. B., Multiparty computation from threshold homomorphic encryption. In: Proc. Eurocrypt 01, Lecture Notes in Computer Science 2045, Springer, Berlin etc., 2001, pp. 280-300.
    • (2001) Proc. Eurocrypt 01 , pp. 280-300
    • Cramer, R.1    Damgard, I.2    Nielsen, J.B.3
  • 147
    • 0033100756 scopus 로고    scopus 로고
    • Logical foundation of multilevel databases
    • Cuppens, F., Gabillon, A., Logical foundation of multilevel databases, Data & Knowledge Engineering 29(1999), pp. 259-291.
    • (1999) Data & Knowledge Engineering , vol.29 , pp. 259-291
    • Cuppens, F.1    Gabillon, A.2
  • 149
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Lecture Notes in Computer Science 435, Springer, Berlin etc.
    • Damgard, I., A design principle for hash functions. In: Proc. Crypto 89, Lecture Notes in Computer Science 435, Springer, Berlin etc., 1990, pp. 416-227.
    • (1990) Proc. Crypto 89 , pp. 416-227
    • Damgard, I.1
  • 150
    • 33745545274 scopus 로고    scopus 로고
    • On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    • Damgard, I., Pedersen, T. P., Pfitzmann, B., On the existence of statistically hiding bit commitment schemes and fail-stop signatures, Journal of Cryptology 10(3) (1997), pp. 163-194.
    • (1997) Journal of Cryptology , vol.10 , Issue.3 , pp. 163-194
    • Damgard, I.1    Pedersen, T.P.2    Pfitzmann, B.3
  • 151
    • 35248844164 scopus 로고    scopus 로고
    • Universally composable efficient multiparty computation from threshold homomorphic encryption
    • Damgard, I., Nielsen, J. B., Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Proc. Crypto 03, pp. 247-264.
    • Proc. Crypto 03 , pp. 247-264
    • Damgard, I.1    Nielsen, J.B.2
  • 157
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonony of intrusion-detection systems
    • Debar, H., Dacier, M., Wespi, A., Towards a taxonony of intrusion-detection systems, Computer Networks 31(1999), pp. 805-822.
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 160
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D. E., A lattice model of secure information flow, Communications of the ACM 19(5) (1976), pp. 236-243.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 161
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning, D. E., Denning, P. J., Certification of programs for secure information flow, Communications of the ACM 20(7) (1977), pp. 504-513.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 164
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • Denning, D. E., Schlörer, J., Inference controls for statistical databases, IEEE Computer 16(7) (1983), pp. 69-82.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 170
    • 84891457670 scopus 로고    scopus 로고
    • The concept of secure information processing systems and their basic functions
    • Espoo Helsinki, Finland
    • Dierstein, R., The concept of secure information processing systems and their basic functions. In: Proc. IFIP/SEC 90, Espoo (Helsinki), Finland.
    • Proc. IFIP/SEC 90
    • Dierstein, R.1
  • 173
    • 0005268716 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Dobbertin, H., Cryptanalysis of MD4, Journal of Cryptology 11(1998), pp. 253-271.
    • (1998) Journal of Cryptology , vol.11 , pp. 253-271
    • Dobbertin, H.1
  • 176
    • 84949438251 scopus 로고    scopus 로고
    • Advances in inference control in statistical databases: An overview
    • Lecture Notes in Computer Science 2316, Springer, Berlin etc.
    • Domingo-Ferrer, J., Advances in inference control in statistical databases: An overview. In: Proc. Inference Control in Statistical Databases, Lecture Notes in Computer Science 2316, Springer, Berlin etc., 2002, pp. 1-7.
    • (2002) Proc. Inference Control in Statistical Databases , pp. 1-7
    • Domingo-Ferrer, J.1
  • 177
    • 0242496951 scopus 로고    scopus 로고
    • Secure multiparty computation problems and their applications: A review and open problems
    • ACM
    • Du, W., Atallah, M. J., Secure multiparty computation problems and their applications: A review and open problems. In: Proc. New Security Paradigms Workshop 2001, ACM, 2001, pp. 13-22.
    • (2001) Proc. New Security Paradigms Workshop 2001 , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 181
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for statebased intrusion detection
    • Eckmann, S. T., Vigna, G.., Kemmerer, R. A., STATL: An attack language for statebased intrusion detection, Journal of Computer Security 10 (1-2) (2002), pp. 71-104.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 183
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Transactions on Information Theory 31(1985), pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 186
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • Ellison, C. M., Schneier, B., Ten risks of PKI: What you're not being told about public key infrastructure, Journal of Computer Security 16(1) (2000), pp. 1-7.
    • (2000) Journal of Computer Security , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.M.1    Schneier, B.2
  • 190
    • 33750477656 scopus 로고    scopus 로고
    • A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
    • Escobar, S., Meadows, M., Meseguer, J., A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties, Theoretical Computer Science 367 (1-2) (2006), pp. 162-202.
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 162-202
    • Escobar, S.1    Meadows, M.2    Meseguer, J.3
  • 195
    • 33845223165 scopus 로고
    • Protocol for signing contracts
    • University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04
    • Even, S., Protocol for signing contracts. In: Proc. Crypto 81, University of California Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, 1982, pp. 148-153.
    • (1982) Proc. Crypto 81 , pp. 148-153
    • Even, S.1
  • 196
    • 0016081585 scopus 로고
    • Capability-based addressing
    • Fabry, R. S., Capability-based addressing, Communications of the ACM 17(7) (1974), pp. 403-412.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 403-412
    • Fabry, R.S.1
  • 197
  • 201
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • Feistel, H., Cryptography and computer privacy, Scientific American 228(5) (1973), pp. 15-23.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 203
    • 84959022836 scopus 로고
    • Extensions of single-term coins
    • Lecture Notes in Computer Science 773, Springer, Berlin etc.
    • Ferguson, N., Extensions of single-term coins. In: Proc. Crypto 93, Lecture Notes in Computer Science 773, Springer, Berlin etc., 1994, pp. 292-301.
    • (1994) Proc. Crypto 93 , pp. 292-301
    • Ferguson, N.1
  • 206
    • 0015641828 scopus 로고
    • On the advantages of tagged architecture
    • Feustel, E. A., On the advantages of tagged architecture, IEEE Transactions on Computers C-22 (7) (1973), pp. 644-656.
    • (1973) IEEE Transactions on Computers , vol.C-22 , Issue.7 , pp. 644-656
    • Feustel, E.A.1
  • 207
    • 84891452137 scopus 로고
    • Informationelle Garantien für das Zeitalter der Informationstechnik
    • Tinnefeld, M.-T., Philipps, L., Weis, K. eds., Oldenbourg, Munich/Vienna
    • Fiedler, H., Informationelle Garantien für das Zeitalter der Informationstechnik. In: Tinnefeld, M.-T., Philipps, L., Weis, K. (eds.), Institutionen und der Einzelne im Zeitalter der Informationstechnik, Oldenbourg, Munich/Vienna, 1994, pp. 147-158.
    • (1994) Institutionen und der Einzelne im Zeitalter der Informationstechnik , pp. 147-158
    • Fiedler, H.1
  • 208
    • 84944030615 scopus 로고    scopus 로고
    • Pseudonymizing UNIX log files
    • InfraSec 2002, Lecture Notes in Computer Science 2437, Springer, Berlin etc.
    • Flegel, U., Pseudonymizing UNIX log files. In: Proc. Infrastructure Security Conference, InfraSec 2002, Lecture Notes in Computer Science 2437, Springer, Berlin etc., 2002, pp. 162-179.
    • (2002) Proc. Infrastructure Security Conference , pp. 162-179
    • Flegel, U.1
  • 209
    • 33746646762 scopus 로고    scopus 로고
    • Requirements of information reductions for cooperating intrusion detection agents
    • ETRIX 2006, Lecture Notes in Computer Science 3995, Springer, Berlin etc.
    • Flegel, U., Biskup, J., Requirements of information reductions for cooperating intrusion detection agents. In: Proc. International Conference on Emerging Trends in Information and Communication Security, ETRIX 2006, Lecture Notes in Computer Science 3995, Springer, Berlin etc., 2006, pp. 466-480.
    • (2006) Proc. International Conference on Emerging Trends in Information and Communication Security , pp. 466-480
    • Flegel, U.1    Biskup, J.2
  • 211
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • Focardi, R., Gorrieri, R., A classification of security properties for process algebras, Journal of Computer Security 3(1) (1995), pp. 5-33.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 212
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Focardi, R., Gorrieri, R., eds., Lecture Notes in Computer Science 2171, Springer, Berlin etc.
    • Focardi, R., Gorrieri, R., Classification of security properties (Part I: information flow). In: Focardi, R., Gorrieri, R., (eds.), Foundations of Security Analysis and Design, Lecture Notes in Computer Science 2171, Springer, Berlin etc., 2001, pp. 331-396.
    • (2001) Foundations of Security Analysis and Design , pp. 331-396
    • Focardi, R.1    Gorrieri, R.2
  • 213
    • 0023241098 scopus 로고
    • A universal theory of information flow
    • Oakland
    • Foley, S. N., A universal theory of information flow. In: IEEE Sympsoum on Security and Privacy, Oakland, 1987, pp. 116-122.
    • (1987) IEEE Sympsoum on Security and Privacy , pp. 116-122
    • Foley, S.N.1
  • 223
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • Goldreich, O., Micali, S., Wigderson, A., Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM 38(3) (1991), pp. 691-729.
    • (1991) Journal of the ACM , vol.38 , Issue.3 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 225
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • Goldreich, O., Oren, Y., Definitions and properties of zero-knowledge proof systems, Journal of Cryptography 7(1) (1994), pp. 1-32.
    • (1994) Journal of Cryptography , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 227
    • 0141610193 scopus 로고    scopus 로고
    • Cryptography and cryptographic protocols
    • Goldreich, O., Cryptography and cryptographic protocols, Distributed Computing 16(2003), pp. 177-199.
    • (2003) Distributed Computing , vol.16 , pp. 177-199
    • Goldreich, O.1
  • 232
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S. Rivest, R. L., A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal on Computing 17(2) (1988), pp. 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 233
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S. Rackoff, C., The knowledge complexity of interactive proof systems, SIAM Journal on Computing 18(1) (1989), pp. 186-207.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-207
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 234
    • 0004256091 scopus 로고    scopus 로고
    • 1st edition, Wiley, Chichester, 1999; 2nd edition
    • Gollmann, D., Computer Security, 1st edition, Wiley, Chichester, 1999; 2nd edition, 2006.
    • (2006) Computer Security
    • Gollmann, D.1
  • 236
    • 33749417211 scopus 로고    scopus 로고
    • Chapter 4 of JDK 1.4.2
    • Gong, L., Java2 platform security architecture, Chapter 4 of JDK 1.4.2, http://java.sun. com/j2se/1.4.2/docs/guide/security/spec/security-spec. doc4.html, 1997-2002.
    • (1997) Java2 Platform Security Architecture
    • Gong, L.1
  • 239
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow properties
    • Oakland
    • Gray, J. W., III, Toward a mathematical foundation for information flow properties. In: Proc. IEEE Symposium on Security and Privacy, Oakland, 1991, pp. 21-34.
    • (1991) Proc. IEEE Symposium on Security and Privacy , pp. 21-34
    • Gray III, J.W.1
  • 241
    • 84976657250 scopus 로고
    • An authorization mechanism for relational database systems
    • Griffiths, P. P., Wade, B. W., An authorization mechanism for relational database systems, ACM Transactions on Database Systems 1(3) (1976), pp. 242-255.
    • (1976) ACM Transactions on Database Systems , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 243
    • 84891431186 scopus 로고    scopus 로고
    • Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme
    • VIS 91, Informatik-Fachberichte 271, Springer, Berlin etc.
    • Groß, M., Vertrauenswürdiges Booten als Grundlage authentischer Basissysteme. In: Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS 91, Informatik-Fachberichte 271, Springer, Berlin etc., pp. 190-207.
    • Proc. GI-Fachtagung Verläßliche Informationssysteme , pp. 190-207
    • Groß, M.1
  • 244
  • 245
    • 0037519332 scopus 로고    scopus 로고
    • Practical and provably-secure commitment schemes from collision-free hashing
    • Springer, Berlin etc.
    • Halevi, S., Micali, S., Practical and provably-secure commitment schemes from collision-free hashing. In: Proc. Crypto 96, Lecture Notes in Computer Science 1109, Springer, Berlin etc., 1996, pp. 201-215.
    • (1996) Proc. Crypto 96, Lecture Notes in Computer Science 1109 , pp. 201-215
    • Halevi, S.1    Micali, S.2
  • 251
    • 0009442659 scopus 로고
    • Monotonic protection systems
    • DeMillo, R. A., et al. eds., Academic Press, New York
    • Harrison, M. A., Ruzzo, W. L., Monotonic protection systems. In: DeMillo, R. A., et al. (eds.), Foundations of Secure Computation, Academic Press, New York, 1978, pp. 337-365.
    • (1978) Foundations of Secure Computation , pp. 337-365
    • Harrison, M.A.1    Ruzzo, W.L.2
  • 259
    • 85159659045 scopus 로고    scopus 로고
    • A formal semantics for SPKI
    • ESORICS 2000, Lecture Notes in Computer Science 1895, Springer, Berlin etc.
    • Howell, J., Kotz, D., A formal semantics for SPKI. In: Proc. 6th European Symposium on Research in Computer Security, ESORICS 2000, Lecture Notes in Computer Science 1895, Springer, Berlin etc., 2004, pp. 140-158.
    • (2004) Proc. 6th European Symposium on Research in Computer Security , pp. 140-158
    • Howell, J.1    Kotz, D.2
  • 261
    • 0033293621 scopus 로고    scopus 로고
    • A large scale distributed intrusion detection framework based on attack strategy analysis
    • Huang, M.-Y., Jasper, R. J., Wicks, T. M., A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks 31 (23-24) (1999), pp. 2465-2475.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2465-2475
    • Huang, M.-Y.1    Jasper, R.J.2    Wicks, T.M.3
  • 262
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes, D., Shmatikov, V., Information hiding, anonymity and privacy: A modular approach, Journal of Computer Security 12(2004), pp. 3-36.
    • (2004) Journal of Computer Security , vol.12 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 263
    • 0037244227 scopus 로고    scopus 로고
    • A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment
    • Iheagwara, C., Blyth, A., Singhal, M., A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment, Journal of Computer Security 11(2003), pp. 1-33.
    • (2003) Journal of Computer Security , vol.11 , pp. 1-33
    • Iheagwara, C.1    Blyth, A.2    Singhal, M.3
  • 264
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for Unix
    • Ilgun, K., USTAT: a real-time intrusion detection system for Unix. In: Proc. IEEE Symposium on Security and Privacy, 1993, pp. 16-29.
    • (1993) Proc. IEEE Symposium on Security and Privacy , pp. 16-29
    • Ilgun, K.1
  • 265
  • 266
    • 0004228472 scopus 로고    scopus 로고
    • ISHTAR Consortium, Studies in Health Technology and Informatics 66, IOS Press, Amsterdam etc.
    • ISHTAR Consortium, Implementing Secure Healthcare Telematics Applications in Europe, Studies in Health Technology and Informatics 66, IOS Press, Amsterdam etc., 2001.
    • (2001) Implementing Secure Healthcare Telematics Applications in Europe
  • 267
    • 84891423099 scopus 로고    scopus 로고
    • ISO International Organization for Standardization, IEC International Electrotechnical Commission: Joint Technical Committee ISO/IEC JTC 1 on Information Technology, ISO/IEC FCD 9075
    • ISO (International Organization for Standardization), IEC (International Electrotechnical Commission): Joint Technical Committee ISO/IEC JTC 1 on Information Technology, Database Language SQL (final committee draft for 4th edition), ISO/IEC FCD 9075, 1997.
    • (1997) Database Language SQL (final Committee Draft for 4th edition)
  • 270
    • 0027289776 scopus 로고
    • Multiple assignment schemes for secret sharing
    • Ito, M., Saito, A., Nishizeki, T., Multiple assignment schemes for secret sharing, Journal of Cryptology 6(1993), pp. 15-20.
    • (1993) Journal of Cryptology , vol.6 , pp. 15-20
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 282
    • 0017268870 scopus 로고
    • A language extension for controlling access to shared data
    • Jones, A. K., Liskov, B. H., A language extension for controlling access to shared data, IEEE Transactions on Software Engineering 2(4) (1976), pp. 227-285.
    • (1976) IEEE Transactions on Software Engineering , vol.2 , Issue.4 , pp. 227-285
    • Jones, A.K.1    Liskov, B.H.2
  • 283
    • 0017971337 scopus 로고
    • A language extension for expressing constraints on data access
    • Jones, A. K., Liskov, B. H., A language extension for expressing constraints on data access, Communications of the ACM 21(5) (1978), pp. 358-367.
    • (1978) Communications of the ACM , vol.21 , Issue.5 , pp. 358-367
    • Jones, A.K.1    Liskov, B.H.2
  • 285
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Josang, A., Ismail, R., Boyd, C., A survey of trust and reputation systems for online service provision, Decision Support Systems 43(2) (2007), pp. 618-644.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 287
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support rot cause analysis
    • Julisch, K., Clustering intrusion detection alarms to support rot cause analysis, ACM Transactions on Information and System Security 6(4) (2003), pp. 443-471.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 288
    • 84948969398 scopus 로고    scopus 로고
    • Thirty years later: Lessons from the Multics security evaluation
    • ACSAC 02, IEEE
    • Karger, P. A., Schell, R. R., Thirty years later: Lessons from the Multics security evaluation. In: Proc. 18th Annual Security Applications Conference, ACSAC 02, IEEE, 2002, pp. 119-126.
    • (2002) Proc. 18th Annual Security Applications Conference , pp. 119-126
    • Karger, P.A.1    Schell, R.R.2
  • 292
    • 1642309744 scopus 로고    scopus 로고
    • Dynamic access control through Petri net workflows
    • ACSAC 00, New Orleans, Dec
    • Knorr, K., Dynamic access control through Petri net workflows. In: Proc. 16th Annual Computer Security Applications Conference, ACSAC 00, New Orleans, Dec. 2000, pp. 159-167.
    • (2000) Proc. 16th Annual Computer Security Applications Conference , pp. 159-167
    • Knorr, K.1
  • 295
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N., Elliptic curve cryptosystems, Mathematics of Computation 48(1987), pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 296
    • 84957011508 scopus 로고    scopus 로고
    • Decidability of safety in graph-based models for access control
    • ESORICS 2002, Oct. 2002, Lecture Notes in Computer Science 2502, Springer, Berlin etc.
    • Koch, M., Mancini, L. V., Parisi-Presicce, F., Decidability of safety in graph-based models for access control. In: Proc. 7th European Symposium on Research in Computer Security, ESORICS 2002, Oct. 2002, Lecture Notes in Computer Science 2502, Springer, Berlin etc., 2002, pp. 229-243.
    • (2002) Proc. 7th European Symposium on Research in Computer Security , pp. 229-243
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3
  • 298
    • 0002548429 scopus 로고
    • The evolution of the Kerberos authentification service
    • Brazier, F., Johansen, D. eds., IEEE Computer Society Press
    • Kohl, J. T., Neuman, B. C., Ts'o, T. Y., The evolution of the Kerberos authentification service. In: Brazier, F., Johansen, D. (eds.), Distributed Open Systems, IEEE Computer Society Press, 1994, pp. 78-94.
    • (1994) Distributed Open Systems , pp. 78-94
    • Kohl, J.T.1    Neuman, B.C.2    Ts'o, T.Y.3
  • 299
    • 0001902056 scopus 로고
    • Three approaches to the concept of "the amount of information" [in Russian]
    • Kolmogorov, A. N., Three approaches to the concept of "the amount of information" [in Russian], Problems of Information Transmission 1(1965), 3-11.
    • (1965) Problems of Information Transmission , vol.1 , pp. 3-11
    • Kolmogorov, A.N.1
  • 302
    • 33947621658 scopus 로고    scopus 로고
    • Simulation-based security with inexhaustible interactive Turing machines
    • CSFW-2006, IEEE Computer Society Press
    • Küsters, R., Simulation-based security with inexhaustible interactive Turing machines. In: 19th IEEE Computer Security Foundations Workshop, CSFW-2006, IEEE Computer Society Press, 2006, pp. 309-320.
    • (2006) 19th IEEE Computer Security Foundations Workshop , pp. 309-320
    • Küsters, R.1
  • 303
    • 35548966087 scopus 로고    scopus 로고
    • On the automatic analysis of recursive security protocols with XOR
    • STACS 2007, Lecture Notes in Computer Science 4393, Springer, Berlin etc.
    • Küsters, R., Truderung, T., On the automatic analysis of recursive security protocols with XOR. In: 24th Annual Symposium on Theoretical Aspects of Computer Science, STACS 2007, Lecture Notes in Computer Science 4393, Springer, Berlin etc., 2007, pp. 646-657.
    • (2007) 24th Annual Symposium on Theoretical Aspects of Computer Science , pp. 646-657
    • Küsters, R.1    Truderung, T.2
  • 304
    • 0003445736 scopus 로고
    • ETH Series in Information Processing 1, Hartung-Gorre, Konstanz
    • Lai, X., On the Design and Security of Block Ciphers, ETH Series in Information Processing 1, Hartung-Gorre, Konstanz, 1992.
    • (1992) On the Design and Security of Block Ciphers
    • Lai, X.1
  • 305
    • 85011105685 scopus 로고
    • A proposal for a new block encryption standard
    • Lecture Notes in Computer Science 473, Springer, Berlin etc.
    • Lai, X., Massey, J. L., A proposal for a new block encryption standard. In: Proc. Advances in Cryptology, EUROCRYPT 90, Lecture Notes in Computer Science 473, Springer, Berlin etc., 1991, pp. 389-404.
    • (1991) Proc. Advances in Cryptology, EUROCRYPT 90 , pp. 389-404
    • Lai, X.1    Massey, J.L.2
  • 306
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • Lamport, L., Time, clocks, and the ordering of events in a distributed system, Communications of the ACM 21(7) (1978), pp. 558-565.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 307
    • 84976801533 scopus 로고
    • Concurrent reading and writing of clocks
    • Lamport, L., Concurrent reading and writing of clocks, Transactions on Computing Systems 8(4) (1990), pp. 305-310.
    • (1990) Transactions on Computing Systems , vol.8 , Issue.4 , pp. 305-310
    • Lamport, L.1
  • 308
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B., A note on the confinement problem, Communications of the ACM 16(10) (1973), pp. 613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 310
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • Lane, T., Brodley, C. E., Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security 2(3) (1999), pp. 295-331.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 312
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S. L., A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, 3(4) (2000), pp. 227-261.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.L.2
  • 314
    • 0042496106 scopus 로고
    • Randomness and non-determinism
    • Levin, L. A., Randomness and non-determinism, Journal of Symbolic Logic 58(1993), pp. 1102-1103.
    • (1993) Journal of Symbolic Logic , vol.58 , pp. 1102-1103
    • Levin, L.A.1
  • 321
    • 0004127220 scopus 로고    scopus 로고
    • 2nd edition, Cambridge University Press, Cambridge
    • Lidl, R., Niederreiter, H., Finite Fields, 2nd edition, Cambridge University Press, Cambridge, 1997.
    • (1997) Finite Fields
    • Lidl, R.1    Niederreiter, H.2
  • 322
    • 0028755016 scopus 로고
    • On the validity of the Bell-LaPadula model
    • Lindgreen, E. R., Herschberg, I. S., On the validity of the Bell-LaPadula model, Computers & Security 13(1994), pp. 317-333.
    • (1994) Computers & Security , vol.13 , pp. 317-333
    • Lindgreen, E.R.1    Herschberg, I.S.2
  • 323
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
    • Lindquist, U., Porras, P. A., Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In: Proc. IEEE Symposium on Security and Privacy, 1999, pp. 146-161.
    • (1999) Proc. IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindquist, U.1    Porras, P.A.2
  • 324
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • Lipton, R. J., Snyder, L., A linear time algorithm for deciding subject security, Journal of the ACM 24(3) (1977), pp. 455-464.
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 325
    • 26844560119 scopus 로고
    • On classes of protection systems
    • DeMillo, R. A., et al., eds., Academic Press, New York
    • Lipton, R. J., Budd, T. A., On classes of protection systems. In: DeMillo, R. A., et al., (eds.), Foundations of Secure Computation, Academic Press, New York, 1978, pp. 281-298.
    • (1978) Foundations of Secure Computation , pp. 281-298
    • Lipton, R.J.1    Budd, T.A.2
  • 326
    • 0242571490 scopus 로고
    • Role-based security in data base management systems
    • Landwehr, C. E., ed., Elsevier Science North Holland, Amsterdam etc.
    • Lochovsky, F. H., Woo, C. C., Role-based security in data base management systems. In: Landwehr, C. E., (ed.), Database Security: Status and Prospects, Elsevier Science (North Holland), Amsterdam etc., 1988, pp. 173-185.
    • (1988) Database Security: Status and Prospects , pp. 173-185
    • Lochovsky, F.H.1    Woo, C.C.2
  • 327
    • 0020207596 scopus 로고
    • Unidirectional transport of rights and take-grant control
    • Lockmann, A., Minsky, N., Unidirectional transport of rights and take-grant control, IEEE Transactions on Software Engineering SE-8 (6) (1982), pp. 597-604.
    • (1982) IEEE Transactions on Software Engineering , vol.SE-8 , Issue.6 , pp. 597-604
    • Lockmann, A.1    Minsky, N.2
  • 328
    • 0034300797 scopus 로고    scopus 로고
    • Anomaly-based intrusion detection: Privacy concerns and other problems
    • Lundin, E., Jonsson, E., Anomaly-based intrusion detection: Privacy concerns and other problems, Computer Networks 34(4) (2000), pp. 623-640.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 623-640
    • Lundin, E.1    Jonsson, E.2
  • 330
    • 0034836335 scopus 로고    scopus 로고
    • Preserving information flow properties under refinement
    • Oakland
    • Mantel, H., Preserving information flow properties under refinement. In: Proc. IEEE Symposium on Security and Privacy, 2001, Oakland, pp. 78-91.
    • (2001) Proc. IEEE Symposium on Security and Privacy , pp. 78-91
    • Mantel, H.1
  • 334
    • 18344371384 scopus 로고
    • The definition of randomness
    • Martin-Löf, P., The definition of randomness, Information and Control 9(1966), pp. 602-619.
    • (1966) Information and Control , vol.9 , pp. 602-619
    • Martin-Löf, P.1
  • 336
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • ESORICS 96, Lecture Notes in Computer Science 1146, Springer, Berlin etc.
    • Maurer, U., Modelling a public-key infrastructure. In: Proc. 4th European Symposium on Research in Computer Security, ESORICS 96, Lecture Notes in Computer Science 1146, Springer, Berlin etc., 1996, pp. 325-350.
    • (1996) Proc. 4th European Symposium on Research in Computer Security , pp. 325-350
    • Maurer, U.1
  • 337
    • 0023829319 scopus 로고
    • Noninterference and the compositionality of security properties
    • McCullough, D., Noninterference and the compositionality of security properties. In: Proc. IEEE Symposium on Security and Privacy, 1988, pp. 177-186.
    • (1988) Proc. IEEE Symposium on Security and Privacy , pp. 177-186
    • McCullough, D.1
  • 340
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluation as performed by Lincoln Laboratory
    • McHugh, J., Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluation as performed by Lincoln Laboratory, ACM Transactions on Information and System Security 3(4) (2000), pp. 262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 342
    • 0022012611 scopus 로고
    • A comment on the "Basic Security Theorem" of Bell and LaPa-dula
    • McLean, J., A comment on the "Basic Security Theorem" of Bell and LaPa-dula, Information Processing Letters 20(1985), pp. 67-70.
    • (1985) Information Processing Letters , vol.20 , pp. 67-70
    • McLean, J.1
  • 344
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • McLean, J., Proving noninterference and functional correctness using traces, Journal of Computer Security 1(1) (1992), pp. 37-57.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 37-57
    • McLean, J.1
  • 345
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of "possibilistic" security properties
    • McLean, J., A general theory of composition for a class of "possibilistic" security properties, IEEE Transactions on Software Engineering 22(1) (1996), pp. 53-67.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-67
    • McLean, J.1
  • 346
    • 1442335809 scopus 로고    scopus 로고
    • Ordering from Satan's menu: A survey of requirements specification for formal analysis of cryptographic protocols
    • Meadows, C., Ordering from Satan's menu: A survey of requirements specification for formal analysis of cryptographic protocols, Science of Computer Programming 50(2004), pp. 3-22.
    • (2004) Science of Computer Programming , vol.50 , pp. 3-22
    • Meadows, C.1
  • 348
    • 85028772160 scopus 로고
    • On the security of the IDEA block cipher
    • Eurocrypt 93, Lecture Notes in Computer Science 765, Springer, Berlin etc.
    • Meier, W., On the security of the IDEA block cipher. In: Proc. Advances in Cryptology, Eurocrypt 93, Lecture Notes in Computer Science 765, Springer, Berlin etc., 1994, pp. 371-385.
    • (1994) Proc. Advances in Cryptology , pp. 371-385
    • Meier, W.1
  • 350
    • 0025545583 scopus 로고
    • A fast software one-way hash function
    • Merkle, R. C., A fast software one-way hash function, Journal of Cryptology 3(1990), pp. 43-58.
    • (1990) Journal of Cryptology , vol.3 , pp. 43-58
    • Merkle, R.C.1
  • 351
  • 352
    • 0016951438 scopus 로고
    • Security kernel validation in practice
    • Millen, J. K., Security kernel validation in practice, Communications of the ACM 19(5) (1976), pp. 243-250.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 353
    • 0003700417 scopus 로고
    • Section E.2.1: Kerberos authentification and authorization system
    • Technical Report, Cambridge, MA
    • Miller, S. P., Neuman, B. C., Schiller, J. I., Saltzer, J. H., Section E.2.1: Kerberos authentification and authorization system, M. I. T. Project Athena, Technical Report, Cambridge, MA, 1987.
    • (1987) M. I. T. Project Athena
    • Miller, S.P.1    Neuman, B.C.2    Schiller, J.I.3    Saltzer, J.H.4
  • 355
    • 0029326301 scopus 로고
    • Improved algorithms for synchronizing computer network clocks
    • Mills, D., Improved algorithms for synchronizing computer network clocks, IEEE/ACM Transactions on Networks 3(1995), pp. 245-254.
    • (1995) IEEE/ACM Transactions on Networks , vol.3 , pp. 245-254
    • Mills, D.1
  • 356
    • 15944401468 scopus 로고
    • An operation-control scheme for authorization in computer systems
    • Minsky, N., An operation-control scheme for authorization in computer systems, International Journal of Computer and Information Sciences 7(2) (1978), pp. 157-191.
    • (1978) International Journal of Computer and Information Sciences , vol.7 , Issue.2 , pp. 157-191
    • Minsky, N.1
  • 357
    • 0000788149 scopus 로고    scopus 로고
    • Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
    • Minsky, N., Ungureanu, V., Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems, ACM Transactions on Software Engineering and Methodology 9(3) (2000), pp. 273-305.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.3 , pp. 273-305
    • Minsky, N.1    Ungureanu, V.2
  • 361
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • Naor, M., Bit commitment using pseudorandomness, Journal of Cryptology 4(2) (1991), pp. 151-158.
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 362
    • 0141544069 scopus 로고    scopus 로고
    • Zero-knowledge arguments for NP can be based on general assumptions
    • Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M., Zero-knowledge arguments for NP can be based on general assumptions, Journal of Cryptology 11(1998), pp. 87-108.
    • (1998) Journal of Cryptology , vol.11 , pp. 87-108
    • Naor, M.1    Ostrovsky, R.2    Venkatesan, R.3    Yung, M.4
  • 363
    • 51749088711 scopus 로고
    • National Bureau of Standards, NBS FIPS PUB 46
    • National Bureau of Standards, Data Encryption Standard, NBS FIPS PUB 46, 1980.
    • (1980) Data Encryption Standard
  • 364
    • 84891425189 scopus 로고
    • National Bureau of Standards, NBS FIPS PUB 81
    • National Bureau of Standards, DES Modes of Operation, NBS FIPS PUB 81, 1977.
    • (1977) DES Modes of Operation
  • 365
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U. S. Department of Commerce, NIST Federal Information Processing Standards Publication 197
    • National Institute of Standards and Technology, U. S. Department of Commerce, Advanced Encryption Standard, NIST Federal Information Processing Standards Publication 197, 2001.
    • (2001) Advanced Encryption Standard
  • 366
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U. S. Department of Commerce, NIST Federal Information Processing Standards Publication 180-2
    • National Institute of Standards and Technology, U. S. Department of Commerce, Secure Hash Standard, NIST Federal Information Processing Standards Publication 180-2, 2002.
    • (2002) Secure Hash Standard
  • 367
    • 0003508562 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U. S. Department of Commerce, NIST Federal Information Processing Standards Publication 186-2
    • National Institute of Standards and Technology, U. S. Department of Commerce, Digital Signature Standard, NIST Federal Information Processing Standards Publication 186-2, 2000.
    • (2000) Digital Signature Standard
  • 369
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Neuman, B., Ts'o, T., Kerberos: An authentication service for computer networks, IEEE Communications 32(9) (1994), pp. 33-38.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'o, T.2
  • 378
    • 0347229437 scopus 로고    scopus 로고
    • OMG Object Management Group, OMG Document orbos/96-06-20, July
    • OMG (Object Management Group), Common Secure Interoperability, OMG Document orbos/96-06-20, July 1996.
    • (1996) Common Secure Interoperability
  • 379
    • 84891397250 scopus 로고    scopus 로고
    • OMG Object Management Group, OMG Documents 96-08-03 through 96-08-06, July
    • OMG (Object Management Group), CORBA Security, OMG Documents 96-08-03 through 96-08-06, July 1996.
    • (1996) CORBA Security
  • 380
    • 84891408732 scopus 로고    scopus 로고
    • Oracle Corporation, Release 2 9.2, March
    • Oracle Corporation, Oracle 9i - SQL Reference, Release 2 (9.2), March 2002.
    • (2002) Oracle 9i - SQL Reference
  • 382
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborne, S., Sandhu, R., Munawar, Q., Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security 3(2) (2000), pp. 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborne, S.1    Sandhu, R.2    Munawar, Q.3
  • 384
    • 84891463718 scopus 로고    scopus 로고
    • Restating the foundation of information security
    • Singapore
    • Parker, D. B., Restating the foundation of information security. In: Proc. IFIP/SEC 92, Singapore, pp. 159-171.
    • Proc. IFIP/SEC 92 , pp. 159-171
    • Parker, D.B.1
  • 387
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Springer, Berlin etc.
    • Pedersen, T. P., Non-interactive and information-theoretic secure verifiable secret sharing. In: Proc. Crypto 91, Lecture Notes in Computer Science 576, Springer, Berlin etc., 1992, pp. 129-140.
    • (1992) Proc. Crypto 91, Lecture Notes in Computer Science 576 , pp. 129-140
    • Pedersen, T.P.1
  • 390
  • 394
    • 0004198635 scopus 로고    scopus 로고
    • 2nd edition, Prentice-Hall, Englewood Cliffs etc.
    • Pfleeger, C. P., Security in Computing, 2nd edition, Prentice-Hall, Englewood Cliffs etc., 1997.
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 397
    • 0018019384 scopus 로고
    • A model for verification of data security in operating systems
    • Popek, G. J., Farber, D. A., A model for verification of data security in operating systems, Communications of the ACM 21(9) (1978), pp. 737-749.
    • (1978) Communications of the ACM , vol.21 , Issue.9 , pp. 737-749
    • Popek, G.J.1    Farber, D.A.2
  • 402
    • 0025498829 scopus 로고
    • Fault-tolerant clock synchronization in distributed systems
    • Ramanathan, P., Shin, K., Butler, R., Fault-tolerant clock synchronization in distributed systems, IEEE Computer 23(10) (1990), pp. 33-42.
    • (1990) IEEE Computer , vol.23 , Issue.10 , pp. 33-42
    • Ramanathan, P.1    Shin, K.2    Butler, R.3
  • 404
    • 0032307222 scopus 로고    scopus 로고
    • A semantic-based transaction processing model for multilevel transactions
    • Ray, I., Ammann, P., Jajodia, S., A semantic-based transaction processing model for multilevel transactions, Journal of Computer Security 6(1998), pp. 181-217.
    • (1998) Journal of Computer Security , vol.6 , pp. 181-217
    • Ray, I.1    Ammann, P.2    Jajodia, S.3
  • 405
    • 35048832496 scopus 로고    scopus 로고
    • A vector model of trust for developing trustworthy systems
    • ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc.
    • Ray, I., Chakraborty, S., A vector model of trust for developing trustworthy systems. In: Proc. 9th European Symposium on Research in Computer Security, ESORICS 04, Lecture Notes in Computer Science 3193, Springer, Berlin etc., 2004, pp. 260-275.
    • (2004) Proc. 9th European Symposium on Research in Computer Security , pp. 260-275
    • Ray, I.1    Chakraborty, S.2
  • 409
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L. M., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM 21(2) (1978), pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 415
    • 0003502331 scopus 로고
    • Noninterference, transitivity, and channel-control security policies
    • SRI International
    • Rushby, J. Noninterference, transitivity, and channel-control security policies, Technical Report CSL-92-02, SRI International, 1992.
    • (1992) Technical Report CSL-92-02
    • Rushby, J.1
  • 417
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based measurement architecture
    • San Diego, The USENIX Association
    • Sailer, R., Zhang, X., Jaeger, T., van Doorn, L., Design and implementation of a TCG-based measurement architecture. In: Proc. 13th USENIX Security Symposium, San Diego, The USENIX Association, 2004, pp. 223-238.
    • (2004) Proc. 13th USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 420
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in Multics
    • Saltzer, J. H., Protection and the control of information sharing in Multics, Communications of the ACM 17(7) (1974), pp. 388-402.
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 421
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J. H., Schroeder, M. D., The protection of information in computer systems, Proceedings of the IEEE 63(9) (1975), pp. 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 424
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating schemes
    • Sandhu, R. S., The schematic protection model: Its definition and analysis for acyclic attenuating schemes, Journal of the ACM 35(2) (1988), pp. 404-432.
    • (1988) Journal of the ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 425
    • 0024738591 scopus 로고
    • The demand operation in the schematic protection model
    • Sandhu, R. S., The demand operation in the schematic protection model, Information Processing Letters 32(1989), pp. 213-219.
    • (1989) Information Processing Letters , vol.32 , pp. 213-219
    • Sandhu, R.S.1
  • 428
    • 0027699087 scopus 로고
    • Lattice-based access control
    • Sandhu, R. S., Lattice-based access control, IEEE Computer 26(11) (1993), pp. 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 432
    • 0033312487 scopus 로고    scopus 로고
    • Role-based administration of user-role assignment: The URA97 model and its Oracle implementation
    • Sandhu, R. S., Bhamidipati, V., Role-based administration of user-role assignment: The URA97 model and its Oracle implementation, Journal of Computer Security 7(4) (1999), pp. 317-342.
    • (1999) Journal of Computer Security , vol.7 , Issue.4 , pp. 317-342
    • Sandhu, R.S.1    Bhamidipati, V.2
  • 434
  • 435
    • 84891402537 scopus 로고
    • A uniform approach to the definition of randomness
    • Schnorr, C. P., A uniform approach to the definition of randomness, Mathematical System Theory 5(1971), pp. 9-28.
    • (1971) Mathematical System Theory , vol.5 , pp. 9-28
    • Schnorr, C.P.1
  • 437
  • 439
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • Sejong, O., Seog, P., Task-role-based access control model, Information Systems 28(6) (2003), pp. 533-562.
    • (2003) Information Systems , vol.28 , Issue.6 , pp. 533-562
    • Sejong, O.1    Seog, P.2
  • 442
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A., How to share a secret, Communications of the ACM 22(1979), pp. 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 443
    • 84856043672 scopus 로고
    • A mathematical theory of communications
    • 623-656
    • Shannon, C. E., A mathematical theory of communications, Bell System Technical Journal 27(1948), pp. 379-423, 623-656.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 444
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C. E., Communication theory of secrecy systems, Bell System Technical Journal 28(4) (1949), pp. 656-715.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 446
    • 2642573551 scopus 로고    scopus 로고
    • A compositional framework for access control policies enforcement
    • Oct. 30, Washington, DC
    • Siewe, F., Cau, A., Zedan, H., A compositional framework for access control policies enforcement. In: FMSE 03, Oct. 30, Washington, DC, pp. 32-42.
    • FMSE 03 , pp. 32-42
    • Siewe, F.1    Cau, A.2    Zedan, H.3
  • 449
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their applications
    • Simmons, G. J. ed., IEEE Press, New York
    • Simmons, G. J., An introduction to shared secret and/or shared control schemes and their applications. In: Simmons, G. J. (ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE Press, New York, 1992, pp. 441-497.
    • (1992) Contemporary Cryptology: The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 450
  • 452
    • 0019713652 scopus 로고
    • Theft and conspiracy in the take-grant model
    • Snyder, L., Theft and conspiracy in the take-grant model, Journal of Computer and System Sciences 23(3) (1981), pp. 333-347.
    • (1981) Journal of Computer and System Sciences , vol.23 , Issue.3 , pp. 333-347
    • Snyder, L.1
  • 453
    • 0019548112 scopus 로고
    • Formal models of capability-based protection systems
    • Snyder, L., Formal models of capability-based protection systems, IEEE Transactions on Computers C-30 (3) (1981), pp. 172-181.
    • (1981) IEEE Transactions on Computers , vol.C-30 , Issue.3 , pp. 172-181
    • Snyder, L.1
  • 457
    • 0842288709 scopus 로고    scopus 로고
    • The dynamic-typed access matrix model and decidability of the safety problem
    • Soshi, M., Maekawa, M., Okamoto, E., The dynamic-typed access matrix model and decidability of the safety problem, IEICE Transactions on Information and Systems 87-A (1) (2004), pp. 190-203.
    • (2004) IEICE Transactions on Information and Systems , vol.87 A , Issue.1 , pp. 190-203
    • Soshi, M.1    Maekawa, M.2    Okamoto, E.3
  • 461
    • 0003600595 scopus 로고    scopus 로고
    • 5th edition, Prentice-Hall, Upper Saddle River etc.
    • Stallings, W., Operating Systems, 5th edition, Prentice-Hall, Upper Saddle River etc., 2005.
    • (2005) Operating Systems
    • Stallings, W.1
  • 464
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, Texas
    • Steiner, J. G., Neuman, B. C., Schiller, J. I., Kerberos: An authentication service for open network systems. In: Usenix Conference Proceedings, Dallas, Texas, 1988, pp. 191-202.
    • (1988) Usenix Conference Proceedings , pp. 191-202
    • Steiner, J.G.1    Neuman, B.C.2    Schiller, J.I.3
  • 465
    • 0023828936 scopus 로고
    • Some constructions and bounds of authentication codes
    • Stinson, D. R., Some constructions and bounds of authentication codes, Journal of Cryptology 1(1988), pp. 37-51.
    • (1988) Journal of Cryptology , vol.1 , pp. 37-51
    • Stinson, D.R.1
  • 466
    • 0025212061 scopus 로고
    • The combinatorics of authentication and secrecy codes
    • Stinson, D. R., The combinatorics of authentication and secrecy codes, Journal of Cryptology 2(1990), pp. 23-49.
    • (1990) Journal of Cryptology , vol.2 , pp. 23-49
    • Stinson, D.R.1
  • 467
    • 0038452683 scopus 로고
    • Combinatorial characterizations of authentication codes
    • Stinson, D. R., Combinatorial characterizations of authentication codes, Designs, Codes, and Cryptography 2(1992), pp. 175-187.
    • (1992) Designs, Codes, and Cryptography , vol.2 , pp. 175-187
    • Stinson, D.R.1
  • 468
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • Stinson, D. R., An explication of secret sharing schemes, Designs, Codes and Cryptography 2(1992), pp. 357-390.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1
  • 469
    • 0028323999 scopus 로고
    • Decomposition structures for secret sharing schemes
    • Stinson, D. R., Decomposition structures for secret sharing schemes, IEEE Transactions on Information Theory 40(1994), pp. 118-125.
    • (1994) IEEE Transactions on Information Theory , vol.40 , pp. 118-125
    • Stinson, D.R.1
  • 470
    • 0003987443 scopus 로고
    • 1st edition, Chapman & Hall/CRC Press, Boca Raton etc., 3rd edition
    • Stinson, D. R., Cryptography: Theory and Practice, 1st edition, Chapman & Hall/CRC Press, Boca Raton etc., 1995;3rd edition, 2006.
    • (1995) Cryptography: Theory and Practice
    • Stinson, D.R.1
  • 473
    • 0004193866 scopus 로고    scopus 로고
    • 2nd edition, Prentice-Hall, Upper Saddle River
    • Tanenbaum, A. S., Modern Operating Systems, 2nd edition, Prentice-Hall, Upper Saddle River, 2001.
    • (2001) Modern Operating Systems
    • Tanenbaum, A.S.1
  • 474
    • 0004141908 scopus 로고    scopus 로고
    • 4th edition, Prentice-Hall, Upper Saddle River
    • Tanenbaum, A. S., Computer Networks, 4th edition, Prentice-Hall, Upper Saddle River, 2003.
    • (2003) Computer Networks
    • Tanenbaum, A.S.1
  • 482
    • 0242528829 scopus 로고
    • A user-role based data security approach
    • Landwehr, C. E. ed., Elsevier Science North Holland, Amsterdam etc.
    • Ting, T. C., A user-role based data security approach. In: Landwehr, C. E. (ed.), Database Security: Status and Prospects, Elsevier Science (North Holland), Amsterdam etc., 1988, pp. 187-208.
    • (1988) Database Security: Status and Prospects , pp. 187-208
    • Ting, T.C.1
  • 484
    • 21644486314 scopus 로고    scopus 로고
    • Trusted Computing Group, Revision 1.2
    • Trusted Computing Group, TCG Specification Architecture Overview, Revision 1.2, 2004, https://www.trustedcomputinggroup.org.
    • (2004) TCG Specification Architecture Overview
  • 485
    • 54749105312 scopus 로고    scopus 로고
    • Trusted Computing Group - Infrastructure Working Group, Version 1.0, Revision 1
    • Trusted Computing Group - Infrastructure Working Group, Reference Architecture for Interoperability (Part I), Version 1.0, Revision 1, 2005, https://www.trustedcomputinggroup.org.
    • (2005) Reference Architecture for Interoperability (Part I)
  • 486
    • 70749096362 scopus 로고    scopus 로고
    • Trusted Computing Group, Version 1.2, Revision 85
    • Trusted Computing Group, TPM Main Part 1, Design Principles, Version 1.2, Revision 85, 2005, https://www.trustedcomputinggroup.org.
    • (2005) TPM Main Part 1, Design Principles
  • 487
    • 84860448417 scopus 로고    scopus 로고
    • Trusted Computing Group, Version 1.2, Revision 85
    • Trusted Computing Group, TPM Main Part 2, TPM Structures, Version 1.2, Revision 85, 2005, https://www.trustedcomputinggroup.org.
    • (2005) TPM Main Part 2, TPM Structures
  • 491
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • Vigna, G., Kemmerer, R. A., NetSTAT: A network-based intrusion detection system, Journal of Computer Security 7(1) (1999), pp. 37-71.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 492
    • 84896508047 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • Springer, Berlin etc.
    • Waidner, M., Unconditional sender and recipient untraceability in spite of active attacks. In: Proc. Eurocrypt 89, Lecture Notes in Computer Science 434, Springer, Berlin etc., 1990, pp. 302-319.
    • (1990) Proc. Eurocrypt 89, Lecture Notes in Computer Science 434 , pp. 302-319
    • Waidner, M.1
  • 498
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion detection using variable-length audit trail patterns
    • RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc.
    • Wespi, A., Dacier, M., Debar, H., Intrusion detection using variable-length audit trail patterns. In: Proc. 3rd International Symposium on Recent Advances in Intrusion Detection, RAID 2000, Lecture Notes in Computer Science 1907, Springer, Berlin etc., 2000, pp. 110-129.
    • (2000) Proc. 3rd International Symposium on Recent Advances in Intrusion Detection , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3
  • 501
  • 504
    • 33746644985 scopus 로고    scopus 로고
    • Privacy-preserving alert correlation: A concept hierarchy based approach
    • ACSAC 2005, IEEE
    • Xu, D., Ning, P., Privacy-preserving alert correlation: A concept hierarchy based approach. In: Proc. 21st Annual Computer Security Applications Confernce, ACSAC 2005, IEEE, 2005, pp. 537-546.
    • (2005) Proc. 21st Annual Computer Security Applications Confernce , pp. 537-546
    • Xu, D.1    Ning, P.2
  • 508
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotations
    • Yu, T., Winslett, M., Seamons, K. E., Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotations, ACM Transactions on Information and System Security 6(1) (2003), pp. 1-42.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.