메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 358-365

Why information security is hard - An economic perspective

Author keywords

Access control; Computer crime; Computer security; Cryptographic protocols; Ethics; Floods; Information security; Laboratories; Microeconomics; Protection

Indexed keywords

ACCESS CONTROL; COMPUTER CRIME; CRYPTOGRAPHY; ECONOMICS; FLOODS; LABORATORIES; RISK MANAGEMENT; SECURITY SYSTEMS;

EID: 84925838576     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991552     Document Type: Conference Paper
Times cited : (527)

References (20)
  • 1
    • 85005305538 scopus 로고
    • The market for 'lemons': Quality uncertainty and market mechanism
    • August
    • GA Akerlof, The Market for 'Lemons': Quality Uncertainty and Market Mechanism, Quarterly Journal of Economics v 84 (August 1970) pp 488-500
    • (1970) Quarterly Journal of Economics , vol.84 , pp. 488-500
    • Akerlof, G.A.1
  • 4
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • November
    • RJ Anderson, Why Cryptosystems Fail in Communications of the ACM vol 37 no 11 (November 1994) pp 32-40
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.J.1
  • 7
    • 84994862245 scopus 로고    scopus 로고
    • Results of the distributed-systems intruder tools workshop
    • Carnegie Mellon University, December 7
    • CERT, Results of the Distributed-Systems Intruder Tools Workshop, Software Engineering Institute, Carnegie Mellon University, http://www.cert.org/reports/dsit- workshop-final.html, December 7, 1999
    • (1999) Software Engineering Institute
  • 8
    • 0024105910 scopus 로고    scopus 로고
    • A field study of the software design process for large systems
    • Nov 88
    • W Curtis, H Krasner, N Iscoe, A Field Study of the Software Design Process for Large Systems, in Communications of the ACM v 31 no 11 (Nov 88) pp 1268-1287
    • Communications of the ACM , vol.31 , Issue.11 , pp. 1268-1287
    • Curtis, W.1    Krasner, H.2    Iscoe, N.3
  • 10
    • 0012898029 scopus 로고
    • De l'influence des peages sur l'utilite des voies de communication
    • De l'influence des peages sur l'utilite des voies de communication, 1849, Annales des Ponts et Chausses
    • (1849) Annales des Ponts et Chausses
  • 12
    • 0003185688 scopus 로고
    • La cryptographiemilitaire
    • 9 Jan
    • A Kerckhoffs, La CryptographieMilitaire, in Journal des Sciences Militaires, 9 Jan 1883, pp 5-38; http://www.fabien-petitcolas.net/ kerckhoffs
    • (1883) Journal des Sciences Militaires , pp. 5-38
    • Kerckhoffs, A.1
  • 13
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • July
    • DP Kormann, AD Rubin, Risks of the Passport Single Signon Protocol, in Computer Networks (July 2000); at http://avirubin. com/vita.html
    • (2000) Computer Networks
    • Kormann, D.P.1    Rubin, A.D.2
  • 16
    • 0006644812 scopus 로고    scopus 로고
    • Smart and stupid networks: Why the internet is like microsoft
    • Dec
    • AM Odlyzko, Smart and stupid networks: Why the Internet is like Microsoft, ACM netWorker, Dec 1998, pp 38-46, at http://www.acm.org/networker/ issue/9805/ssnet.html
    • (1998) ACM NetWorker , pp. 38-46
    • Odlyzko, A.M.1
  • 20
    • 0344792106 scopus 로고    scopus 로고
    • Managing online security risks
    • The New YorkT imes, June 1
    • H Varian, Managing Online Security Risks, Economic Science Column, The New YorkT imes, June 1, 2000, http: //www.nytimes.com/library/financial/ columns/060100econ-scene.html
    • (2000) Economic Science Column
    • Varian, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.