-
1
-
-
84927609420
-
-
(visited April 15, 2014)
-
Password recovery speeds, http://www.lockdown.co.uk/?pg=combi (visited April 15, 2014)
-
-
-
-
2
-
-
0013178026
-
-
Tech. Rep. MS-CIS-96-35, University of Pennsylvania,, School of Engineering and Applied Science, Computer and Information Science Department, Philadelphia, Pennsylvania, U.S.A
-
Arbaugh, W.A., Farber, D.J., Smith, J.M.: A Secure and Reliable Bootstrap Architecture. Tech. Rep. MS-CIS-96-35, University of Pennsylvania,, School of Engineering and Applied Science, Computer and Information Science Department, Philadelphia, Pennsylvania, U.S.A (1996)
-
(1996)
A Secure and Reliable Bootstrap Architecture
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
3
-
-
84927652416
-
-
The New York Times (August 22, visited April 15, 2014
-
Arnold, W.: Technology; Philippines to Drop Charges on E-Mail Virus. The New York Times (August 22, 2000), http://www.nytimes.com/2000/08/22/business/ technology-philippines-to-drop-charges-on-e-mail-virus.html (visited April 15, 2014)
-
(2000)
Technology; Philippines to Drop Charges on E-Mail Virus
-
-
Arnold, W.1
-
4
-
-
1142270162
-
-
Prentice Hall
-
Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G.: Trusted Computing Platforms - TCPA Technology in Context. Prentice Hall (2003)
-
(2003)
Trusted Computing Platforms - TCPA Technology in Context
-
-
Balacheff, B.1
Chen, L.2
Pearson, S.3
Plaquin, D.4
Proudler, G.5
-
5
-
-
0003400251
-
Secure Computer Systems
-
II. A Mathematical Model. Tech. Rep. MTR-2547, The MITRE Corporation
-
Bell, D.E., LaPadula, L.J.: Secure Computer Systems, Vol. I. Mathematical Foundations and Vol. II. A Mathematical Model. Tech. Rep. MTR-2547, The MITRE Corporation (1973)
-
(1973)
Mathematical Foundations
, vol.1
-
-
Bell, D.E.1
Lapadula, L.J.2
-
7
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
CA, USA (May
-
Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on Security and Privacy, San Francisco, CA, USA (May 2012)
-
IEEE Symposium on Security and Privacy, San Francisco
, pp. 2012
-
-
Bonneau, J.1
-
9
-
-
0016949746
-
A lattice model of secure information flow. Commun
-
Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)
-
(1976)
ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
0003593599
-
-
Tech. Rep. RFC 2693, Internet Engineering Task Force (IETF) (September
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. Tech. Rep. RFC 2693, Internet Engineering Task Force (IETF) (September 1999)
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
14
-
-
0016984825
-
Protection in operating systems. Commun
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461–471 (1976)
-
(1976)
ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
16
-
-
33750963358
-
The Kerberos Network Authentication Service (V5)
-
Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5), RFC 4120 (July 2005)
-
(2005)
RFC
, pp. 4120
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
17
-
-
84872007983
-
Information technology–Open Systems Interconnection–The Directory: Public-key and attribute certificate frameworks
-
Neuman, C., Yu, T., Hartman, S., Raeburn, K.: Information technology–Open Systems Interconnection–The Directory: Public-key and attribute certificate frameworks, Recommendation X.509 (October 2012)
-
(2012)
Recommendation X
, pp. 509
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
18
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
19
-
-
84927604757
-
-
September 28 2011 (September, (visited April 15, 2014)
-
The Dutch Ministry of the Interior and Kingdom Relations: DigiNotar CA certificates will be revoked on September 28 2011 (September 2011), http://www.logius.nl/english/news-message/titel/diginotar-cacertificates- will-be-revoked-on-september-28-2011/, (visited April 15, 2014)
-
(2011)
-
-
-
20
-
-
84976781807
-
Reflections on trusting trust
-
Thompson, K.: Reflections on trusting trust. Commun. ACM 27(8), 761–763 (1984)
-
(1984)
Commun. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
21
-
-
0028380781
-
Authentication in the taos operating system
-
Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the taos operating system. ACM Trans. Comput. Syst. 12(1), 3–32 (1994)
-
(1994)
ACM Trans. Comput. Syst
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
22
-
-
84927592390
-
-
U.S. lawmakers seek to block China Huawei, ZTE U.S. inroads. Reuters (October 8, (visited April 15, 2014)
-
Wolf, J.: U.S. lawmakers seek to block China Huawei, ZTE U.S. inroads. Reuters (October 8, 2012), http://www.reuters.com/article/2012/10/08/ us-usa-china-huawei-zte-idUSBRE8960NH20121008 (visited April 15, 2014)
-
(2012)
-
-
Wolf, J.1
|