-
1
-
-
85015112928
-
Security modeling for organizations
-
Fairfax, VA, USA, ACM Press
-
A. Anderson, D. Longley, and L. F. Kwok. Security modeling for organizations. In 2nd ACM Conference on Computer and Communications Security, pages 241-250, Fairfax, VA, USA, 1994. ACM Press.
-
(1994)
2Nd ACM Conference on Computer and Communications Security
, pp. 241-250
-
-
Anderson, A.1
Longley, D.2
Kwok, L.F.3
-
2
-
-
21344459955
-
Structures of responsibility and security of information systems
-
J. Backhouse and G. Dhillon. Structures of responsibility and security of information systems. European Journal of Information Systems, 5(1):2-9, 1996.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-9
-
-
Backhouse, J.1
Dhillon, G.2
-
3
-
-
0842327102
-
A philosophy of security management
-
In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, IEEE Computer Society Press, Los Alamitos, CA, USA
-
D. Bailey. A philosophy of security management. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security, An Integrated Collection of Essays, pages 98-110. IEEE Computer Society Press, Los Alamitos, CA, USA, 1995.
-
(1995)
Information Security, an Integrated Collection of Essays
, pp. 98-110
-
-
Bailey, D.1
-
4
-
-
0026398826
-
Risk analysis as a source of professional knowledge
-
R. Baskerville. Risk analysis as a source of professional knowledge. Computers & Security, 10(8), 1991.
-
(1991)
Computers & Security
, vol.10
, Issue.8
-
-
Baskerville, R.1
-
5
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
R. Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25(4):375-414, December 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
6
-
-
0003400251
-
-
Technical Report M74-244, MITRE Corporation, Bedford, MA, USA
-
D. E. Bell and L. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corporation, Bedford, MA, USA, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.E.1
Lapadula, L.2
-
8
-
-
84959003739
-
-
International standard ISO/IEC 15408 common criteria for information technology security evaluation (parts 1-3), version 2.0, CCIB-98-026, May
-
International standard ISO/IEC 15408 common criteria for information technology security evaluation (parts 1-3), version 2.0, CCIB-98-026, May 1998.
-
(1998)
-
-
-
10
-
-
0003628828
-
-
Prentice Hall, Inc., Englewood Cliffs, NJ, USA
-
W. Ford. Computer Communications Security: Principles, Standard Protocols, and Techniques. Prentice Hall, Inc., Englewood Cliffs, NJ, USA, 1995.
-
(1995)
Computer Communications Security: Principles, Standard Protocols, and Techniques
-
-
Ford, W.1
-
11
-
-
2442621633
-
-
version 3.0. Internetdraft draft-freier-ssl-version3-02.txt, November 18
-
A. O. Freier, P. Karlton, and P. C. Kocher. The SSL protocol, version 3.0. Internetdraft draft-freier-ssl-version3-02.txt, November 18 1996.
-
(1996)
The SSL Protocol
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
16
-
-
85013585900
-
Foreword for republishing of the Bell-LaPadula model
-
L. J. LaPadula. Foreword for republishing of the Bell-LaPadula model. Journal of Computer Security, 4:233-238, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, pp. 233-238
-
-
Lapadula, L.J.1
-
18
-
-
84959003740
-
A formal model to aid documenting and harmonizing of information security requirements
-
L. Yngström and J. Carlsen, editors, Chapman & Hall, May 14-161997
-
J. Leiwo and Y. Zheng. A formal model to aid documenting and harmonizing of information security requirements. In L. Yngström and J. Carlsen, editors, Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC’97), pages 25-38. Chapman & Hall, May 14-161997.
-
Information Security in Research and Business, Proceedings of the IFIP TC11 13Th International Conference on Information Security (SEC’97)
, pp. 25-38
-
-
Leiwo, J.1
Zheng, Y.2
-
21
-
-
0342722135
-
-
Prentice-Hall, Inc, Reston, VA, USA
-
D. B. Parker. Managers Guide to Computer Security. Prentice-Hall, Inc, Reston, VA, USA, 1981.
-
(1981)
Managers Guide to Computer Security
-
-
Parker, D.B.1
-
23
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, pages 38-47, February 1996.
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
0030377647
-
Information security management: The second generation
-
R. von Solms. Information security management: The second generation. Computers & Security, 15(4):281-288, 1996.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 281-288
-
-
Von Solms, R.1
|