-
1
-
-
85067324940
-
Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons
-
Schneier, B: Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons, Inc., 2000 206, 210
-
(2000)
Inc
, vol.206
, pp. 210
-
-
Schneier, B.1
-
2
-
-
0003851050
-
-
Morgan Kaufmann Publishers, San Francisco, CA
-
Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers, San Francisco, CA, 1993 107
-
(1993)
Transaction Processing: Concepts and Techniques
, pp. 107
-
-
Gray, J.1
Reuter, A.2
-
6
-
-
0036931592
-
-
Washington, DC, pending
-
Reynolds, J., et al.: The Design and Implementation of an Intrusion Tolerant System. Proceedings of the 2002 International Conference on Dependable Systems and Networks, 23–26 June 2002, Washington, DC, pending
-
(2002)
The Design and Implementation of an Intrusion Tolerant System. Proceedings of the 2002 International Conference on Dependable Systems and Networks, 23–26
-
-
Reynolds, J.1
-
7
-
-
0033726577
-
Logic Induction of Valid Behavior Specifications for Intrusion Detection
-
Ko, Calvin: Logic Induction of Valid Behavior Specifications for Intrusion Detection. IEEE Symposium on Security and Privacy 2000: 142–153
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 142-153
-
-
Ko, C.1
-
8
-
-
19544390827
-
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
-
Ko, Calvin, Brutch, Paul, et al.: System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190–204
-
(2001)
Recent Advances in Intrusion Detection
, pp. 190-204
-
-
Ko, C.1
Brutch, P.2
-
9
-
-
0001913399
-
Mediating Connectors
-
Austin, Texas, May 31-June 4, IEEE Computer Society Press
-
Balzer, R., and Goldman, N.: Mediating Connectors. Proceedings of the 19th IEEE International Conference on Distributed Computing Systems, Austin, Texas, May 31-June 4, 1999, IEEE Computer Society Press 73-77
-
(1999)
Proceedings of the 19Th IEEE International Conference on Distributed Computing Systems
, pp. 73-77
-
-
Balzer, R.1
Goldman, N.2
-
10
-
-
85084097839
-
Self-securing storage: Protecting data in compromised system. Operating Systems Design and Implementation, San Diego, CA, 23–25 October 2000
-
Strunk, J.D., et al.: Self-securing storage: Protecting data in compromised system. Operating Systems Design and Implementation, San Diego, CA, 23–25 October 2000, USENIX Association, 2000 165–180
-
(2000)
USENIX Association
, pp. 165-180
-
-
Strunk, J.D.1
-
11
-
-
84964528983
-
Survivable Storage Systems
-
IEEE
-
Ganger, G.R., et al.: Survivable Storage Systems. DARPA Information Survivability Conference and Exposition (Anaheim, CA, 12-14 June 2001), pages 184–195 vol 2. IEEE, 2001
-
(2001)
DARPA Information Survivability Conference and Exposition (Anaheim, CA, 12-14 June 2001)
, vol.2
, pp. 184-195
-
-
Ganger, G.R.1
-
14
-
-
0004229237
-
Software Vulnerability Analysis
-
PhD thesis, IN, May
-
Krsul, I.V.: Software Vulnerability Analysis. PhD thesis, Purdue University, West Lafayette, IN, May, 1998, p. 17, available at https://www.cerias.purdue.edu/techreports-ssl/public/97-05.pdf
-
(1998)
Purdue University, West Lafayette
, pp. 17
-
-
Krsul, I.V.1
-
16
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws
-
September
-
Landwehr, C. E., Bull, A. R., McDermott, J. P., Choi, W. S.: A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, Volume 26, Number 3, September 1994
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
18
-
-
0003949225
-
A Taxonomy of Security Faults in the Unix Operating System. Master's Thesis, Purdue University
-
Aslam, T.: A Taxonomy of Security Faults in the Unix Operating System. Master's Thesis, Purdue University, Department of Computer Sciences, August 1995. http://citeseer.nj.nec.com/aslam95taxonomy.html
-
(1995)
Department of Computer Sciences
, Issue.August
-
-
Aslam, T.1
-
19
-
-
84879522186
-
Categorization of Software Error that Led to Security Breaches
-
Department of Computer Science
-
Du, W. and Mathur, A.: Categorization of Software Error that Led to Security Breaches. Technical Report 97-09, Purdue University, Department of Computer Science, 1997
-
(1997)
Technical Report 97-09, Purdue University
-
-
Du, W.1
Mathur, A.2
|