-
1
-
-
0027733285
-
The risk data repository: a novel approach to security risk modelling
-
Dougall, E.G. (Ed.), Proceedings, IFIP TC 11 Ninth International Conference on Information Security, FIP Sec. '93, Toronto, Canada, 12-14 May, Elsevier, NY, pp.185-90
-
Anderson, A.M., Longley, D. and Tickle, A.B. (1993), “The risk data repository: a novel approach to security risk modelling”, Dougall, E.G. (Ed.), Proceedings, IFIP TC 11 Ninth International Conference on Information Security, FIP Sec. '93, Toronto, Canada, 12-14 May, Elsevier, NY, pp.185-90.
-
(1993)
-
-
Anderson, A.M.1
Longley, D.2
Tickle, A.B.3
-
2
-
-
85015112928
-
Security modelling for organizations
-
Proceedings, 2nd ACM Conference on Computer nd Communications Security, 2-4 November, ACM Press, Fairfax, VA
-
Anderson, A., Kwok, L.F. and Longley, D. (1994), “Security modelling for organizations”, Proceedings, 2nd ACM Conference on Computer nd Communications Security, 2-4 November, ACM Press, Fairfax, VA, pp. 241-50.
-
(1994)
, pp. 241-250
-
-
Anderson, A.1
Kwok, L.F.2
Longley, D.3
-
3
-
-
0003400251
-
Secure computer systems: mathematical foundations and model
-
Technical Reports ESD-TR-73-278 and 2, 547, the MITRE Corporation, Bedford, MA
-
Bell, D. and Lapadula, L. (1973), “Secure computer systems: mathematical foundations and model”, Technical Reports ESD-TR-73-278 and 2, 547, the MITRE Corporation, Bedford, MA.
-
(1973)
-
-
Bell, D.1
Lapadula, L.2
-
5
-
-
84986117093
-
A language for describing information and physical security architectures
-
Gable, G.G. (Ed.), IT Security: The Need for International Cooperation, roceedings, IFIP TC11 Eighth International Conference on Information Security, IFIP Sec. '92, Singapore, 27-29 May, Elsevier, NY
-
Caelli, W., Longley, D. and Tickle, A.B. (1992), “A language for describing information and physical security architectures”, Gable, G.G. (Ed.), IT Security: The Need for International Cooperation, roceedings, IFIP TC11 Eighth International Conference on Information Security, IFIP Sec. '92, Singapore, 27-29 May, Elsevier, NY.
-
(1992)
-
-
Caelli, W.1
Longley, D.2
Tickle, A.B.3
-
6
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
27-9 April, IEEE Computer Society Press, Oakland, CA, pp.184-94
-
Clark, D.D. and Wilson, D.R. (1987), “A comparison of commercial and military computer security policies”, Proceedings, 1987 IEEE Symposium on Security and Privacy, 27-9 April, IEEE Computer Society Press, Oakland, CA, pp.184-94.
-
(1987)
Proceedings, 1987 IEEE Symposium on Security and Privacy
-
-
Clark, D.D.1
Wilson, D.R.2
-
7
-
-
0017677616
-
Security risk assessment in electronic data processing systems
-
”
-
Courtney, R.H. Jr (1977), “Security risk assessment in electronic data processing systems, ” Proceedings, AFIPS Conference, pp. 97-104.
-
(1977)
Proceedings, AFIPS Conference
, pp. 97-104
-
-
Courtney, R.H.1
-
9
-
-
0030385768
-
A security officer's workbench
-
Kwok, L.F. and Longley, D. (1996), “A security officer's workbench”, Computers & Security, Vol. 15 No. 8, pp. 695-705.
-
(1996)
Computers & Security
, vol.15
, Issue.8
, pp. 695-705
-
-
Kwok, L.F.1
Longley, D.2
|