-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
3 (Aug.
-
Axelsson, S., 2000. The base-rate fallacy and the difficulty of intrusion detection.ACM Trans. Inf. Syst. Sec. 3, 3 (Aug.), 186-205.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, pp. 186-205
-
-
Axelsson, S.1
-
4
-
-
0032632088
-
Computer security-What should you spend your money on
-
Buzzard, K., 1999. Computer security-What should you spend your money on.Comput. Sec. 18 4, 322-334.
-
(1999)
Comput. Sec.
, vol.18
, Issue.4
, pp. 322-334
-
-
Buzzard, K.1
-
5
-
-
0006025721
-
Identification of host audit data to detect attacks on low-level IP
-
Daniels, T. E., Spafford, E. H., 1999. Identification of host audit data to detect attacks on low-level IP.J. Comput. Sec. 7, 1, 3-35.
-
(1999)
J. Comput. Sec.
, vol.7
, Issue.1
, pp. 3-35
-
-
Daniels, T.E.1
Spafford, E.H.2
-
6
-
-
0023294428
-
An intrusion-detection model
-
2 (Feb.
-
Denning, D., 1987. An intrusion-detection model.IEEE Trans. Softw. Eng. 13, 2 (Feb.), 222-226.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, pp. 222-226
-
-
Denning, D.1
-
7
-
-
0030107190
-
A taxonomy of key escrow encryption systems
-
3 (Mar.
-
Denning, D., Branstad, D., 1996. A taxonomy of key escrow encryption systems.Commun. ACM. 39, 3 (Mar.), 34-40.
-
(1996)
Commun. ACM.
, vol.39
, pp. 34-40
-
-
Denning, D.1
Branstad, D.2
-
8
-
-
0031631068
-
A conceptual framework for information security management
-
Finne, T., 1998. A conceptual framework for information security management.Comput. Sec. 17 4, 303-307.
-
(1998)
Comput. Sec.
, vol.17
, Issue.4
, pp. 303-307
-
-
Finne, T.1
-
9
-
-
0007724451
-
Balancing cooperation and risk in intrusion detection
-
1 (Feb.
-
Frincke, D., 2000. Balancing cooperation and risk in intrusion detection.ACM Trans. Inf. Syst. Sec. 3, 1 (Feb.), 1-29.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, pp. 1-29
-
-
Frincke, D.1
-
10
-
-
0038223766
-
A framework for using information security as a response to competitor analysis systems
-
9 (Sept.
-
Gordon, L., Loeb, M., 2001. A framework for using information security as a response to competitor analysis systems.Commun. ACM, 44, 9 (Sept.), 70-75.
-
(2001)
Commun. ACM
, vol.44
, pp. 70-75
-
-
Gordon, L.1
Loeb, M.2
-
11
-
-
0030193003
-
Information systems planning: A model and empirical tests
-
7 (July
-
Hann, J., Weber, R., 1996. Information systems planning: A model and empirical tests.Manage. Sci. 42, 7 (July), 1043-1064.
-
(1996)
Manage. Sci.
, vol.42
, pp. 1043-1064
-
-
Hann, J.1
Weber, R.2
-
12
-
-
32644456297
-
How much is enough? A risk-management approach to computer security
-
Stanford University, Stanford, Calif., June
-
Hoo, K., 2000. How much is enough? A risk-management approach to computer security.Consortium for Research on Information Security Policy (CRISP) Working Paper. Stanford University, Stanford, Calif., June.
-
(2000)
Consortium for Research on Information Security Policy (CRISP) Working Paper
-
-
Hoo, K.1
-
13
-
-
84974754344
-
Editors' preface
-
Jajodia, S., Millen, J., 1993. Editors' preface. J. Comput. Sec. 2, 2-3, 85.
-
(1993)
J. Comput. Sec.
, vol.2
, Issue.2-3
, pp. 85
-
-
Jajodia, S.1
Millen, J.2
-
14
-
-
0031372393
-
Penetration testing and system audit
-
Jones, A., 1997. Penetration testing and system audit.Comput. Sec. 16, 595-602.
-
(1997)
Comput. Sec.
, vol.16
, pp. 595-602
-
-
Jones, A.1
-
15
-
-
84974774507
-
Towards operational measures of security
-
Littlewood, B., Broclehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., Mcdermid, J., Gollman, D., 1993. Towards operational measures of security.J. Comput. Sec. 2, 2, 211-229.
-
(1993)
J. Comput. Sec.
, vol.2
, Issue.2
, pp. 211-229
-
-
Littlewood, B.1
Broclehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
Mcdermid, J.8
Gollman, D.9
-
16
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., Carr, H. H., Warkentin, M. E., 1992. Threats to information systems: Today's reality, yesterday's understanding.MIS Quart. 17, 2, 173-186.
-
(1992)
MIS Quart.
, vol.17
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
17
-
-
0043032726
-
Risk management and insurances
-
Helsinki, Finland
-
Luotonen, O., 1993. Risk management and insurances.Painatuskeskus Oy. Helsinki, Finland.
-
(1993)
Painatuskeskus Oy.
-
-
Luotonen, O.1
-
18
-
-
2442572685
-
Information security of internet commerce
-
L. McKnight and J. Bailey, Eds., MIT Press, Cambridge, Mass.
-
Mcknight, L., Solomon, R., Reagle, J., Carver, D., Johnson, C., Gerovac, B., Gingold, D., 1997. Information security of internet commerce. In Internet Economics, L. McKnight and J. Bailey, Eds., MIT Press, Cambridge, Mass., pp. 435-452.
-
(1997)
Internet Economics
, pp. 435-452
-
-
Mcknight, L.1
Solomon, R.2
Reagle, J.3
Carver, D.4
Johnson, C.5
Gerovac, B.6
Gingold, D.7
-
19
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
Meadows, C., 2001. A cost-based framework for analysis of denial of service in networks J. Comput. Sec. 9, 1-2, 143-164.
-
(2001)
J. Comput. Sec.
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
20
-
-
0026850008
-
A resource allocation model for denial of service
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
Millen, J., 1992. A resource allocation model for denial of service. In Proceedings of the 1992 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., pp. 137-147.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy.
, pp. 137-147
-
-
Millen, J.1
-
21
-
-
0000610330
-
Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
-
9 (Sept.
-
Muralidhar, K., Batra, D., Kirs, P., 1995. Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach.Manage. Sci. 41, 9 (Sept.), 1549-1564.
-
(1995)
Manage. Sci.
, vol.41
, pp. 1549-1564
-
-
Muralidhar, K.1
Batra, D.2
Kirs, P.3
-
23
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
2 (May
-
Osborn, S., Sandhu, R., Munawer, Q., 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies.ACM Trans. Inf. Syst. Sec. 3, 2 (May), 85-106.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
24
-
-
0032682170
-
Hash-based encryption
-
Peyravian, M., Roginsky, A., Zunic, N., 1999. Hash-based encryption.Comput. Sec. 18, 4, 345-350.
-
(1999)
Comput. Sec.
, vol.18
, Issue.4
, pp. 345-350
-
-
Peyravian, M.1
Roginsky, A.2
Zunic, N.3
-
25
-
-
0004198635
-
-
2nd ed.), Prentice-Hall, Englewood Cliffs, N.J.
-
Pfleeger, C., 1997.Security in Computing (2nd ed.), Prentice-Hall, Englewood Cliffs, N.J.
-
(1997)
Security in Computing
-
-
Pfleeger, C.1
-
26
-
-
0035265977
-
2001CSI/FBI computer crime and security survey
-
2 (Spring
-
Power, R., 2001. 2001CSI/FBI computer crime and security survey.Comput. Sec. J. 17 2 (Spring), 29-51.
-
(2001)
Comput. Sec. J.
, vol.17
, pp. 29-51
-
-
Power, R.1
-
27
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
2 (Feb.
-
Sandhu, R. S., Bhamidipati, V., Munawer, Q., 1999. The ARBAC97 model for role-based administration of roles.ACM Trans. Inf. Syst. Sec. 1, 2 (Feb.), 105-135.
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
28
-
-
0030086382
-
Role-based access control models
-
2 (Feb.
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E., 1996. Role-based access control models.IEEE Comput. 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Comput.
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
30
-
-
0028532997
-
Cryptanalysis and protocol failures
-
11 (Nov.
-
Simmons, G., 1994. Cryptanalysis and protocol failures.Commun. ACM. 37, 11 (Nov.), 56-64.
-
(1994)
Commun. ACM.
, vol.37
, pp. 56-64
-
-
Simmons, G.1
-
31
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. W., 1990. Effective IS security: An empirical study.Inf. Syst. Res. 1, 3, 255-276.
-
(1990)
Inf. Syst. Res.
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
32
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., Welke, R. J., 1998. Coping with systems risk: Security planning models for management decision making.MIS Quart. 23, 4, 441-469.
-
(1998)
MIS Quart.
, vol.23
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
33
-
-
0142032256
-
How to build an economic model in your spare time. Part of a collection titled
-
ed. Michael Szenberg, University of Michigan Press
-
Varian, H. R., 1997. How to build an economic model in your spare time. Part of a collection titled Passion and Craft: Economists at Work, ed. Michael Szenberg, University of Michigan Press.
-
(1997)
Passion and Craft: Economists at Work
-
-
Varian, H.R.1
-
34
-
-
0002067431
-
Net STAT: a network-based intrusion detection system
-
Vigna, G., Kemmeerer, R. A., 1999. Net STAT: a network-based intrusion detection system. J. Comput. Sec. 7, 1, 37-71.
-
(1999)
J. Comput. Sec.
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmeerer, R.A.2
-
35
-
-
0022606523
-
A secure capability computer system
-
IEEE Computer Society Press, Los Alamitos, Calif
-
Wiseman, S., 1986. A secure capability computer system. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif, pp. 86-94.
-
(1986)
Proceedings of the IEEE Symposium on Security and Privacy.
, pp. 86-94
-
-
Wiseman, S.1
|