-
1
-
-
0029232070
-
A Higher Level of Computer Security Through Active Policies
-
Abrams, M. D. and Moffett, J. T. (1995). “A Higher Level of Computer Security Through Active Policies,” Computer & Security, Vol. 14, No. 2, pp. 147–157.
-
(1995)
Computer & Security
, vol.14
, Issue.2
, pp. 147-157
-
-
Abrams, M.D.1
Moffett, J.T.2
-
2
-
-
0011645925
-
Evaluation Issues
-
Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds.), Los Alamitos, CA: IEEE Computer Society Press
-
Abrams, M. D. and Podell, H. J. (1995). “Evaluation Issues,” in Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds.), Information Security - An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press.
-
(1995)
Information Security - An Integrated Collection of Essays
-
-
Abrams, M.D.1
Podell, H.J.2
-
5
-
-
0002380073
-
Tamper Resistance - a Cautionary Note
-
Oakland, California
-
Anderson, R., and Kuhn, M. (1996). “Tamper Resistance - a Cautionary Note,” Proceedings of The Second USENIX Workshop on Electronic Commerce, Oakland, California, pp. 18–21.
-
(1996)
Proceedings of The Second USENIX Workshop on Electronic Commerce
, pp. 18-21
-
-
Anderson, R.1
Kuhn, M.2
-
6
-
-
0032070303
-
On the Limits of Steganography
-
Anderson, R. J. and Petitcolas, F. A. P. (1998). “On the Limits of Steganography,” IEEE Journal on Selected Areas in Communications, Vol. 16, Is.4, pp. 474–481.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 474-481
-
-
Anderson, R.J.1
Petitcolas, F.A.P.2
-
7
-
-
21344459955
-
Structures of Responsibilities and Security of Information Systems
-
Backhouse, J. and Dhillon, G. (1996). “Structures of Responsibilities and Security of Information Systems,” European Journal of Information Systems, Vol. 5, No. 1, pp. 2–10.
-
(1996)
European Journal of Information Systems
, vol.5
, Issue.1
, pp. 2-10
-
-
Backhouse, J.1
Dhillon, G.2
-
9
-
-
0024302579
-
Can the Field of MIS be Disciplined?
-
Banville, C. and Landry, M. (1989). “Can the Field of MIS be Disciplined?” Communications of the ACM, Vol. 32, No. 1, pp. 48–60.
-
(1989)
Communications of the ACM
, vol.32
, Issue.1
, pp. 48-60
-
-
Banville, C.1
Landry, M.2
-
11
-
-
6744247045
-
Logical Controls Specification: An Approach to Information System Security
-
Klein, H., and Kumar, K. (Eds.), Amsterdam: North-Holland
-
Baskerville, R. (1989). “Logical Controls Specification: An Approach to Information System Security,” in Klein, H., and Kumar, K. (Eds.), Systems Development for Human Progress, Amsterdam: North-Holland.
-
(1989)
Systems Development for Human Progress
-
-
Baskerville, R.1
-
12
-
-
0013324190
-
Risk Analysis: An Interpretative Feasibility Tool In Justifying Information Systems Security
-
Baskerville, R. (1991). “Risk Analysis: An Interpretative Feasibility Tool In Justifying Information Systems Security,” European Journal of Information Systems, Vol. 1, Is.2, pp. 121–130.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
13
-
-
0027804413
-
Information Systems Security Design Methods: Implications for Information Systems Development
-
Baskerville, R. (1993). “Information Systems Security Design Methods: Implications for Information Systems Development,” Computing Surveys, Vol. 25, No. 4, pp. 375–414.
-
(1993)
Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
16
-
-
85024287407
-
Virtual Private Networks - The Major Issues, Problems and Opportunities
-
Bell, R. (1993). “Virtual Private Networks - The Major Issues, Problems and Opportunities,” IEE Colloquium on Virtual Networking.
-
(1993)
IEE Colloquium on Virtual Networking.
-
-
Bell, R.1
-
18
-
-
0028513870
-
Network Firewalls
-
Bellovin, S. M. and Cheswick, W. R. (1994). “Network Firewalls,” IEEE Communications Magazine, Vol. 32, Is.9, pp. 50–57.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 50-57
-
-
Bellovin, S.M.1
Cheswick, W.R.2
-
19
-
-
0028013913
-
Specification and Analysis of A Security Management System
-
Bemardi, A., Rico, N., Cherkaoui, O., and Banfield, J. (1994). “Specification and Analysis of A Security Management System,” Proceedings of the IEEE Network Operations and Management Symposium.
-
(1994)
Proceedings of the IEEE Network Operations and Management Symposium.
-
-
Bemardi, A.1
Rico, N.2
Cherkaoui, O.3
Banfield, J.4
-
22
-
-
0030403941
-
Possible Macro Virus Attacks and How to Prevent Them
-
Bontchev, V. (1996). “Possible Macro Virus Attacks and How to Prevent Them,” Computers & Security, Vol. 15, No. 7, pp. 959–626.
-
(1996)
Computers & Security
, vol.15
, Issue.7
, pp. 626-959
-
-
Bontchev, V.1
-
23
-
-
0028762817
-
GSM Security: A Description of the Reasons for Security and the Techniques
-
Bookson, C. (1994). “GSM Security: A Description of the Reasons for Security and the Techniques,” IEE Colloquium on Security and Cryptography.
-
(1994)
IEE Colloquium on Security and Cryptography.
-
-
Bookson, C.1
-
25
-
-
0029253405
-
Specification and Validation of a Security Policy Model
-
Boswell, A. (1995). “Specification and Validation of a Security Policy Model,” IEEE Transaction on Software Engineering, Vol. 21, Is.2, pp. 63–68.
-
(1995)
IEEE Transaction on Software Engineering
, vol.21
, Issue.2
, pp. 63-68
-
-
Boswell, A.1
-
26
-
-
0028513851
-
Digital Signatures: Are They Legal for Electronic Commerce?
-
Brown, P. W. (1994). “Digital Signatures: Are They Legal for Electronic Commerce?” IEEE Communications Magazine, Vol. 32, Is.9, pp. 76–80.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 76-80
-
-
Brown, P.W.1
-
28
-
-
0032738756
-
Digital Watermarking: From Concepts to RealTime Video Applications
-
Busch, G., Funk, W., and Wolthusen, S. (1999). “Digital Watermarking: From Concepts to RealTime Video Applications,” IEEE Computer Graphics and Applications, Vol. 19, No. 1., pp. 25–36.
-
(1999)
IEEE Computer Graphics and Applications
, vol.19
, Issue.1
, pp. 25-36
-
-
Busch, G.1
Funk, W.2
Wolthusen, S.3
-
29
-
-
0004190705
-
-
Boston, MA: Addison-Wesley
-
Castano, S., Fugini, M., Martell, G., and Samarati, P. (1995). Database Security, Boston, MA: Addison-Wesley.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martell, G.3
Samarati, P.4
-
30
-
-
6744255767
-
Penetration Testing Through Social Engineering
-
Ceraolo, J. P. (1996). “Penetration Testing Through Social Engineering,” Information Systems Security, Vol. 4, No. 4.
-
(1996)
Information Systems Security
, vol.4
, Issue.4
-
-
Ceraolo, J.P.1
-
31
-
-
85024290438
-
Security Management on Mobile-Phone Communication
-
Chan, K. L., Kwong, S., and Longginnou, L. (1993). “Security Management on Mobile-Phone Communication,” Proceedings of the Computer, Communication, Control and Power Engineering.
-
(1993)
Proceedings of the Computer, Communication, Control and Power Engineering.
-
-
Chan, K.L.1
Kwong, S.2
Longginnou, L.3
-
33
-
-
0027804845
-
Using Smart Cards to Authenticate Passwords
-
Chang, C. C., Hwang, R. J., and Buehrer, D. (1993). “Using Smart Cards to Authenticate Passwords,” Proceedings, Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on Security Technology.
-
(1993)
Proceedings, Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on Security Technology.
-
-
Chang, C.C.1
Hwang, R.J.2
Buehrer, D.3
-
34
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Chaum, D. (1981). “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communication of ACM.
-
(1981)
Communication of ACM.
-
-
Chaum, D.1
-
37
-
-
0021558192
-
Computer Viruses - Theory and Experiments
-
Cohen, F. (1984). “Computer Viruses - Theory and Experiments,” Proceedings of IFIP/SEC’84.
-
(1984)
Proceedings of IFIP/SEC’84.
-
-
Cohen, F.1
-
40
-
-
85024282059
-
-
Elsevier Advanced Technology
-
Computer Fraud & Security Bulletin (2000). Elsevier Advanced Technology.
-
(2000)
-
-
-
41
-
-
84947907875
-
Technical Trials and Legal Tribulations
-
Craver, C. and Yeo (1998). “Technical Trials and Legal Tribulations,” Communications of the ACM, Vol. 41, No. 7, p. 45–54.
-
(1998)
Communications of the ACM
, vol.41
, Issue.7
, pp. 45-54
-
-
Craver, C.1
Yeo2
-
42
-
-
0031535076
-
Case Study Principles for Different Types of Cases
-
Cunningham, J. B. (1997). “Case Study Principles for Different Types of Cases,” Quality & Quantity, Vol. 31, pp. 401–423.
-
(1997)
Quality & Quantity
, vol.31
, pp. 401-423
-
-
Cunningham, J.B.1
-
44
-
-
0032595614
-
Software Development on Internet Time
-
Cusumano, M. A. and Yoffie, D. B. (1999). “Software Development on Internet Time,” IEEE Computer, Vol. 32, No. 10, pp. 60–69.
-
(1999)
IEEE Computer
, vol.32
, Issue.10
, pp. 60-69
-
-
Cusumano, M.A.1
Yoffie, D.B.2
-
46
-
-
85024287599
-
Working Group Report on Internet/Intranet Security
-
IEEE Computer Society Press, Los Alamitos, CA
-
Davis, B. C. and Ylönen, T. (1997). “Working Group Report on Internet/Intranet Security,” Proceedings of the Sixth IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE Computer Society Press, Los Alamitos, CA.
-
(1997)
Proceedings of the Sixth IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
-
-
Davis, B.C.1
Ylönen, T.2
-
47
-
-
4344686610
-
Java Security: Web Browsers and Beyond
-
Dean, D., Felten, E.W., Wallach, D.S., and Balfanz, D. (1996). “Java Security: Web Browsers and Beyond,” Proceedings of 1996 IEEE Symposium on Security and Privacy.
-
(1996)
Proceedings of 1996 IEEE Symposium on Security and Privacy.
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
Balfanz, D.4
-
48
-
-
0038758285
-
-
Scofflaws, New York: ACM Press
-
Denning, D.E., and Denning, P.J. (1998) (Eds), Internet Besieged: Countering Cyberspace Scofflaws, New York: ACM Press, pp. 241–269.
-
(1998)
Internet Besieged: Countering Cyberspace
, pp. 241-269
-
-
Denning, D.E.1
Denning, P.J.2
-
50
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
Denning, D.E., (1976). “A Lattice Model of Secure Information Flow,” Communication of the ACM, Vol. 19, No. 5, pp. 236–243.
-
(1976)
Communication of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
51
-
-
84555212697
-
Passwords
-
Denning, P.J. (1992). “Passwords,” American Scientist, Vol. 80, pp. 117–120.
-
(1992)
American Scientist
, vol.80
, pp. 117-120
-
-
Denning, P.J.1
-
52
-
-
0040075289
-
Key Escrow Encryption Policies and Technologies
-
Denning, D.E. and Baugh, W.E., Jr. (1996). “Key Escrow Encryption Policies and Technologies,” Information Systems Security, Vol. 5, No. 2, pp. 34–44.
-
(1996)
Information Systems Security
, vol.5
, Issue.2
, pp. 34-44
-
-
Denning, D.E.1
Baugh, W.E.2
-
53
-
-
70350710742
-
-
Denning, D.E. and Denning, P.J. (Ed.), New York: ACM Press
-
Denning, D. E. and Branstad, D. K. (1998). A Taxonomy for Key Recovery Encryption Systems. in Internet Besieged: Countering Cyberspace Scofflaws, Denning, D.E. and Denning, P.J. (Ed.), New York: ACM Press, pp. 357–375.
-
(1998)
A Taxonomy for Key Recovery Encryption Systems. in Internet Besieged: Countering Cyberspace Scofflaws
, pp. 357-375
-
-
Denning, D.E.1
Branstad, D.K.2
-
55
-
-
23044525969
-
Current Directions in IS Security Research: Toward Socioorganizational Perspectives
-
Dhillon, G. and Backhouse, J. (2001). “Current Directions in IS Security Research: Toward Socioorganizational Perspectives,” Information Systems Journal, Vol. 11, No. 2.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
-
-
Dhillon, G.1
Backhouse, J.2
-
58
-
-
85008014337
-
Raising the Bar on Software Security Testing
-
Dima, A., Wack, J., and Wakid, S. (1999). “Raising the Bar on Software Security Testing,” IT Professional, Vol. 1, Is.3, pp. 27–32.
-
(1999)
IT Professional
, vol.1
, Issue.3
, pp. 27-32
-
-
Dima, A.1
Wack, J.2
Wakid, S.3
-
59
-
-
1842709019
-
A Methodology for Analysing Human and Computer-Related Issues in Secure Systems
-
Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Elsevier Science Publishers
-
Dobson, J. (1991). “A Methodology for Analysing Human and Computer-Related Issues in Secure Systems,” in Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Computer Security and Information Integrity, Elsevier Science Publishers.
-
(1991)
Computer Security and Information Integrity
-
-
Dobson, J.1
-
61
-
-
85024242125
-
A Framework for Dealing With and Specifying Security Requirements in Information Systems
-
Dubois, E. and Wu, S. (1996). “A Framework for Dealing With and Specifying Security Requirements in Information Systems,” Proceedings of IFP SEC’96.
-
(1996)
Proceedings of IFP SEC’96.
-
-
Dubois, E.1
Wu, S.2
-
64
-
-
0039477741
-
A Cost Model for Managing Information Security Hazards
-
Ekenberg, L., Oberoi, S., and Orci, I. (1995). “A Cost Model for Managing Information Security Hazards,” Computers & Security, Vol. 14, No. 8, pp. 707–717.
-
(1995)
Computers & Security
, vol.14
, Issue.8
, pp. 707-717
-
-
Ekenberg, L.1
Oberoi, S.2
Orci, I.3
-
72
-
-
0027612497
-
Principles of Key Management
-
Fumy, W. and Landrock, P. (1993). “Principles of Key Management,” IEEE Journal on Selected Areas in Communications, Vol. 11, Is.5, pp. 785–793.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 785-793
-
-
Fumy, W.1
Landrock, P.2
-
73
-
-
84976814937
-
Choosing Appropriate Information Systems Research Methodologies
-
Galliers, R. D. and Land, F. F. (1987). “Choosing Appropriate Information Systems Research Methodologies,” Communication of the ACM, Vol. 30, No. 11, pp. 900–902.
-
(1987)
Communication of the ACM
, vol.30
, Issue.11
, pp. 900-902
-
-
Galliers, R.D.1
Land, F.F.2
-
78
-
-
11844271802
-
-
Part 1: Concepts and Models for IT Security. ISO/IEC TR 13335–1
-
GMITS (1996), Guidelines for the Management of IT Security, Part 1: Concepts and Models for IT Security. ISO/IEC TR 13335–1.
-
(1996)
Guidelines for the Management of IT Security
-
-
-
79
-
-
0027617271
-
Increasing Availability and Security of an Authentication Service
-
Gong, L. (1993). “Increasing Availability and Security of an Authentication Service,” IEEE Journal on Selected Areas on Communication, Vol. 11, Is.5, pp. 657–662.
-
(1993)
IEEE Journal on Selected Areas on Communication
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
81
-
-
0003313661
-
Java Security: Present and Near Future
-
Gong, L. (1997). “Java Security: Present and Near Future,” IEEE Micro, Vol. 17, Is.3, pp. 14–19.
-
(1997)
IEEE Micro
, vol.17
, Issue.3
, pp. 14-19
-
-
Gong, L.1
-
82
-
-
85024249460
-
-
1999, Krause, M., and Tipton, H.F. (Eds.), Boca Raton, FL: CRC Press
-
Gove, R. A. (1999). Fundamentals of Cryptography and Encryption. Handbook of Information Security Management 1999, Krause, M., and Tipton, H.F. (Eds.), Boca Raton, FL: CRC Press.
-
(1999)
Fundamentals of Cryptography and Encryption. Handbook of Information Security Management
-
-
Gove, R.A.1
-
84
-
-
0000917858
-
The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions
-
Harrington, S. J. (1996). “The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions,” MIS Quartely, Vol. 20, No. 3.
-
(1996)
MIS Quartely
, vol.20
, Issue.3
-
-
Harrington, S.J.1
-
85
-
-
0016984825
-
Protection in Operating Systems
-
Harrison, M. A., Ruzzo, W.L., and Ullman, J.D. (1976). “Protection in Operating Systems,” Communication of the ACM, Vol. 19, No. 8, pp. 461–471.
-
(1976)
Communication of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
87
-
-
0039372661
-
Viewing Business-Process Security from Different Perspectives
-
Herrmann, G. and Pernul, G. (1999). “Viewing Business-Process Security from Different Perspectives,” International Journal of Electronic Commerce, Vol. 3, No. 3, pp. 89–103.
-
(1999)
International Journal of Electronic Commerce
, vol.3
, Issue.3
, pp. 89-103
-
-
Herrmann, G.1
Pernul, G.2
-
88
-
-
84902489858
-
Exploring the Intellectual Structures of Information Systems Development: A Social Action Theoretic Analysis
-
Hirschheim, R., Klein, H. K., and Lyytinen, K. (1996). “Exploring the Intellectual Structures of Information Systems Development: A Social Action Theoretic Analysis, Accounting, Management and Information Technologies, Vol. 6, No. 1–2, pp. 1–64.
-
(1996)
Accounting, Management and Information Technologies
, vol.6
, Issue.1-2
, pp. 1-64
-
-
Hirschheim, R.1
Klein, H.K.2
Lyytinen, K.3
-
91
-
-
0029267472
-
State Transition Analysis: A Rule-based Intrusion Detection Approach
-
Ilgun, K., Kemmerer, R. A., and Porras, P. A. (1995). “State Transition Analysis: A Rule-based Intrusion Detection Approach,” IEEE Transaction on Software Engineering, Vol. 21, No. 3, pp. 222–232.
-
(1995)
IEEE Transaction on Software Engineering
, vol.21
, Issue.3
, pp. 222-232
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
92
-
-
0041674320
-
Levels of Abstraction as a Conceptual Framework for an Information System
-
Falkenberg, E.D., and Lindgreen, P., (Eds), North-Holland, Amsterdam
-
Iivari, J. (1989). “Levels of Abstraction as a Conceptual Framework for an Information System,” In Falkenberg, E.D., and Lindgreen, P., (Eds), Information System Concepts: An In-depth Analysis., North-Holland, Amsterdam.
-
(1989)
Information System Concepts: An In-depth Analysis.
-
-
Iivari, J.1
-
93
-
-
0001214077
-
A Paradigmatic Analysis of Contemporary Schools of IS Development
-
Iivari, J. (1991). “A Paradigmatic Analysis of Contemporary Schools of IS Development,” European Journal of Information Systems, Vol. 1, No. 4, pp. 249–272.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.4
, pp. 249-272
-
-
Iivari, J.1
-
94
-
-
0030286609
-
Analyzing Information Systems Development: A Comparison and Analysis of Eight IS Development Approaches
-
Iivari, J. and Hirschheim, R. (1996). “Analyzing Information Systems Development: A Comparison and Analysis of Eight IS Development Approaches,” Information Systems, Vol. 21, No. 7, pp. 551–575.
-
(1996)
Information Systems
, vol.21
, Issue.7
, pp. 551-575
-
-
Iivari, J.1
Hirschheim, R.2
-
95
-
-
0032334755
-
A Paradigmatic Analysis of Contrasting Information Systems Development Approaches and Methodologies
-
Iivari, J., Hirschheim, R., and Klein, H. K. (1998). “A Paradigmatic Analysis of Contrasting Information Systems Development Approaches and Methodologies,” Information Systems Research, Vol. 9, No. 2, pp. 164–193.
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 164-193
-
-
Iivari, J.1
Hirschheim, R.2
Klein, H.K.3
-
96
-
-
0034434529
-
A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches
-
Iivari, J., Hirschheim, R., and Klein, H. K. (2001). “A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches,” Journal of Management Information Systems, Vol. 17 No. 3, pp. 179–218.
-
(2001)
Journal of Management Information Systems
, vol.17
, Issue.3
, pp. 179-218
-
-
Iivari, J.1
Hirschheim, R.2
Klein, H.K.3
-
97
-
-
0006763640
-
Secure Mobile IP Using Security Primitives
-
Inoue, A., Ishiyama, M., Fukumoto, A., and Okamoto, T. (1997). “Secure Mobile IP Using Security Primitives,” Proceedings of the Sixth IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
-
(1997)
Proceedings of the Sixth IEEE Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
-
-
Inoue, A.1
Ishiyama, M.2
Fukumoto, A.3
Okamoto, T.4
-
99
-
-
0026255444
-
A Uniform Presentation of Confidentiality Properties
-
Jacob, J. (1991). “A Uniform Presentation of Confidentiality Properties,” IEEE Transactions on Software Engineering, Vol. 17, No. 1, pp. 1186–1194.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.1
, pp. 1186-1194
-
-
Jacob, J.1
-
100
-
-
19944386389
-
Solutions to the Polyinstantiation Problem
-
Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Los Alamitos, CA: IEEE Computer Society Press
-
Jajodia S., Sandhu, R. S., and Blaustein B. T. (1995). “Solutions to the Polyinstantiation Problem,” in Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Information Security, An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press.
-
(1995)
Information Security, An Integrated Collection of Essays
-
-
Jajodia, S.1
Sandhu, R.S.2
Blaustein, B.T.3
-
102
-
-
0033078725
-
Steganography: The Art of Hiding Information in Plain Sight
-
IEEE
-
Jamil, T. (1999). “Steganography: The Art of Hiding Information in Plain Sight,” IEEE Potentials, Vol. 18, Is.1, pp. 10–12.
-
(1999)
Potentials
, vol.18
, Issue.1
, pp. 10-12
-
-
Jamil, T.1
-
103
-
-
0024771499
-
Survey of Password Mechanisms: Weaknesses and Potential Improvements, Part 1
-
Jobush, D. L. and Oldehoeft, A. E. (1989). “Survey of Password Mechanisms: Weaknesses and Potential Improvements, Part 1,” Computers & Security, Vol. 8, pp. 587–604.
-
(1989)
Computers & Security
, vol.8
, pp. 587-604
-
-
Jobush, D.L.1
Oldehoeft, A.E.2
-
104
-
-
0031996445
-
Exploring Steganography: Seeing the Unseen
-
Johnson, N. F. and Jajodia, S. (1998). “Exploring Steganography: Seeing the Unseen,” IEEE Computer, Vol. 31, No. 2, pp. 26–34.
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
106
-
-
3943088348
-
A Security Model for Aglets
-
Karjoth, G., Lange, D. B., and Oshima, M. (1997). “A Security Model for Aglets,” IEEE Internet Computing, Vol. 1, Is.4, pp. 68–77.
-
(1997)
IEEE Internet Computing
, vol.1
, Issue.4
, pp. 68-77
-
-
Karjoth, G.1
Lange, D.B.2
Oshima, M.3
-
107
-
-
84976667065
-
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
-
Kemmerer, R. A. (1983). “Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels,” ACM Transaction on Computer Systems, Vol. 1, No. 3, pp. 256–277.
-
(1983)
ACM Transaction on Computer Systems
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.A.1
-
108
-
-
0026260664
-
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
-
Kemmerer, R.A. and Porras, P.A. (1991). “Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels,” IEEE Transactions on Software Engineering, Vol. 17, No. 11, pp. 1166–1185.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.11
, pp. 1166-1185
-
-
Kemmerer, R.A.1
Porras, P.A.2
-
110
-
-
0029547159
-
A Methodology for the Design of Security Plans
-
Koning, W. and Fred. D. (1995). “A Methodology for the Design of Security Plans,” Computers & Security, Vol. 14, No. 7, pp. 633–643.
-
(1995)
Computers & Security
, vol.14
, Issue.7
, pp. 633-643
-
-
Koning, W.1
Fred, D.2
-
111
-
-
8744316661
-
Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students
-
th International Conference on Information Systems Security
-
th International Conference on Information Systems Security.
-
(1990)
IFIP TC11
-
-
Kowalski, S.1
-
112
-
-
0032182009
-
Authenticated Exchange Protocols Resistant to Password Guessing Attacks
-
Is.5
-
Kwon, T. and Son, J. (1998). “Authenticated Exchange Protocols Resistant to Password Guessing Attacks,” IEE Proceedings of Communication, Vol. 145, Is.5.
-
(1998)
IEE Proceedings of Communication
, vol.145
-
-
Kwon, T.1
Son, J.2
-
113
-
-
0031371661
-
A Software Platform for Secure Applications Based on CORBA
-
Kyeongbeom, K., Youngkyun K., Youngkee S., and Soran, I. (1997). “A Software Platform for Secure Applications Based on CORBA,” Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems.
-
(1997)
Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems.
-
-
Kyeongbeom, K.1
Youngkyun, K.2
Youngkee, S.3
Soran, I.4
-
115
-
-
85008539344
-
Biometrics: A New Era in Security
-
Lawton, G. (1998). “Biometrics: A New Era in Security,” IEEE Computer, Vol. 31, No. 8, pp. 16–18.
-
(1998)
IEEE Computer
, vol.31
, Issue.8
, pp. 16-18
-
-
Lawton, G.1
-
118
-
-
85024277184
-
Harmonization of Information Security Requirements
-
Leiwo, J., Gamage, C., and Zheng, Y. (1999). “Harmonization of Information Security Requirements,” Informatica, Vol. 17.
-
(1999)
Informatica
, vol.17
-
-
Leiwo, J.1
Gamage, C.2
Zheng, Y.3
-
121
-
-
0029545652
-
A New Model for Information Security Policies
-
Lindup, K. R. (1995). “A New Model for Information Security Policies,” Computer & Security, Vol. 14, No. 8, pp. 691–695.
-
(1995)
Computer & Security
, vol.14
, Issue.8
, pp. 691-695
-
-
Lindup, K.R.1
-
122
-
-
0032000456
-
Firewalls Fend Off Invasions from the Net
-
Lodin, S. W. and Schuba, C. L. (1998). “Firewalls Fend Off Invasions from the Net,” IEEE Spectrum, Vol. 35, Is.2, pp. 26–34.
-
(1998)
IEEE Spectrum
, vol.35
, Issue.2
, pp. 26-34
-
-
Lodin, S.W.1
Schuba, C.L.2
-
124
-
-
0001935749
-
A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations
-
Boland, R.J., and Hirscheim, R.A. (Eds.), Hoboken, NJ: John Wiley & Sons Ltd
-
Lyytinen, K. (1987). “A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations,” in Boland, R.J., and Hirscheim, R.A. (Eds.), Critical Issues in Information Systems Research, Hoboken, NJ: John Wiley & Sons Ltd.
-
(1987)
Critical Issues in Information Systems Research
-
-
Lyytinen, K.1
-
125
-
-
0029537737
-
Design and Natural Science Research on Information Technology
-
March, S. T. and Smith, G. F. (1995). “Design and Natural Science Research on Information Technology,” Decision Support Systems, Vol. 15, pp. 251–266.
-
(1995)
Decision Support Systems
, vol.15
, pp. 251-266
-
-
March, S.T.1
Smith, G.F.2
-
126
-
-
0030645532
-
Blocking Java Applets at the Firewall
-
IEEE Computer Society Press
-
Martin, D. M., Rajagopalan, S., and Rubun, A. D. (1997). “Blocking Java Applets at the Firewall,” Proceedings of the 1997 Symposium on Network and Distributed System Security, IEEE Computer Society Press.
-
(1997)
Proceedings of the 1997 Symposium on Network and Distributed System Security
-
-
Martin, D.M.1
Rajagopalan, S.2
Rubun, A.D.3
-
127
-
-
73549114871
-
Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behaviour
-
Mathieson, K. (1991). “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behaviour,” Information System Research, Vol. 3, No. 2, pp. 173–191.
-
(1991)
Information System Research
, vol.3
, Issue.2
, pp. 173-191
-
-
Mathieson, K.1
-
128
-
-
0025211594
-
The Specification and Modelling of Computer Security
-
McLean, J. (1990). “The Specification and Modelling of Computer Security,” IEEE Computer, Vol. 23, IS.1, pp. 9–16.
-
(1990)
IEEE Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
129
-
-
85024272065
-
Information Security Awareness-Selling the Cause
-
Gable, G., et al. (Eds.), Singapore
-
McLean, K. (1992). “Information Security Awareness-Selling the Cause,” in Gable, G., et al. (Eds.), Security and Control: From Small Systems to Large, Proceedings of the IFIP TC11 /SEC’92, Singapore, pp. 27–29.
-
(1992)
Security and Control: From Small Systems to Large, Proceedings of the IFIP TC11 /SEC’92
, pp. 27-29
-
-
McLean, K.1
-
130
-
-
84944878354
-
-
Boca Raton, FL: CRC Press
-
Menezes, A. J., van Oorschot, P. C. and Vanstone, S. C. (1999). Handbook of Applied Cryptography, Boca Raton, FL: CRC Press.
-
(1999)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.C.3
-
132
-
-
84936893490
-
Vital Signs of Identity
-
Miller, B. (1994). “Vital Signs of Identity,” IEEE Spectrum, Vol. 31, Is.2, pp. 22–30.
-
(1994)
IEEE Spectrum
, vol.31
, Issue.2
, pp. 22-30
-
-
Miller, B.1
-
133
-
-
0028397595
-
Authentication of Mobile Users
-
Molva, R., Samfat, D., and Tsudik, G. (1994). “Authentication of Mobile Users,” IEEE Network, Vol. 8, Is.2, pp. 26–34.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
134
-
-
0030386217
-
Electronic Communications Risk Management: A Checklist for Business Managers
-
Moulton, R. T. and Moulton, M. E. (1996). “Electronic Communications Risk Management: A Checklist for Business Managers,” Computer & Security, Vol. 15, No. 5.
-
(1996)
Computer & Security
, vol.15
, Issue.5
-
-
Moulton, R.T.1
Moulton, M.E.2
-
135
-
-
0028566761
-
Covert Channels - Here to Stay?
-
Moskowitz, I. S. and Kang, M. H. (1994). “Covert Channels - Here to Stay?” Proceedings of the Ninth Annual Conference on Computer Assurance (COMPASS ‘94) Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security.
-
(1994)
Proceedings of the Ninth Annual Conference on Computer Assurance (COMPASS ‘94) Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security.
-
-
Moskowitz, I.S.1
Kang, M.H.2
-
136
-
-
33747065104
-
Authentication
-
Anderson, T. (Ed.), Blackwell Scientific Publications
-
Needham, R. M. (1989). “Authentication,” in Anderson, T. (Ed.), Safe & Secure Computing Systems, Blackwell Scientific Publications, pp. 189–196.
-
(1989)
Safe & Secure Computing Systems
, pp. 189-196
-
-
Needham, R.M.1
-
137
-
-
8744247022
-
Science and Epistemic Values
-
Niiniluoto, I. (1990). “Science and Epistemic Values,” Science Studies, Vol. 3, No. 1, pp. 21–26.
-
(1990)
Science Studies
, vol.3
, Issue.1
, pp. 21-26
-
-
Niiniluoto, I.1
-
138
-
-
48249114894
-
Architectures for MLS Database Management Systems
-
Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Los Alamitos, CA: IEEE Computer Society Press
-
Notargiacomo, L. (1995). “Architectures for MLS Database Management Systems,” in Abrams, M.D., Jajodia, S., and Podell, H.J. (Eds.), Information Security, An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press.
-
(1995)
Information Security, An Integrated Collection of Essays
-
-
Notargiacomo, L.1
-
139
-
-
70449971099
-
Systems Development in Information Systems Research
-
Nunamaker, J. F., Chen, M., and Purdin, T.D.M. (1991). “Systems Development in Information Systems Research,” Journal of Management Information Systems, Vol. 7, No. 3, pp. 89–106.
-
(1991)
Journal of Management Information Systems
, vol.7
, Issue.3
, pp. 89-106
-
-
Nunamaker, J.F.1
Chen, M.2
Purdin, T.D.M.3
-
144
-
-
0003356319
-
Database Security
-
Yovits, M.C. (Ed.), Academic Press
-
Pernul, G. (1994). “Database Security,” Advances in Computers, Vol. 38, Yovits, M.C. (Ed.), Academic Press.
-
(1994)
Advances in Computers
, vol.38
-
-
Pernul, G.1
-
146
-
-
0032124052
-
Modeling Data Secrecy and Integrity
-
Pernul, G., Tjoa A. M., and Winiwarter, W. (1998). “Modeling Data Secrecy and Integrity,” Data & Knowledge Engineering, Vol. 26, pp. 291–308.
-
(1998)
Data & Knowledge Engineering
, vol.26
, pp. 291-308
-
-
Pernul, G.1
Tjoa, A.M.2
Winiwarter, W.3
-
147
-
-
0031360409
-
First Steps Towards a European Union Policy on the Securing of Electronic Communications
-
Pounder, C. (1997). “First Steps Towards a European Union Policy on the Securing of Electronic Communications,” Computers & Security, Vol. 16, Is.7, pp. 590–594.
-
(1997)
Computers & Security
, vol.16
, Issue.7
, pp. 590-594
-
-
Pounder, C.1
-
148
-
-
0001214789
-
A Methodology for Testing Intrusion Detection Systems
-
Puketza, N. J., Zhang, K., Chung, M., Mukherjee, B., and Olsson, R.A. (1996). “A Methodology for Testing Intrusion Detection Systems,” IEEE Transactions on Software Engineering, Vol. 22, Is.10, pp. 719–729.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.10
, pp. 719-729
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
149
-
-
84944291851
-
Overview of the GSM System and Protocol Architecture
-
Rahnema, M. (1993). “Overview of the GSM System and Protocol Architecture,” IEEE Communications Magazine, pp. 92–100.
-
(1993)
IEEE Communications Magazine
, pp. 92-100
-
-
Rahnema, M.1
-
151
-
-
85024290113
-
Modeling Security in Distributed Systems
-
Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Elsevier Science Publishers
-
Rieß, H. P. (1991). “Modeling Security in Distributed Systems,” in Dittrich, K., Rautakivi, S., and Saari, J. (Eds.), Computer Security and Information Integrity, Elsevier Science Publishers.
-
(1991)
Computer Security and Information Integrity
-
-
Rieß, H.P.1
-
152
-
-
0032164210
-
A Survey of Web Security
-
September
-
Rubin, A. W. and Geer, D. E. (1998). “A Survey of Web Security,” IEEE Computer, September, pp. 34–41.
-
(1998)
IEEE Computer
, pp. 34-41
-
-
Rubin, A.W.1
Geer, D.E.2
-
156
-
-
84986105989
-
Information Security in Business Environments
-
Sanderson, E. and Forcht, K. (1996). “Information Security in Business Environments,” Computers & Security, Vol. 15, Is.4, pp. 321–322.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 321-322
-
-
Sanderson, E.1
Forcht, K.2
-
157
-
-
0031341651
-
The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline
-
Fairfax, VA: ACM Press
-
Sandhu, R., Bhamidipati, V., Coyne, E., Ganta, S., and Youman, C. (1997). “The ARBAC97 Model for Role-Based Administration of Roles: Preliminary Description and Outline,” Proceedings of the Second ACM Workshop on Role-Based Access Control, Fairfax, VA: ACM Press.
-
(1997)
Proceedings of the Second ACM Workshop on Role-Based Access Control
-
-
Sandhu, R.1
Bhamidipati, V.2
Coyne, E.3
Ganta, S.4
Youman, C.5
-
158
-
-
0023999796
-
The Schematic Protection Model: Its Definition and Analysis of Acyclic Attenuation Schemes
-
Sandhu, R. S. (1988). “The Schematic Protection Model: Its Definition and Analysis of Acyclic Attenuation Schemes,” Journal of the ACM, No. 2, pp. 404–432.
-
(1988)
Journal of the ACM
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
160
-
-
0027699087
-
Lattice-based Access Controls
-
Sandhu, R. S. (1993). “Lattice-based Access Controls,” IEEE Computer, Vol. 26, No. 11, pp. 9–19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
161
-
-
0000052619
-
Authentication, Access Control, and Audit
-
Sandhu, R. and Samarati, P. (1996). “Authentication, Access Control, and Audit,” ACM Computing Surveys, Vol. 28, No. 1.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
-
-
Sandhu, R.1
Samarati, P.2
-
162
-
-
0030086382
-
Role-based Access Control Models
-
Sandhu, R. S., Coyne, E. J., Feinstaein, H.L., and Youman, C. E. (1996). “Role-based Access Control Models,” IEEE Computer, Vol. 29, Is.2, pp. 38–47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstaein, H.L.3
Youman, C.E.4
-
163
-
-
19344364618
-
Role-Based Access Control
-
Academic Press
-
Sandhu, R. (1998). “Role-Based Access Control,” Advances in Computers, Vol. 46, Academic Press.
-
(1998)
Advances in Computers
, vol.46
-
-
Sandhu, R.1
-
164
-
-
0018705007
-
Symmetric and Asymmetric Encryption
-
Simmons, G. J. (1979). “Symmetric and Asymmetric Encryption,” ACM Computing Surveys, Vol. 11, No. 4, pp. 305–330.
-
(1979)
ACM Computing Surveys
, vol.11
, Issue.4
, pp. 305-330
-
-
Simmons, G.J.1
-
165
-
-
0024015453
-
A Survey of Information Authentication
-
Invited Paper
-
Simmons, G. J. (1988). “A Survey of Information Authentication,” Invited Paper, Proceedings of the IEEE, Vol. 76, Is. 5, pp. 603–620.
-
(1988)
Proceedings of the IEEE
, vol.76
, Issue.5
, pp. 603-620
-
-
Simmons, G.J.1
-
166
-
-
0033683516
-
A Conceptual Foundation for Organizational Information Security Awareness
-
Siponen, M. T. (2000a). “A Conceptual Foundation for Organizational Information Security Awareness. Information Management & Computer Security, Vol. 8, Is.1, pp. 31–41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
169
-
-
0029214917
-
Business Continuity Planning
-
Smith, M. and Sherwood, J. (1995). “Business Continuity Planning,” Computers & Security, Vol. 14, No. 1, pp. 14–23.
-
(1995)
Computers & Security
, vol.14
, Issue.1
, pp. 14-23
-
-
Smith, M.1
Sherwood, J.2
-
170
-
-
85024265024
-
Computer Viruses
-
Denning, D. E., and Denning, P. J. (Eds.), New York: ACM Press
-
Spafford, E. G. (1998). “Computer Viruses,” in Denning, D. E., and Denning, P. J. (Eds.), Internet Besieged: Countering Cyberspace Scofflaws, New York: ACM Press, pp. 73–95.
-
(1998)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 73-95
-
-
Spafford, E.G.1
-
173
-
-
85024270902
-
The Model
-
v2.0
-
SSE-CMM (1999a). “The Model,” v2.0. http://www.sse-cmm.org.
-
(1999)
-
-
-
174
-
-
85024259903
-
The Appraisal Method
-
v2.0
-
SSE-CMM (1999b). “The Appraisal Method,” v2.0.http://www.sse-cmm.org.
-
(1999)
-
-
-
175
-
-
77956943231
-
Identifying Information Security Threats
-
Stacey, T. R., Helsley, R. E., and Baston, J. V. (1996). “Identifying Information Security Threats,” Information Systems Security, Vol. 5, No. 3, pp. 50–59.
-
(1996)
Information Systems Security
, vol.5
, Issue.3
, pp. 50-59
-
-
Stacey, T.R.1
Helsley, R.E.2
Baston, J.V.3
-
176
-
-
85024290029
-
An Introduction to IPSEC
-
Krause, M., and Tipton, H.F. (Eds.), Auerbach
-
Stackpole, B. (1999). “An Introduction to IPSEC,” in Krause, M., and Tipton, H.F. (Eds.), Handbook of Information Security Management, Auerbach, pp. 387–399.
-
(1999)
Handbook of Information Security Management
, pp. 387-399
-
-
Stackpole, B.1
-
179
-
-
0000280419
-
Effective IS Security: An Empirical Study
-
Straub, D. W. (1990). “Effective IS Security: An Empirical Study,” Information System Research, Vol. 1, No. 2, pp. 255–277.
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
180
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
-
Straub, D. W. and Welke, R. J. (1998). “Coping with Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly, Vol. 22, No. 4, p. 441–464.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
183
-
-
0242517401
-
Information Security Awareness: Educating Our Users Effectively
-
Thomson, M. E. and von Solms, R. (1998). “Information Security Awareness: Educating Our Users Effectively,” Information Management & Computer Security, Vol. 6, No. 4, pp. 167–173.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
185
-
-
0031353652
-
An Approach for Mobile Agent Security and Fault Tolerance Using Distributed Transactions
-
IEEE Computer Society Press
-
Vogler, H., Kunkelmann, T., and Moschgath, M.L. (1997). “An Approach for Mobile Agent Security and Fault Tolerance Using Distributed Transactions,” Proceedings of the 1997 International Conference on Parallel and Distributed Systems, IEEE Computer Society Press.
-
(1997)
Proceedings of the 1997 International Conference on Parallel and Distributed Systems
-
-
Vogler, H.1
Kunkelmann, T.2
Moschgath, M.L.3
-
186
-
-
0032760474
-
Protecting Digitalimage Copyrights: A Framework
-
Voyatzis, G. and Pitas, I. (1999). “Protecting Digitalimage Copyrights: A Framework,” IEEE Computer Graphics and Applications, Vol. 19, No. 1, pp. 18–25.
-
(1999)
IEEE Computer Graphics and Applications
, vol.19
, Issue.1
, pp. 18-25
-
-
Voyatzis, G.1
Pitas, I.2
-
189
-
-
0026630927
-
Authentication for Distributed Systems
-
January
-
Woo, T. Y. C. and Lam, S. S. (1992). “Authentication for Distributed Systems,” IEEE Computer, January.
-
(1992)
IEEE Computer
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
190
-
-
0018704373
-
Authorization in Multilevel Database Models
-
Wood, C., Summers, R.C., and Fernandez, E.B. (1979). “Authorization in Multilevel Database Models,” Information Systems, Vol. 4, No. 2, pp. 155–163.
-
(1979)
Information Systems
, vol.4
, Issue.2
, pp. 155-163
-
-
Wood, C.1
Summers, R.C.2
Fernandez, E.B.3
-
191
-
-
1142280536
-
-
Hoboken, NJ: John Wiley & Sons
-
Wood, C. C., Banks, W. W., Guarro, S. B., Garcia, A. A., Hampel, V. E., and Sartorio, H. P. (1987). Computer Security: A Comprehensive Controls Checklist, Hoboken, NJ: John Wiley & Sons.
-
(1987)
Computer Security: A Comprehensive Controls Checklist
-
-
Wood, C.C.1
Banks, W.W.2
Guarro, S.B.3
Garcia, A.A.4
Hampel, V.E.5
Sartorio, H.P.6
-
192
-
-
84993043234
-
A Policy for Sending Secret Information Over Communications Networks
-
Wood, C. C. (1996). “A Policy for Sending Secret Information Over Communications Networks,” Information Management & Computer Security, Vol. 4, No. 3.
-
(1996)
Information Management & Computer Security
, vol.4
, Issue.3
-
-
Wood, C.C.1
-
193
-
-
0032754443
-
Watermarking 3D Objects for Verification
-
Yeo, B. L. and Yeung, M. M. (1999). “Watermarking 3D Objects for Verification.” IEEE Computer Graphics and Applications, Vol. 19, No. 1, pp. 36–46.
-
(1999)
IEEE Computer Graphics and Applications
, vol.19
, Issue.1
, pp. 36-46
-
-
Yeo, B.L.1
Yeung, M.M.2
-
195
-
-
0031654931
-
Multiple Intelligent Agent Supported Internet Security System: Issues, Current Solutions, and a Proposed Approach
-
Zeng, L., Wamg, H., Lee, M.K.O. (1997). “Multiple Intelligent Agent Supported Internet Security System: Issues, Current Solutions, and a Proposed Approach,” Proceedings of the 1997 IEEE International Conference on Intelligent Processing Systems (ICIPS’97).
-
(1997)
Proceedings of the 1997 IEEE International Conference on Intelligent Processing Systems (ICIPS’97).
-
-
Zeng, L.1
Wamg, H.2
Lee, M.K.O.3
-
197
-
-
0031163948
-
Secure Code Distribution
-
Zhang, X. N. (1997). “Secure Code Distribution,” IEEE Computer, Vol. 30, Is.6, pp. 76–79.
-
(1997)
IEEE Computer
, vol.30
, Issue.6
, pp. 76-79
-
-
Zhang, X.N.1
-
199
-
-
0003369812
-
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
-
Zviran, M. and Haga, W. J. (1993). “A Comparison of Password Techniques for Multilevel Authentication Mechanisms,” The Computer Journal, Vol. 36, No. 3, pp. 227–237.
-
(1993)
The Computer Journal
, vol.36
, Issue.3
, pp. 227-237
-
-
Zviran, M.1
Haga, W.J.2
|