Combatting Insider Threats
暂无分享,去创建一个
[1] Peter G. Neumann,et al. Computer-related risks , 1994 .
[2] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[3] Virgil D. Gligor,et al. Design and Implementation of Secure Xenix , 1987, IEEE Transactions on Software Engineering.
[4] Marti A. Hearst,et al. Building reliable voting machine software , 2007 .
[5] F. J. Corbató,et al. On building systems that will fail , 1991, CACM.
[6] Carrie Gates,et al. We have met the enemy and he is us , 2009, NSPW '08.
[7] Carl E. Landwehr,et al. A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .
[8] Matt Bishop. Position: "insider" is relative , 2005, NSPW '05.
[9] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[10] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[11] Peter G. Neumann,et al. Reflections on systems trustworthiness , 2007, Adv. Comput..
[12] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[13] Paul A. Karger,et al. Limiting the Damage Potential of Discretionary Trojan Horses , 1987, 1987 IEEE Symposium on Security and Privacy.
[14] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[15] Salvatore J. Stolfo,et al. Insider Attack and Cyber Security - Beyond the Hacker , 2008, Advances in Information Security.
[16] Virgil D. Gligor,et al. On the Design and the Implementation of Secure Xenix Workstations , 1986, 1986 IEEE Symposium on Security and Privacy.
[17] Leonard S. Zegans. The psychology of risks , 2008, CACM.
[18] Jerome H. Saltzer,et al. Chapter 1 – Systems , 2009 .
[19] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[20] P. G. Neumann,et al. A general-purpose file system for secondary storage , 1965, Published in AFIPS '65 (Fall, part I).