Windows Access Control Demystified ∗
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[2] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[3] John Dunagan,et al. A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities , 2005, NDSS.
[4] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.
[5] Steven B. Lipner,et al. The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.
[6] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[7] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[8] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[9] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[10] Setuid Demystified , 2002, USENIX Security Symposium.
[11] C. R. Ramakrishnan,et al. Model-Based Analysis of Configuration Vulnerabilities , 2002, J. Comput. Secur..
[12] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[13] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] John DeTreville,et al. Binder, a logic-based security language , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[15] Carl Siechert,et al. Microsoft Windows Security Inside Out for Windows Xp and Windows 2000 , 2002 .
[16] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[17] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[19] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[20] Robert W. Baldwin. Rule Based Analysis of Computer Security , 1987, COMPCON.