Security and dependability: then and now
暂无分享,去创建一个
[1] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[2] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[3] Lora Kassab,et al. Towards Fault-Tolerant Mobile Agents , 1998 .
[4] Guy L. Steele,et al. The Java Language Specification , 1996 .
[5] Jonathan K. Millen. Local reconfiguration policies , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] Michael K. Reiter,et al. Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[9] J. Froscher,et al. Practical Defenses Against Storage Jamming , 1997 .
[10] Jeffrey M. Voas,et al. Agent Trustworthiness , 1998, ECOOP Workshops.
[11] Andrew P. Moore,et al. Design and Assurance Strategy for the NRL Pump , 1998, Computer.
[12] Carleen Maitland,et al. Trust in cyberspace , 2000 .
[13] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[14] John P. McDermott,et al. Doc, Wyatt, and Virgil: prototyping storage jamming defenses , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[15] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[16] Catherine A. Meadows,et al. Applying the dependability paradigm to computer security , 1995, Proceedings of 1995 New Security Paradigms Workshop.