On the implications of computer viruses and methods of defense
暂无分享,去创建一个
[1] J. B. Gunn. Use of virus functions to provide a virtual APL interpreter under user control , 1984 .
[2] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[3] C T Dinardo,et al. Computers and security , 1986 .
[4] Fred Cohen. Designing provably correct information networks with digital diodes , 1988, Comput. Secur..
[5] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[6] Gerald J. Popek,et al. UCLA Secure UNIX , 1899 .
[7] B. D. GOLD,et al. A security retrofit of VM/370 , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[8] E. J. McCAULEY,et al. KSOS—The design of a secure operating system* , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[9] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[10] Lewis Bertrand,et al. S. D. N. , 1936 .
[11] Fred Cohen. A cryptographic checksum for integrity protection , 1987, Comput. Secur..
[12] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[13] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[14] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[15] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[16] Maria M. Pozzo,et al. An approach to containing computer viruses , 1987, Comput. Secur..
[17] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[18] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[19] Brian Randell,et al. System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.
[20] Richard R. Linde,et al. Operating system penetration , 1975, AFIPS '75.
[21] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[22] Liming Chen. Improving software reliability by n-version programming. , 1978 .
[23] A. Tanenbaum. Computer recreations , 1973 .
[24] Fred Cohen,et al. Design and protection of an information network under a partial ordering: A case study , 1987, Comput. Secur..
[25] Fred Cohe. Protection and administration of information networks with partial orderings , 1987, Comput. Secur..
[26] E. J. McCauley,et al. KSOS - The design of a secure operating system , 1899 .
[27] Carl E. Landwehr. The Best Available Technologies for Computer Security , 1983, Computer.
[28] Fred Cohen. A secure computer network design , 1985, Comput. Secur..
[29] Esther H. Highland. Computer systems under siege , 1988 .
[30] William Hugh Murray,et al. The application of epidemiology to computer viruses , 1988, Comput. Secur..
[31] Lance J. Hoffman,et al. Impacts of information system vulnerabilities on society , 1899, AFIPS '82.
[32] Fred Cohen,et al. Two secure file servers , 1988, Comput. Secur..
[33] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[34] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[35] Fred Cohen,et al. Design and administration of distributed and hierarchical information networks under partial orderings , 1987, Comput. Secur..
[36] S. Yau,et al. Design of self-checking software , 1975, Reliable Software.