Models and tools for quantitative assessment of operational security
暂无分享,去创建一个
[1] Marc Dacier,et al. Privilege Graph: an Extension to the Typed Access Matrix Model , 1994, ESORICS.
[2] Rangaswamy Jagannathan,et al. SYSTEM DESIGN DOCUMENT: NEXT-GENERATION INTRUSION DETECTION EXPERT SYSTEM (NIDES) , 1993 .
[3] C. Allan Heydon,et al. Processing Visual Specifications of File System Security , 1992 .
[4] Jean Arlat,et al. SURF-2: A program for dependability evaluation of complex hardware and software systems , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.
[5] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[6] Marc Dacier,et al. Quantitative Assessment of Operational Security: Models and Tools * , 1996 .
[7] Peter G. Neumann,et al. IDES: A Progress Report , 1990 .