Liability and Computer Security: Nine Principles
暂无分享,去创建一个
[1] Rainer A. Rueppel,et al. Criticism of ISO CD 11166 Banking: Key Management by Means of Asymmetric Algorithms , 1993 .
[2] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[4] Alexander D. Brooks,et al. The legal issues , 1995 .
[5] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[6] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[7] Abraham Bookstein,et al. Cryptography: A new dimension in computer data security ? and ?. Wiley-Interscience, New York (1982). xxi + 775 pp., $43.95. ISBN 0471-04892-5. , 1985 .
[8] Marie A. Wright. Security controls in ATM systems , 1991 .
[9] Christian Jahl. The information technology security evaluation criteria , 1991, [1991 Proceedings] 13th International Conference on Software Engineering.
[10] Michael McConville,et al. Standing Accused: The Organization and Practices of Criminal Defence Lawyers in Britain , 1994 .