CE Landwehr, AR Bull, JP McDermott… - ACM Computing Surveys …, 1994 - dl.acm.org
An organized record of actual flaws can be useful to computer system designers, … for computer programsecurity flaws, with an Appendix that documents 50 actual security flaws. These …
CE Landwehr - International journal of information security, 2001 - Springer
A strong factor in the early development of computers was security – the computations that motivated their development, such as decrypting intercepted messages, generating gunnery …
RC Summers - IBM Systems Journal, 1984 - ieeexplore.ieee.org
… to protect computing systems and the information they maintain … security measures, then list possible strategies for computer … and operating systems to protect programs and data. We …
… handbook of computer and informationsecurity provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, …
… reasoning about the security of such programs. This … information-flow security of interactive imperative programs. Our model achieves a clean separation of user behavior from program …
DK Hsiao, DS Kerr, SE Madnick - 2014 - books.google.com
… The Office of Naval Research program in computersecurity has had the objective, not simply of ensuring the integrity of stored data, but also of encouraging information sharing by …
… Security, another book in our computersecurity series, reviewed parts of the book and contributed valuable information. … government standards and programs detailed later in this book. …
T Bacon, R Tikekar - Journal of Computing Sciences in Colleges, 2003 - Citeseer
… of creating a computersecurity and information assurance (CSIA) … computersecurity program in 2001 was a masters program at Oregon State University [13]. More computersecurity …
… We can rule out Passl by recognizing all local program variables as objects, assigning a security level to A that will prevent Passl from simultaneously having either read access to F1 …