[图书][B] Computer security

JM Carroll - 2014 - books.google.com
… The protective features peculiar to EDP Security involve measures relating to hardware
or EDP equipment, software or computer programs, and communications if a remote …

A taxonomy of computer program security flaws

CE Landwehr, AR Bull, JP McDermott… - ACM Computing Surveys …, 1994 - dl.acm.org
An organized record of actual flaws can be useful to computer system designers, … for computer
program security flaws, with an Appendix that documents 50 actual security flaws. These …

Computer security

CE Landwehr - International journal of information security, 2001 - Springer
A strong factor in the early development of computers was security – the computations that
motivated their development, such as decrypting intercepted messages, generating gunnery …

An overview of computer security

RC Summers - IBM Systems Journal, 1984 - ieeexplore.ieee.org
… to protect computing systems and the information they maintain … security measures, then
list possible strategies for computer … and operating systems to protect programs and data. We …

[图书][B] Computer and information security handbook

JR Vacca - 2012 - books.google.com
… handbook of computer and information security provides the most complete view of computer
security and privacy available. It offers in-depth coverage of security theory, technology, …

Information-flow security for interactive programs

KR O'Neill, MR Clarkson… - … IEEE Computer Security …, 2006 - ieeexplore.ieee.org
… reasoning about the security of such programs. This … information-flow security of interactive
imperative programs. Our model achieves a clean separation of user behavior from program

[图书][B] Computer security

DK Hsiao, DS Kerr, SE Madnick - 2014 - books.google.com
… The Office of Naval Research program in computer security has had the objective, not
simply of ensuring the integrity of stored data, but also of encouraging information sharing by …

[图书][B] Computer security basics

D Russell, GT Gangemi - 1991 - books.google.com
Security, another book in our computer security series, reviewed parts of the book and
contributed valuable information. … government standards and programs detailed later in this book. …

[PDF][PDF] Experiences with developing a computer security information assurance curriculum

T Bacon, R Tikekar - Journal of Computing Sciences in Colleges, 2003 - Citeseer
… of creating a computer security and information assurance (CSIA) … computer security
program in 2001 was a masters program at Oregon State University [13]. More computer security

The specification and modeling of computer security

J McLean - Computer, 1990 - ieeexplore.ieee.org
… We can rule out Passl by recognizing all local program variables as objects, assigning a
security level to A that will prevent Passl from simultaneously having either read access to F1 …