Information system defences: A preliminary classification scheme
- 1 January 1997
- journal article
- Published by Elsevier in Computers & Security
- Vol. 16 (2) , 94-114
- https://doi.org/10.1016/s0167-4048(97)88289-2
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Intrusion detection: Its role and validationComputers & Security, 1992
- Security problems in the TCP/IP protocol suiteACM SIGCOMM Computer Communication Review, 1989
- A new technique for generating protocol testACM SIGCOMM Computer Communication Review, 1985
- The Best Available Technologies for Computer SecurityComputer, 1983
- CRYPTANALYST'S CORNERCryptologia, 1978
- Protection in operating systemsCommunications of the ACM, 1976
- A lattice model of secure information flowCommunications of the ACM, 1976
- A note on the confinement problemCommunications of the ACM, 1973
- On The Advantages of Tagged ArchitectureIEEE Transactions on Computers, 1973
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949