Information system defences: A preliminary classification scheme

被引:7
作者
Cohen, F
机构
[1] Sandia National Laboratories, Livermore, CA 94550
关键词
D O I
10.1016/S0167-4048(97)88289-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes 140 different classes of protective methods gathered from many different sources. Where a single source for a single item is available, it is cited in the text. The most comprehensive sources used are not cited throughout the text but rather listed here (Cohen, 1995 and Neumann, 1995). Other major sources not identified by specific citation are listed here (Bellovin, 1989, 1992; Bishop, 1996; Cheswick, 1994; Cohen, 1991, 1994a; Denning, 1982; Feustal, 1973; Hoffman, 1990; Knight, 1978; Lampson, 1973; Landwehr, 1983; Linde, 1975; Neumann, 1989; Spafford, 1992).
引用
收藏
页码:94 / 114
页数:21
相关论文
共 59 条
[1]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[2]  
[Anonymous], INTEGRITY CONSIDERAT
[3]  
Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
[4]  
BELLOVIN SM, 1992, P 3 US UNIX SEC S BA
[5]  
BISHOP M, 1996, CHECKING RACE CONDIT
[6]  
BOCHMANN GV, 1977, INFORMATION PROCESSI, P229
[7]  
Cheswick WilliamR., 1994, FIREWALLS INTERNET S
[8]  
Cohen F., 1985, Computers & Security, V4, P189, DOI 10.1016/0167-4048(85)90028-8
[9]   PROTECTION AND ADMINISTRATION OF INFORMATION NETWORKS WITH PARTIAL ORDERINGS. [J].
Cohen, Fred .
Computers and Security, 1987, 6 (02) :118-128
[10]  
COHEN F, 1988, THESIS PENNSYLVANIA