Fundamentals of Computer Security Technology

1994 
Threats to computer systems threat trees categorization of attacks Trojan horses and viruses common attack methods security labels the lattice of security labels security policies the Bell-Lapadula disclosure model BLM analysis and debate non-deductibility and non-interference security the Biba integrity model the Clark-Wilson integrity model denial of service safeguards and countermeasures auditing intrusion detection identification and authentication passwords encryption key management protocols access control covert channels composing security privileges and roles security kernels network security database security security evaluation greatest works in computer security.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    314
    Citations
    NaN
    KQI
    []