A Taxonomy of UNIX System and Network Vulnerabilities

作者: Matt Bishop

DOI:

关键词:

摘要:

参考文章(13)
Matt Bishop, Analyzing the security of an existing computer system fall joint computer conference. pp. 1115- 1119 ,(1986) , 10.5555/324493.325066
Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, A Taxonomy of Computer Program Security Flaws, with Examples Defense Technical Information Center. ,(1994) , 10.21236/ADA465587
B. Hebbard, P. Grosso, T. Baldridge, C. Chan, D. Fishman, P. Goshgarian, T. Hilton, J. Hoshen, K. Hoult, G. Huntley, M. Stolarchuk, L. Warner, A penetration analysis of the Michigan Terminal System ACM SIGOPS Operating Systems Review. ,vol. 14, pp. 7- 20 ,(1980) , 10.1145/850693.850694
Dorothy E. Denning, An Intrusion-Detection Model ieee symposium on security and privacy. pp. 118- 118 ,(1986) , 10.1109/SP.1986.10010
C. Richard Attanasio, Peter W. Markstein, Ray J. Phillips, None, Penetrating an operating system: a study of VM/370 integrity IBM Systems Journal. ,vol. 15, pp. 102- 116 ,(1976) , 10.1147/SJ.151.0102
Richard R. Linde, Operating system penetration Proceedings of the May 19-22, 1975, national computer conference and exposition on - AFIPS '75. pp. 361- 368 ,(1975) , 10.1145/1499949.1500018
A. L. Wilkinson, D. H. Anderson, D. P. Chang, Lee Hock Hin, A. J. Mayo, I. T. Viney, R. Williams, W. Wright, A penetration analysis of a Burroughs Large System Operating Systems Review. ,vol. 15, pp. 14- 25 ,(1981) , 10.1145/1041454.1041455
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems Proceedings of the IEEE. ,vol. 63, pp. 1278- 1308 ,(1975) , 10.1109/PROC.1975.9939