Johnson, 2000 - Google Patents
Problems in computer security for commercial systemsJohnson, 2000
- Document ID
- 84899558080075913
- Author
- Johnson Z
- Publication year
External Links
Snippet
This thesis looks at some of the problems involved in securing a commercial operating system against attack from hostile users. With the increasing complexity of such systems, and their vulnerability when connected to the Internet, it investigates the question,“Can …
- 230000001965 increased 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114978584B (en) | Network security protection security method and system based on unit units | |
Lampson | Computer security in the real world | |
US7398389B2 (en) | Kernel-based network security infrastructure | |
EP0787397B1 (en) | System and method for providing secure internetwork services | |
Ryutov et al. | Integrated access control and intrusion detection for web servers | |
Kesh et al. | A framework for analyzing e‐commerce security | |
US20030177376A1 (en) | Framework for maintaining information security in computer networks | |
Longstaff et al. | Security of the Internet | |
WO2005029249A2 (en) | Secure network system and associated method of use | |
Olovsson | A structured approach to computer security | |
Stefanek | Information security best practices: 205 basic rules | |
Johnson | Problems in computer security for commercial systems | |
Mookhey et al. | Linux: Security, Audit and Control Features | |
Ellis et al. | Security of the Internet | |
Wyatt et al. | Secure Messaging Scenarios with WebSphere MQ | |
Ismail | Instrumentation of an intrusion detection system in a cluster environment | |
Butler | Computer Security in the Real World | |
Allen et al. | Securing Network Servers | |
Terkelsen | Data collection on security flaws caused by design errors | |
Shim | Developing a probabilistic security measure using a software reliability model | |
FIREWALL | MILKYWAY NETWORKS BLACK HOLE FIREWALL | |
Fuller et al. | Fedora Documentation 18 Security Guide | |
Beier et al. | Information system security best practices for UOCAVA-supporting systems | |
Okoronkwo | Survey on the Network Security Incidents | |
Persson | A Comparative Study of Security Features in FreeBSD and OpenBSD |