A comment on the `basic security theorem' of Bell and LaPadula
Information Processing Letters
Validation of ultrahigh dependability for software-based systems
Communications of the ACM
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
Protection in operating systems
Communications of the ACM
Mechanizing proof: computing, risk, and trust
Mechanizing proof: computing, risk, and trust
The Infeasibility of Quantifying the Reliability of Life-Critical Real-Time Software
IEEE Transactions on Software Engineering
Thirty Years Later: Lessons from the Multics Security Evaluation
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
A Generic Approach to Structuring and Implementing Complex Fault-Tolerant Software
ISORC '02 Proceedings of the Fifth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
BLACKER: Security for the DDN, Examples of A1 Security Engineering Trades
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Looking Back at the Bell-La Padula Model
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
IEEE Security and Privacy
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Analysis of the Intel Pentium's ability to support a secure virtual machine monitor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The Grand Theory of Everything: what man-made systems are, and why they fail
ACM SIGSOFT Software Engineering Notes
IEEE Security and Privacy
Designing and implementing malicious hardware
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Cloaker: Hardware Supported Rootkit Concealment
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
BootJacker: compromising computers using forced restarts
Proceedings of the 15th ACM conference on Computer and communications security
Software maturity: design as dark art
ACM SIGSOFT Software Engineering Notes
Case Studies of an Insider Framework
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Cybercrime 2.0: when the cloud turns dark
Communications of the ACM - A Direct Path to Dependable Software
Communications of the ACM - Security in the Browser
Lest we remember: cold-boot attacks on encryption keys
Communications of the ACM - Security in the Browser
Privacy and security: Answering the wrong questions is no answer
Communications of the ACM - One Laptop Per Child: Vision vs. Reality
We have met the enemy and he is us
Proceedings of the 2008 workshop on New security paradigms
IEEE Spectrum
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Point-and-shoot security design: can we build better tools for developers?
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
This paper studies computer security from first principles. The basic questions "Why?", "How do we know what we know?" and "What are the implications of what we believe?"