Verifying the authentication of an information system user
Computers and Security
Software failure risk: measurement and management
Software failure risk: measurement and management
Multitask Windows NT
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Certification of programs for secure information flow
Communications of the ACM
Hi-index | 0.00 |
The widespread use of personal computers and the growth of end-user computing have introduced a myriad of security concerns. As PC-based information systems become readily available and more individuals become computer literate, the risk of ill-intentioned individuals obtaining unauthorized access to computing resources and violating the secrecy and integrity of data increases significantly. But many of these computer security concerns for PCs remain largely unaddressed [6].