Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Bishop, Matt Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 5 reviews    
  Resilience is more than availability
Bishop M., Carvalho M., Ford R., Mayron L.  NSPW 2011 (Proceedings of the 2011 New Security Paradigms Workshop, Marin County, CA, Sep 12-15, 2011) 95-104, 2011.  Type: Proceedings

The definition of terms designed to focus on their technical meaning and thereby clarify specification is the goal of this paper. Three terms--resilient, robust, and survivable--are its focus. It is too bad that the a...
...
Mar 15 2012  
  Insider threats in cyber security
Probst C., Hunker J., Gollmann D., Bishop M., Springer Publishing Company, Incorporated, New York, NY, 2010. 244 pp.  Type: Book (978-1-441971-32-6)

Typically, both technical and popular presses focus on external threats as the major security concern. Thus, it is refreshing to see an advanced technical volume added to the few competing titles on insider threats [1,2,3]....
...
Jan 26 2011  
   Traducement: a model for record security
Walcott T., Bishop M. ACM Transactions on Information and System Security 7(4): 576-590, 2004.  Type: Article

Walcott and Bishop describe a security model that addresses the need for the digital signing of government documents, so that document authors and the people who sign the document can be clearly established. The authors summarize other...
...
May 24 2005  
  Introduction to computer security
Bishop M., Addison-Wesley Professional, 2004.  Type: Book (9780321247445)

Computer security is a growing concern in our information-based society. The goal of this book is to present the state of the art in this field to a general audience, including computer security professionals and students....
...
May 10 2005  
  A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986.  Type: Article

This short paper contains two sections. The first suggests that a callback modem can be replaced by a program in which a caller can specify the phone number to be called. This seems to defeat the very purpose of callback modems, howeve...
...
Mar 1 1987  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy