|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 28
reviews
|
|
|
|
|
|
|
|
Five dimensions of information security awareness ACM SIGCAS Computers and Society 31(2): 24-29, 2001. Type: Article
Although awareness of the importance of information has been growing rapidly for decades, many organizations still lack an appreciation of the different ways in which people can look at and measure the importance of information securit...
|
May 22 2002 |
|
|
|
|
|
|
Role-based access control on the web ACM Transactions on Information and System Security 4(1): 37-71, 2001. Type: Article
Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on individual user identities. Hence we were motivated by the need to manage and enforce the stro...
|
Apr 19 2002 |
|
|
|
|
|
|
White-hat security arsenal: tackling the threats Rubin A., Addison-Wesley Longman Ltd., Essex, UK, 2001. 330 pp. Type: Book (9780201711141)
Rubin has written a superb book on the topic of security, as the book delineates it. To a well-chosen and very useful level of detail, he tells system administrators, IT professionals, and end users all they need to know about attacks ...
|
Oct 1 2001 |
|
|
|
|
|
|
Information security: protecting the global enterprise Pipkin D., Prentice-Hall, Inc., Upper Saddle River, NJ, 2000. 364 pp. Type: Book (9780130173232)
Pipkin discusses almost every conceivable aspect of information security, all the way from the changing environment in which organizations now find themselves, through all aspects of business analysis, policies and procedures, implemen...
|
Apr 1 2000 |
|
|
|
|
|
|
On secure and pseudonymous client-relationships with multiple servers Gabber E., Gibbons P., Kristol D., Matias Y., Mayer A. ACM Transactions on Information and System Security 2(4): 390-415, 1999. Type: Article
Janus is a cryptographic engine that may reside either in the computer that serves as an interface between a local network and the Internet, or in each computer attached to the local network. In the latter case, each Janus engine inter...
|
Mar 1 2000 |
|
|
|
|
|
|
Flexible control of downloaded executable content Jaeger T., Prakash A., Liedtke J., Islam N. ACM Transactions on Information and System Security 2(2): 177-228, 1999. Type: Article
Effective access control is hardly a simple matter of specifying and enforcing permissions that apply to pairs of subjects and objects. Consideration must also be given to the programs that mediate access; authentication of users, prog...
|
Oct 1 1999 |
|
|
|
|
|
|
Trusted recovery Jajodia S., McCollum C., Ammann P. Communications of the ACM 42(7): 71-75, 1999. Type: Article
Although this short, well-written paper provides those responsible for system security with a generally useful typology of strategies for the defense of computers and for recovery from successful attacks, its primary focus is on databa...
|
Aug 1 1999 |
|
|
|
|
|
|
Information warfare and security Denning D., Addison-Wesley Longman Ltd., Essex, UK, 1999. Type: Book (9780201433036)
With this book, Denning brings to a wider audience the lucid style and insightful analysis that experts in computer security have long appreciated in her work. She has succeeded in her quest to provide a treatment of information securi...
|
Jan 1 1999 |
|
|
|
|
|
|
Fighting computer crime Parker D., John Wiley & Sons, Inc., New York, NY, 1998. Type: Book (9780471163787)
Parker’s book on computer security focuses on crime because he believes that “controls that protect against intentional acts also protect against unintentional acts” (p. 310). As Bill Murray notes in the f...
|
Oct 1 1998 |
|
|
|
|
|
|
Computer virus-antivirus coevolution Nachenberg C. Communications of the ACM 40(1): 46-51, 1997. Type: Article
Nachenberg has produced a reasonably clear and succinct, although poorly edited, overview for the nonspecialist of the current status of the conflict between those who create computer viruses and those who wish to avoid becoming their ...
|
Dec 1 1997 |
|
|
|
|
|
|
|
|
|
|
|