• Corpus ID: 53050539

A Structured Approach to Computer Security

@inproceedings{Olovsson1992ASA,
  title={A Structured Approach to Computer Security},
  author={Tomas Olovsson},
  year={1992}
}
Security and dependability are two closely connected areas. Recently, some attempts have been made to integrate the two concepts by integrating security into the more general topic of dependability. This paper describes security concepts and gives a survey of security terminology. It also establishes a taxonomy reflecting concepts within the security area which enables the integration of security and dependability. Special concern is given to the problems which inevitably arise from the… 
Analysing Information Systems Security
TLDR
Elements from a proactive model for quality assurance in food production (HACCP) are incorporated in the model, as is the usage of established multivariate statistical methods.
Actual and Perceived Information Systems Security
TLDR
The outcome of the study is that actual IS security should be treated as a dynamic condition that is influenced by three different objects: information assets, threat objects and security mechanisms.
Information Security Fundamentals
  • P. Oscarson
  • Computer Science
    World Conference on Information Security Education
  • 2003
TLDR
The included concepts are information asset, confidentiality, integrity, availability, threat, incident, damage, security mechanism, vulnerability and risk, which are modeled graphically in order to increase the understanding of conceptual fundamentals within the area of information security.
Security and Privacy of Protocols and Software with Formal Methods
TLDR
This track provides numerous contributions to the formal modeling of security and anonymity properties and the creation of tools to verify them on large-scale software projects.
INFORMATION SECURITY FUNDAMENTALS Graphical Conceptualisations for Understanding
TLDR
The included concepts are information asset, confidentiality, integrity, availability, threat, incident, damage, security mechanism, vulnerability and risk, which are modeled graphically in order to increase the understanding of conceptual fundamentals within the area of information security.
Towards a secure platform for distributed mobile object computing
TLDR
A survey of the security features of a few languages and virtual machines as regards authentication, access control, and communications security and a possible architecture for a secure virtual machine for distributed mobile computing based on interesting features found in the implementations studied.
Security of Information in University Elearning Systems
TLDR
This document has been prepared to identify data security threats existing in a very specific group of computer systems university eLearning platforms and thirteen security areas have been defined.
Graphical Conceptualisations for Understanding
TLDR
The included concepts are information asset, confidentiality, integrity, availability, threat, incident, damage, security mechanism, vulnerability and risk, which are modeled graphically in order to increase the understanding of conceptual fundamentals within the area of information security.
The Analysis of Security in a Multi-Server E-Learning Environment Based on Moodle and Zimbra Software
TLDR
This article seeks to identify security threats to data existing within a university’s e-learning environment, built on moodle software integrated with the remaining computer systems of the college, including an electronic mail system employing Zimbra technology.
A Security Incident Data Model
This paper presents a security incident data model. The model uses many of the existing security incident taxonomies to organise its security incident related information. Where characteristic of
...
...

References

SHOWING 1-10 OF 47 REFERENCES
An Intrusion-Tolerant Security Server for an Open Distributed System
TLDR
This paper describes a new approach for security in open distributed systems based on a fragmentation-scattering technique applied to a security server running on several security sites such that intrusions into a number of sites less than a given threshold have no consequence on the global security.
Integrating security in a large distributed system
TLDR
Usage experience reveals that resource control, particularly of workstation CPU cycles, is more important than originally anticipated and that the mechanisms available to address this issue are rudimentary.
The UNIX system UNIX operating system security
TLDR
Some of the security hazards of the UNIX™ operating system are discussed, and ways to protect against them are suggested, in the hope that an educated community of users will lead to a level of protection that is stronger, but far more importantly, that represents a reasonable and thoughtful balance between security and ease of use of the system.
Security Kernel Design and Implementation: An Introduction
TLDR
The security kernel approach described here directly addresses the size and complexity problem by limiting the protection mechanism to a small portion of the system by adapting the concept of the reference monitor, an abstract notion adapted from the models of Butler Lampson.
Network security: Protocol reference model and the trusted computer system evaluation criteria
TLDR
The discussion covers the protocol architectural issues of the trusted network with particular emphasis on the relationship among network protocols, protocol reference model, and network security.
Network Security Overview
  • S. Walker
  • Computer Science
    1985 IEEE Symposium on Security and Privacy
  • 1985
TLDR
An overall system view of the network and trusted and untrusted computers attached to it, and how various ways of protecting data on networks affect which portions of thenetwork must be trusted and what security policy must be enforced is provided.
Factors Affecting Distributed System Security
  • D. Nessett
  • Computer Science
    1986 IEEE Symposium on Security and Privacy
  • 1986
Recent work examining distributed system security requirements is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work
Integration Problems in Fault-Tolerant, Secure Computer Design
This chapter explores part of what has been termed “secure fault tolerance” [34]. Essentially, this involves ensuring that the fault-tolerance techniques used in a fault-tolerant, secure computer
Security problems in the TCP/IP protocol suite
TLDR
A variety of attacks based on a number of serious security flaws inherent in the TCP/IP protocols are described, including sequence number spoofed, routing attacks, source address spoofing, and authentication attacks.
Practical UNIX Security
This volume tells system administrators how to make their UNIX system - either System V or BSD - as secure as it possibly can be without going to trusted system technology. The book describes UNIX
...
...