Computer Security Technology Planning Study

@inproceedings{AndersonComputerST,
  title={Computer Security Technology Planning Study},
  author={James P. Anderson}
}
Approved for pubJic reJease; distribution unri mited. When U.S. Government drawings, specifications or other data are used for any purpose other than a definitely related government procurement operation, the government thereby incurs no responsibility nor any obligation whatsoever; and the fact that the government may have formulated, fui·nished, or in any way sup­ plied the said drawings, specifications, or other data is not to be regarded by implication or otherwise as in any manner… CONTINUE READING
Highly Influential
This paper has highly influenced 44 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 836 citations. REVIEW CITATIONS

Topics

Statistics

0204060'72'77'83'89'95'01'07'13
Citations per Year

837 Citations

Semantic Scholar estimates that this publication has 837 citations based on the available data.

See our FAQ for additional information.