Denail of Service: An Example

@article{Needham1994DenailOS,
  title={Denail of Service: An Example},
  author={Roger M. Needham},
  journal={Commun. ACM},
  year={1994},
  volume={37},
  pages={42-46}
}
ecurity threats are often divided into three c&go&s: breach of confidentiality, failure of authenticity and unauthorized denial ofserxice. Thr first twu have been very extensively studied; confidenti+ in particular has bear pursued to extraordinary lengths. Indeed, some publications on confidentialit) recall medieval disputes about how many angels could stand on the head of a pin. The second ha been the subject of. inquiry formany years, and is remarkable for the extent to which it is easy to d… CONTINUE READING
Highly Cited
This paper has 71 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.

72 Citations

0246'95'00'06'12'18
Citations per Year
Semantic Scholar estimates that this publication has 72 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…