|
 |
 |
Welcome to Usable Security Education Project Home Page |
|
- Operating Systems Security Considerations
- IBM Operating System Security
- An Integrated Toolkit For Operating System Security
-
A Comparison of Commercial and Military Computer Security Policies,
David D. Clark, David R. Wilson
IEEE Symposium on Security and Privacy, 1987.
-
An Intrusion Detection Model, Dorothy E. Denning, IEEE Trans on
Software Engineering, 1987.
-
Preventing Privilege Escalation, Niels Provos, Markus Friedl, Peter
Honeyman, Proceedings of the 12th conference on USENIX Security Symposium, Vol 12, 2003.
-
A Look Back at "Security Problems in the TCP/IP Protocol Suite", Steven M. Bellovin, Proceedings of the 20th Annual Computer Security Applications Conference, 2004.
-
Application Security On Untrusted Operating Systems", Dan R. K. Ports, Tal Garfinkel,
HotSec ’08, San Jose, CA, Jul 2008.
- Oracle Features and Benefits - Security
Top
|
|
This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
|