Security Assurance

被引:4
|
作者
Lipner, Steven B. [1 ]
机构
[1] Microsoft Corp, Software Secur, Trustworthy Comp, Redmond, WA 98052 USA
关键词
D O I
10.1145/2822513
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:24 / 26
页数:3
相关论文
共 50 条
  • [21] Hardware Security Through Chain Assurance
    Obeng, Yaw
    Nolan, Colm
    Brown, David
    [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1535 - 1537
  • [22] BASECASS: A methodology for CAPTCHAs security assurance
    Hernandez-Castro, Carlos Javier
    Barrero, David F.
    R-Moreno, Maria D.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [23] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [24] Evaluating Security Assurance Case Adaptation
    Jahan, Sharmin
    Marshall, Allen
    Gamble, Rose F.
    [J]. PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 7312 - 7321
  • [25] Tools for information security assurance arguments
    Park, JS
    Montrose, B
    Froscher, JN
    [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296
  • [26] COMPUTER ASSURANCE - SECURITY, SAFETY, AND ECONOMICS
    HANKINSON, AL
    [J]. COMPASS 89 : PROCEEDINGS OF THE FOURTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY AND PROCESS SECURITY, 1989, : 1 - 7
  • [27] An Immune Intelligent Approach for Security Assurance
    Enache, Adriana-Cristina
    Ionita, Mihai
    Sgarciu, Valentin
    [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2015,
  • [28] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2007, (04) : 77 - 81
  • [29] Authenticity as a Component of Information Assurance and Security
    Rogers, Corinne
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 101 - 108
  • [30] Software security assurance SOUP to NUTS
    Axelrod, C. Warren
    [J]. CrossTalk, 2015, 28 (05): : 37 - 43