- Ames Jr, S.R., Gasser, M., and Schell, R.R. Security kernel design and implementation: An introduction. Computer 16, 7 (1983), 14--22. Google ScholarDigital Library
- Anderson, E.A., Irvine, C.E., and Schell, R.R. Subversion as a threat in information warfare. J. Inf. Warfare 3 (2004), 51--64.Google Scholar
- Clark, P., Irvine, C. and Nguyen, T. Design Principles for Security. NIST Special Publication 800--160, September 2016, pp. 207--221; http://csrc.nist.gov/publications/drafts/800-160/sp800_160_final-draft.pdfGoogle Scholar
- Heckman, M.R. and Schell, R.R. Using proven reference monitor patterns for security evaluation. Information 7, 2 (Apr. 2016); http://dx.doi.org/10.3390/info7020023Google ScholarCross Ref
- Higgins, K.J. IBM: The security business 'has no future.' Information Week Dark Reading, (4/10/2008); http://www.darkreading.com/ibm-the-security-business-has-no-future/d/d-id/1129423Google Scholar
- Lipner, S.B. Security assurance. Commun. ACM 58, 11 (Nov. 2015), 24--26. Google ScholarDigital Library
- Schell, R.R. A University Education Cyber Security Paradigm Shift. Presented at the National Initiative for Cybersecurity Education (NICE), (San Diego, CA, Nov. 2015); https://www.fbcinc.com/e/nice/ncec/presentations/2015/Schell.pdfGoogle Scholar
- Schell, R.R., Downey, P.J. and Popek, G.J. Preliminary Notes on the Design of Secure Military Computer Systems. ESD, Air Force Systems Command, Hanscom AFB, MA. {MCI-73-1}, Jan 1973; http://csrc.nist.gov/publications/history/sche73.pdfGoogle Scholar
Index Terms
- Cyber defense triad for where security matters
Recommendations
Optimizing Active Cyber Defense
GameSec 2013: 4th International Conference on Decision and Game Theory for Security - Volume 8252Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to ...
Dynamical model for individual defence against cyber epidemic attacks
When facing the on‐going cyber epidemic threats, individuals usually set up cyber defences to protect their own devices. In general, the individual‐level cyber defence is considered to mitigate the cyber threat to some extent. However, few previous ...
Active cyber defense dynamics exhibiting rich phenomena
HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of SecurityThe Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In ...
Comments