skip to main content
10.1145/335169.335204acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free Access

On the functional relation between security and dependability impairments

Authors Info & Claims
Published:01 September 1999Publication History
First page image

References

  1. 1.E.N. Adams. Optimizing preventive service of software products. IBM Journal of Research and Development, 28(1): 2-14, 1984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.P. Ammann, S. Jajodia. Computer Security, fault tolerance, and software assurance. IEEE Concurrency, Vol. 7, No. 1, January-March 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.R. Andersson. Why cryptosystems fail. Communications of the A CM, 37(11), 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.T. Anderson and P. A. Lee. Fault tolerance terminology proposals. In P. A. Lee and D. E. Morgan, editors, Proceedings of the 12th IEEE International Symposium on Fault Tolerant Computing, FTCS-I 2, pages 29-33, Santa Monica, CA, USA, June 1982.Google ScholarGoogle Scholar
  5. 5.A. Avizienis. Fault tolerance, the survival attribute of digital systems. In Proceedings of the IEEE, 66(10):1109-1125, October 1978.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6.A. Avizienis. The four-universe information system model for the study of fault-tolerance. In P. A. Lee and D. E. Morgan, editors, Proceedings of the 12th IEEE International Symposium on Fault Tolerant Computing, FTCS-12, pages 29-33, Santa Monica, CA, USA, June 1982.Google ScholarGoogle Scholar
  7. 7.R.H. Baker. Computer Security Handbook, 2nd edition. TAB Professional and Reference Books, McGraw-Hill, 199I. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.M. Bishop and D. Bailey. A Critical Analysis of Vulnerability Taxonomies. Technical Report CSE-96-11, Department of Computer Science, University of California at Davis, CA, USA, September 1996.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9.B.K. Daniels. Errors, faults and failures: A model. In T. Anderson, editor, Safe and Secure Computing Systems, Blackwell Scientific Publications 1989.Google ScholarGoogle Scholar
  10. 10.D.E. Denning. Secure Databases and Safety: Some unexpected conflicts. In T. Anderson, editor, Safe and Secure Computing Systems, Blackwell Scientific Publications, 1989.Google ScholarGoogle Scholar
  11. 11.H. Hedbom, S. Lindskog, E. Jonsson, "An Analysis of the Security of Windows NT", Tech. Rep. 99-16, Dept. of Computer Engineering, Chalmers University of Technology, G6teborg, Sweden, 1999.Google ScholarGoogle Scholar
  12. 12.Institute of Electrical and Electronic Engineers. A Glossary of Software Engineering Terminology, Chapter 5, IEEE 610.12-1990.Google ScholarGoogle Scholar
  13. 13.Information Technology Security Evaluation Criteria (IT- SEC): Provisional Harmonized Criteria, December 1993.Google ScholarGoogle Scholar
  14. 14.International Standards Organization. Data Processing: Open Systems Interconnection, Basic Reference Model, ISO/IS 7498, Geneva 1983.Google ScholarGoogle Scholar
  15. 15.International Standards Organization. Information processing systems: Open Systems Interconnection, Basic Reference Model, part 2: Security Architecture 7498/2.Google ScholarGoogle Scholar
  16. 16.E. Jonsson and T. Olovsson. On the Integration of Security and Dependability in Computer Systems. In lASTED International Conference on Reliability, Quality Control and Risk Assessment, Washington, USA, November 4-6, 1992.Google ScholarGoogle Scholar
  17. 17.E. Jonsson. A Unified Approach to Dependability Impairments in Computer Systems. In IASTED International Conference on Reliability, Quality Control and Risk Assessment, pages 173-178, Cambridge, MA, USA, October 18- 20 1993.Google ScholarGoogle Scholar
  18. 18.E. Jonsson, M. Andersson, S. Asmussen, "A Practical Dependability Measure for Degradable Computer Systems with Non-exponential Degradation", In Proceedings of the IFA C Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS'94, Espoo, Finland, June 13-15, 1994, vol. 2, pp. 227-233.Google ScholarGoogle Scholar
  19. 19.E. Jonsson, T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior", iEEE Transactions on Software Engineering, Vol. 23, No. 4, April 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.E. Jonsson. An Integrated Framework for Security and Dependability. In Proceedings of the New Security Paradigms Workshop 1998, Charlottesville, VA, USA, September 22- 25, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.I.V. Krsul. Software Vulnerability Analysis. PhD thesis, Purdue University, May 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.J.C. Laprie et al. Dependability: Basic Concepts and Terminology. Springer-Vefiag, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.U. Lindqvist, U. Gustafson, E. Jonsson, "Analysis of Selected Computer Security Intrusions: In Search of the Vulnerability'', NORDSEC'96- Nordic Workshop on Secure Computer Systems, GOteborg, Sweden, November 7-8, 1996.Google ScholarGoogle Scholar
  24. 24.C. Meadows, Applying the Dependability Paradigm to Computer Security. In Proceedings of the New Security Paradigms Workshop 1995, La Jolla, CA, August 22-25 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.C. Meadows, J. McLean, Security and Depandability: Then and Now. Presented at the Workshops on Computer Security, Fault Tolerance, and Software Assurance.' From Needs to Solutions, Williamsburg, VA, November 11-13, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.D.M. Nessett. Factors Affecting Distributed System Secu~ rity. In Proceedings of the 1986 tEEE Symposium on Security and Privacy, pages 204-222, Oakland, CA, USA.Google ScholarGoogle Scholar
  27. 27.National Institute of Standards and Technology. Glossary of computer security terms, NSC-TG-004 version. 1, ("Aqua Book"), October 21, 1988.Google ScholarGoogle Scholar
  28. 28.S.M. Ornstein. Safety issues for computer controlled systems. In Proceedings of the 16th IEEE International Symposium on Fault-Tolerant Computing, FTCS-16, Vienna, Austriia, 1986.Google ScholarGoogle Scholar
  29. 29.C.P. Pfleeger. Security in Computing. Prentice-Hall 1997. ISBN 0-13-185794-0. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.Department of Defence. Trusted Computer System Evaluation Criteria ("orange book"), CSC-STD-001-83.Google ScholarGoogle Scholar

Index Terms

  1. On the functional relation between security and dependability impairments

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        NSPW '99: Proceedings of the 1999 workshop on New security paradigms
        September 1999
        140 pages
        ISBN:1581131496
        DOI:10.1145/335169

        Copyright © 1999 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 September 1999

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate62of170submissions,36%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader