skip to main content
article
Free Access

Computer security past and future

Published:01 April 1996Publication History

Abstract

No abstract available.

References

  1. 1. Bell, D.E. and LaPadula, L.J. "Secure Computer System: Unified Exposition and Multics Interpretation", MTR-2997, Rev. 1, MITRE Corp., Bedford, Mass., March 1976.Google ScholarGoogle ScholarCross RefCross Ref
  2. 2. DoD 5200.28-STD, "Department of Defense Trusted System Evaluation Criteria", December 1985.Google ScholarGoogle Scholar
  3. 3. Computer Security Act of 1987, 100th Congress, HR 145, June 11, 1987.Google ScholarGoogle Scholar
  4. 4. Carter, D. and Katz, A., "MSU CyberCrime Study", Michigan State University, November, 1995.Google ScholarGoogle Scholar
  5. 5. Shimomura, T. and Markoff, J. "TAKEDOWN: The Pursuit and Capture of Kevin Mitnick", Hyperion Books, January, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Computer security past and future

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image XRDS: Crossroads, The ACM Magazine for Students
        XRDS: Crossroads, The ACM Magazine for Students  Volume 2, Issue 4
        Special issue on computer security
        March 1996
        24 pages
        ISSN:1528-4972
        EISSN:1528-4980
        DOI:10.1145/332159
        Issue’s Table of Contents

        Copyright © 1996 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 April 1996

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      HTML Format

      View this article in HTML Format .

      View HTML Format