2003
DOI: 10.1109/msecp.2003.1176998
|View full text |Cite
|
Sign up to set email alerts
|

What is computer security?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
52
0
5

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 167 publications
(57 citation statements)
references
References 1 publication
0
52
0
5
Order By: Relevance
“…Security policy is a specific statement of what is and is not allowed and security mechanisms enforce the policies [25]. In practice this means, for example, that it is not enough to have a secure tag authentication protocol if the people using the system do not verify the tag-product integrity.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security policy is a specific statement of what is and is not allowed and security mechanisms enforce the policies [25]. In practice this means, for example, that it is not enough to have a secure tag authentication protocol if the people using the system do not verify the tag-product integrity.…”
Section: Discussionmentioning
confidence: 99%
“…Security requirements define the security goals of the system that answer the question, "What do you expect security to do for you?" [25]. Moreover, security differs from all other specification areas in that someone is deliberately threatening to break the system [1].…”
Section: Requirements Analysismentioning
confidence: 99%
“…He also added that computer security is a process of achieving a state that is optimally desirable for an information system; stating clearly that the main goal of an information system security is to optimize the performance of the system with respect to the measure of risk to which the system is exposed to. [6] describes Computer security in this form and he states; "If a system always stays in states that are allowed, and users can only perform actions that are allowed, the system is secure. But if the system can enter a disallowed state, or if a user can successfully execute a disallowed action, the system is non-secure" [6].…”
Section: Computer Securitymentioning
confidence: 99%
“…[6] describes Computer security in this form and he states; "If a system always stays in states that are allowed, and users can only perform actions that are allowed, the system is secure. But if the system can enter a disallowed state, or if a user can successfully execute a disallowed action, the system is non-secure" [6]. …”
Section: Computer Securitymentioning
confidence: 99%
“…Стратегия управления качеством и сохранение конкурентоспособно-сти организации требуют непрерывной деятельности, направленной на улучшение управления качеством. Здесь можно провести аналогию с политикой безопасности [8], которая существует всегда и постоянно направлена на улучшение. Тенденция улучше-ния имеет важное значение для организации для поддержания текущего уровня произ-водительности, чтобы реагировать на изменения своих внутренних и внешних условий и создавать новые возможности.…”
unclassified