Information system security redux

PG Neumann - Communications of the ACM, 2003 - dl.acm.org
Last month we discussed risks in trusting entities that might not actually be trustworthy. And
yet, people use flawed systems that may cause more security and reliability problems than …

[PDF][PDF] Race conditions, files, and security flaws; or the tortoise and the hare redux

M Bishop - Univ. California Davis, Davis, CA, USA, Tech. Rep …, 1995 - Citeseer
… The presentation of security flaws in extant programs is a touchy issue, because for those …
information presents a security risk. For this reason, in this section we will present two security

Ethical hacking: the security justification redux

B Smith, W Yurcik, D Doss - … ). Social Implications of Information …, 2002 - ieeexplore.ieee.org
… rooted in the poor state of information security on the lntemet that was first documented in
1987 [I]. Ethical hackers believe one can best protect systems by probing them while causing …

The Future of Academic MIS: Redux

JF George - … of the Midwest Association for Information Systems  …, 2017 - aisel.aisnet.org
Security: Although research on information systems security has a long history in academic
MIS, interest in security grows with each announcement of a large data breach: 40 million …

[PDF][PDF] The foresight saga, redux

PG Neumann - Communications of the ACM, 2012 - dl.acm.org
… real applications such as medical information systems, telerobotic surgery systems, real-time …
the effects of design faults, system security vulnerabilities, system failures and errors, and …

The Culture of Surveillance: G-Men Redux and Total Information Awareness

LR Shade - TOPIA: Canadian Journal of Cultural Studies, 2003 - utppublishing.com
… the basis of privacy and security risks, identity theft, misuse of information, and overt citizen
… -loop information systems that will counter asymmetric threats by achieving total information

Golden Eye Redux

JF Bauerle - Banking LJ, 2003 - HeinOnline
… crop of firms offering security assessment services to financial … For a fee, any of these firms
will test for information system … to prove his point about the system's security. The chief later …

[PDF][PDF] Interactions Between Information Systems and Electric Power Systems: The Vasa Redux

S Cherian - gridwiseac.org
… This issue is not simply a “cross cutting” issue similar to say, security and privacy where
models from other domains can be successfully adapted for the needs of the power system. I …

[HTML][HTML] The Foresight Saga, Redux Short-term thinking is the enemy of the long-term future.

PG Neumann - cacm.acm.org
… that we necessarily must depend on relating to information systems, networks, and national
… the effects of design faults, system security vulnerabilities, system failures and errors, and the …

Large-scale automated software diversity—program evolution redux

A Homescu, T Jackson, S Crane… - … on Dependable and …, 2015 - ieeexplore.ieee.org
Security Evaluation: We evaluated the security impact of our diversifying compiler by examining
how it affects gadgets in diversified executables. For this analysis, we considered the C+…