Author of the publication

Can We Ever Build Survivable Systems from COTS Components?

, , and . CAiSE, volume 2348 of Lecture Notes in Computer Science, page 216-229. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRIAD: a framework for survivability architecting., and . SSRS@CCS, page 105-109. ACM, (2003)Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits., , , , , and . IEEE Symposium on Security and Privacy Workshops, page 236-250. IEEE Computer Society, (2014)Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies., , , , , , and . HICSS, page 2025-2034. IEEE Computer Society, (2014)A pattern for increased monitoring for intellectual property theft by departing insiders., , and . PLoP, page 19:1-19:10. ACM, (2011)Can We Ever Build Survivable Systems from COTS Components?, , and . CAiSE, volume 2348 of Lecture Notes in Computer Science, page 216-229. Springer, (2002)A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network., and . S&P, page 34-39. IEEE Computer Society, (1986)Design and Assurance Strategy for the NRL Pump., , and . Computer, 31 (4): 56-64 (1998)A pattern for trust trap mitigation., and . PLoP, page 20:1-20:7. ACM, (2011)Balancing Organizational Incentives to Counter Insider Threat., , , , , and . IEEE Symposium on Security and Privacy Workshops, page 237-246. IEEE Computer Society, (2018)