Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
Michael GehrkeAndreas PfitzmannKai RannenbergPublished in: IFIP Congress (2) (1992)
Keyphrases
- evaluation criteria
- information technology
- security vulnerabilities
- evaluation process
- buffer overflow
- risk assessment
- information security
- evaluation methods
- access control
- information systems
- intrusion detection
- network security
- security problems
- security requirements
- security properties
- security issues
- security threats
- security risks
- machine learning
- penetration testing
- security mechanisms
- security policies
- rough sets
- law enforcement agencies
- pairwise
- training set
- genetic algorithm