summary

summary - Documents Authors Tables Log in Sign up MetaCart...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Documents Authors Tables Log in Sign up MetaCart Documents: Advanced Search Include Citations Authors: Advanced Search Include Citations | Disambiguate Tables: A Taxonomy of Computer Program Security Flaws, with Examples (1993) Cached Download Links [chacs.nrl.navy.mil] [chacs.nrl.navy.mil] [chacs.nrl.navy.mil] [www.cs.umd.edu] [portal.acm.org] [cwe.mitre.org] Save to List Add to Collection Correct Errors Monitor Changes Search Search Search
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
by Carl E. Landwehr , Alan R. Bull , John P. McDermott , William S. Choi Citations: 114 - 3 self Summary Active Bibliography Co-citation Clustered Documents Version History BibTeX @MISC{Landwehr93ataxonomy, author = {Carl E. Landwehr and Alan R. Bull and John P. McDermott and William S. Choi}, title = {A Taxonomy of Computer Program Security Flaws, with Examples}, year = {1993}} Years of Citing Articles Bookmark OpenURL Abstract An organized record of actual flaws can be useful to designers, implementors, and evaluators of computer systems. This paper provides a taxonomy for computer program security flaws together with an appendix that carefully documents 50 actual security flaws. These flaws have all been described previously in the
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

summary - Documents Authors Tables Log in Sign up MetaCart...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online