Skip to main content

Einführung und Motivation

  • Chapter
  • First Online:
Sichere Systeme

Part of the book series: Xpert.press ((XPERT.PRESS))

  • 2988 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cap-talk mailing list, http://www.eros-os.org/pipermail/cap-talk/

    Google Scholar 

  2. Erights.org, Homepage der sicheren Sprache „E“.

    Google Scholar 

  3. S. Garfinkel, Design Principles and Patterns for Computer Systems That Are Simultaneously Secure and Usable, Dissertation, Massachusetts Institute of Technology (MIT) 2005, available online at http://www.simson.net/thesis/

    Google Scholar 

  4. W. Kriha, R. Schmitz, Internet-Security aus Software-Sicht – Grundlagen, Springer-Verlag 2008.

    Google Scholar 

  5. M.S. Miller, J.S. Shapiro, Paradigm Regained: Abstraction Mechanisms for Access Control, Proceedings of 8th Eighth Asian Computing Science Conference (ASIAN’03), edited by Vijay Saraswat, Springer-Verlag 2003 (available online at http://www.erights.org/talks/asian03/)

    Google Scholar 

  6. K. Rannenberg, A.Pfitzmann, G.Müller, Sicherheit – insbesondere mehrseitige IT-Sicherheit, http://www.wiiw.de/publikationen/Sicherheitinsbesonderemehrsei.pdf

    Google Scholar 

  7. J.H. Saltzer, M.D. Schroeder, The Protection of Information in Computer Systems, available online at http://www.cs.virginia.edu/∼evans/cs551/saltzer/

    Google Scholar 

  8. V. Scheidemann, It won’t happen to me – Aspekte der Risikowahrnehmung und ihr Einfluss auf die IT-Sicherheit, in: Innovationsmotor IT-Sicherheit, Tagungsband zum 10. Deutschen IT-Sicherheitskongress, BSI 2007

    Google Scholar 

  9. F. Spiessens, Patterns of Safe Collaboration, Ph.D. dissertation, Department of Computing Science and Engineering, Université Catholique de Louvain, Feb. 2007, http://www.info.ucl.ac.be/∼pvr/fsp_thesis.pdf

    Google Scholar 

  10. Ambient Authority, Wikipedia http://en.wikipedia.org/wiki/Ambient_authority

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walter Kriha .

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schmitz, R., Kriha, W. (2009). Einführung und Motivation. In: Sichere Systeme. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78959-8_1

Download citation

Publish with us

Policies and ethics