Home
Summary
Introduction
DeSIRE
& DeFINE
DeSIRE
DeFINE
Initial
Steps
Events
Related
Projects
Links
Literature
|
Literature
- Philip Agre and Marc Rotenberg: Technology and
Privacy: The New Landscape (London, UK: The MIT
Press, 2000)
- Ross Anderson, Security Engineering
(Chichester, UK: Wiley Computing Publishing, 2001)
- A. Avizienis, J.-C. Laprie and B. Randell:
Fundamental Concepts of Dependability. Technical
Report 739, pp. 1-21, Department of Computing Science,
University of Newcastle upon Tyne, 2001. http://www.cs.ncl.ac.uk/research/trs/papers/739.pdf
- Tom Jackson (ed). Inventory of EC funded projects
in the area of Dependability. Joint Research Centre,
Institute for Systems, Informatics and Safety. http://dsa-isis.jrc.it/EDI-Hub/Inventory.html
- J.C. Laprie, (Ed.). Dependability: Basic Concepts
and Associated Terminology, Dependable Computing and
Fault-Tolerant Systems. Springer-Verlag, 1991.
- Peter Neumann, Computer-Related Risks,
(Cupertino, CA: Addison Wesley, 1995)
- Bruce Schneier, Secrets and Lies: Digital Security
in a Networked World, (New York: Wesley Computing
Publishing, 2000)
- Andrea Servida. Inventory of EC-Funded Projects in
the Area of Dependability (11 January 2000)
http://deppy.jrc.it/default/page.gx?_app.page=entity.html&_app.action=entity&_entity.object=KM------0000000000000134&_entity.name=Dep-Prj-Inv022.pdf
- Instruments for implementing the Thematic
Priorities of the Sixth Framework Programme
(2002-2006) http://europa.eu.int/comm/research/fp6/networks-ip.html
- e-Europe 2005 Action Plan: An Information Society
for All. European Commission . COM (2002) 263.
http://europa.eu.int/information_society/eeurope/news_library/documents/eeurope2005/eeurope2005_en.pdf
- Trust, Dependability, Security and Privacy for IST
in FP6. IST Advisory Group (June 2002). http://www.cordis.lu/ist/istag.htm
- Trust in Cyberspace, National Research
Council, Washington, DC (USA: National Academy Press,
1999) http://www.nap.edu/readingroom/books/trust/
- National Strategy to Secure Cyberspace (The
President's Critical infrastruction Protection Board,
2002) http:http://www.whitehouse.gov/pcipb/cyberstrategy-draft.html
|