{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:47:30Z","timestamp":1773859650919,"version":"3.50.1"},"reference-count":61,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)88289-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T08:08:45Z","timestamp":1027584525000},"page":"94-114","source":"Crossref","is-referenced-by-count":14,"title":["Information system defences: A preliminary classification scheme"],"prefix":"10.1016","volume":"16","author":[{"given":"Fred","family":"Cohen","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)88289-2_BIB1","series-title":"Assessment of Electric Power Control Systems Security","author":"Agudo","year":"1996"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB2","series-title":"Secure Computer Systems: Mathematical Foundations and Model","author":"Bell","year":"1973"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB3","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/378444.378449","article-title":"Security Problems in the TCP\/IP Protocol Suite","author":"Bellovin","year":"1989","journal-title":"ACM SIGCOMM. Computer Communications Review"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB4","series-title":"Proceedings of the Third Usenix UNIX Security Symposium","article-title":"There Be Dragons","author":"Bellovin","year":"1992"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB5","series-title":"Integrity Considerations for Secure Computer Systems","author":"Biba","year":"1977"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB6","series-title":"Checking for Race Conditions in File Access","author":"Bishop","year":"1996"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB7","series-title":"IFIP Congress","first-page":"229","article-title":"A Unified Method for the Specification and Verification of Protocols","author":"Bochmann","year":"1977"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB8","series-title":"Firewalls and Internet Security \u2014 Repelling the Wiley Hacker","author":"Cheswick","year":"1994"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB9","series-title":"IFIPTC-11 Conference","article-title":"Computer Viruses \u2014 Theory and Experiments","author":"Cohen","year":"1984"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB10","first-page":"35","article-title":"Algorithmic Authentication of Identification","author":"Cohen","year":"1985","journal-title":"Information Age"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB11","series-title":"IFIP, TC-11","first-page":"189","article-title":"A Secure Computer Network Design","volume":"Vol. 4","author":"Cohen","year":"1985"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB12","series-title":"Computer Viruses","author":"Cohen","year":"1986"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB13","series-title":"IFIP-TC11","first-page":"118","article-title":"Protection and Administration of Information Networks under Partial Orderings","volume":"Vol. 6","author":"Cohen","year":"1987"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB14","series-title":"Introductory Information Protection","author":"Cohen","year":"1987"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB15","article-title":"A New Integrity-Based Model for Limited Protection Against Computer Viruses","author":"Cohen","year":"1988"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB16","series-title":"IFIP-TC11","article-title":"Models of Practical Defenses Against Computer Viruses","volume":"Vol. 7","author":"Cohen","year":"1988"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB17","series-title":"A Short Course on Systems Administration and Security Under Unix","author":"Cohen","year":"1991"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB18","series-title":"A Short Course on Computer Viruses","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB19","series-title":"IFIP-TC11","article-title":"Operating Systems Protection Through Program Evolution","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB20","series-title":"It's Alive!!!","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB21","series-title":"Protection and Security on the Information Superhighway","author":"Cohen","year":"1995"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB22","series-title":"IFIP-TC11","article-title":"A Secure World-Wide-Web Server","author":"Cohen","year":"1997"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB23","series-title":"IFIP-TC11","article-title":"Experiments on the Impact of Computer Viruses on Modern Computer Networks","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB24","series-title":"Defensive Information Warfare-Information Assurance","author":"Cohen","year":"1993"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB25","series-title":"National Info-Sec Technical Baseline \u2014 Intrusion Detection and Response","author":"Cohen","year":"1994"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB26","series-title":"Assessment of Information Assurance for the Utility Industry","author":"Dagle","year":"1996"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB27","series-title":"Computer Network Architectures and Protocols","article-title":"Protocol Representation with Finite State Machines","author":"Danthine","year":"1982"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB28","article-title":"Secure Information Flow in Computer Systems","author":"Denning","year":"1975"},{"issue":"No. 5","key":"10.1016\/S0167-4048(97)88289-2_BIB29","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","article-title":"A Lattice Model of Secure Information Flow","volume":"Vol. 19","author":"Denning","year":"1976","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB30","series-title":"Cryptography and Data Security","author":"Denning","year":"1982"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB31","series-title":"Victory and Deceit\u2014Dirty Tricks at War","author":"Dunnigan","year":"1995"},{"issue":"No. 7","key":"10.1016\/S0167-4048(97)88289-2_BIB32","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TC.1973.5009130","article-title":"On the Advantages of Tagged Architecture","author":"Feustal","year":"1973","journal-title":"IEEE Trans. on Computers C-22"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB33","series-title":"Generally Accepted System Security Principles","author":"GASSP","year":"1995"},{"issue":"No. 1","key":"10.1016\/S0167-4048(97)88289-2_BIB34","article-title":"Modular Verification of Computer Communication Protocols","volume":"Vol. 31","author":"Hailpern","year":"1983","journal-title":"IEEE Communications"},{"issue":"No. 8","key":"10.1016\/S0167-4048(97)88289-2_BIB35","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","article-title":"Protection in Operating Systems","volume":"Vol.19","author":"Harrison","year":"1976","journal-title":"CACM"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB36","article-title":"Rare Conditions \u2014 An Important Cause of Faults","author":"Hecht","year":"1993","journal-title":"IEEE 0-7803-1251-1\/93"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB37","series-title":"Rogue Programs: Viruses, Worms, and Trojan Horses","author":"Hoffman","year":"1990"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB38","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1080\/0161-117891852802","article-title":"Cryptanalysts Corner","volume":"Vol. 1","author":"Knight","year":"1978","journal-title":"Cryptologia"},{"issue":"1","key":"10.1016\/S0167-4048(97)88289-2_BIB39","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","article-title":"A Note on the Confinement Problem","volume":"16","author":"Lampson","year":"1973","journal-title":"CACM"},{"issue":"No. 7","key":"10.1016\/S0167-4048(97)88289-2_BIB40","doi-asserted-by":"crossref","DOI":"10.1109\/MC.1983.1654445","article-title":"The Best Available Technologies for Computer Security","volume":"Vol. 16","author":"Landwehr","year":"1983","journal-title":"IEEE Computer"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB41","series-title":"AIFIPS National Computer Conference","first-page":"361","article-title":"Operating System Penetration","author":"Linde","year":"1975"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB42","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/0167-4048(92)90175-Q","article-title":"Intrusion Detection: Its Role and Validation","volume":"Vol. 11","author":"Liepins","year":"1982","journal-title":"Computers & Security"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB43","author":"Lyu","year":"1995","journal-title":"Handbook of Software Reliability Engineering"},{"issue":"No. 11","key":"10.1016\/S0167-4048(97)88289-2_BIB44","article-title":"Specification and Validation of Protocols","volume":"Vol. 27","author":"Merlin","year":"1979","journal-title":"IEEE Communications"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB45","series-title":"Computer Related Risks","author":"Neumann","year":"1995"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB46","series-title":"Proceedings of the 12th National Computer Conference","article-title":"A Summary of Computer Misuse Techniques","author":"Neumann","year":"1989"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB47","series-title":"National Security Telecommunication Advisory Committee, Information Assurance Task Force \u2014 Electric Power Information Assurance Risk Assessment","author":"NSTAC","year":"1996"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB48","series-title":"A Survey of Protocol Verification Techniques","author":"Palmer","year":"1986"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB49","article-title":"Restoration in a Flash \u2014 Using DS3 Cross-connects","author":"Pekarske","year":"1990","journal-title":"Telephony"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB50","doi-asserted-by":"crossref","DOI":"10.1145\/318951.319003","article-title":"A New Technique for Generating Protocol Tests","author":"Sabnani","year":"1985","journal-title":"Computer Communications Review"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB51","series-title":"Information Warfare \u2014 Legal, Regulatory, Policy, and Organizational Considerations for Assurance","author":"SAIC-IW","year":"1995"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB52","series-title":"Protocol Specification, Testing, and Verification II","article-title":"Some Experience with Test Sequence Generation for Protocols","author":"Sarikaya","year":"1982"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB53","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communications Theory of Secrecy Systems","author":"Shannon","year":"1949","journal-title":"Bell Systems Technical Journal"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB54","series-title":"Common System Vulnerabilities","author":"Spafford","year":"1992"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB55","doi-asserted-by":"crossref","DOI":"10.1109\/MC.1979.1658889","article-title":"Formal Techniques for Protocol Specification and Verification","author":"Sunshine","year":"1979","journal-title":"IEEE Computer"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB56","first-page":"26","article-title":"Weak Links","author":"Thyfault","year":"1992","journal-title":"Information Week"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB57","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1112\/plms\/s2-42.1.230","article-title":"On Computable Numbers, with an Application to the Entscheidungs Problem","volume":"Vol 42","author":"Turing","year":"1936","journal-title":"London Math Soc. Ser 2"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB58","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","article-title":"Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?","volume":"Vol 4","author":"van Eck","year":"1985","journal-title":"Computers & Security"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB59","series-title":"IFIP-TC11","first-page":"275","article-title":"A Model for Detecting the Existence of Software Corruptions in Real-Time","volume":"Vol. 12","author":"Voas","year":"1993"},{"issue":"No. 3","key":"10.1016\/S0167-4048(97)88289-2_BIB60","first-page":"7","article-title":"Misdirected phone call shuts down local power","volume":"Vol. 20","author":"Winkelman","year":"1995","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"10.1016\/S0167-4048(97)88289-2_BIB61","article-title":"Western Systems Coordinating Council","author":"WSCC","year":"1996","journal-title":"WSCC Preliminary System Disturbance Report"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897882892?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897882892?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T20:56:31Z","timestamp":1556657791000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404897882892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0167404897882892"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)88289-2","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}