SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Jonsson Stefan) srt2:(1990-1999)"

Sökning: WFRF:(Jonsson Stefan) > (1990-1999)

  • Resultat 1-10 av 42
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Hedbom, Hans, et al. (författare)
  • A Comparison of the Security of Windows NT and UNIX
  • 1998
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than standard UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the real level of security between these systems
  •  
2.
  • Hedbom, Hans, et al. (författare)
  • Analysis of the Security of Windows NT
  • 1998
  • Rapport (refereegranskat)abstract
    • This paper presents an analysis of the security in Windows NT 4.0, working in both stand-alone and networking mode. The objective of the work was to find out how secure this operating system actually is. A technical overview of the system, and in particular its security features is given. The system security was analyzed and practical intrusion attempts were made in order to verify vulnerabilities or to find new ones. All vulnerabilities are described in detail and classified according to a classification scheme. A comparison to commonly known UNIX weaknesses was made. It revealed generic similarities between the two systems to a surprisingly high degree. Finally a number of recommendations are given. The paper concludes that there are ample opportunities to improve the security of Windows NT. We have reason to believe that it is probably not higher than that of UNIX
  •  
3.
  • Ausmees, Nora, et al. (författare)
  • Structural and putative regulatory genes involved in cellulose synthesis in Rhizobium leguminosarum bv. trifolii
  • 1999
  • Ingår i: Microbiology. - : Microbiology Society. - 1350-0872 .- 1465-2080. ; 145, s. 1253-1262
  • Tidskriftsartikel (refereegranskat)abstract
    • Six genes involved in cellulose synthesis in Rhizobium leguminosarum bv. trifolii were identified using Tn5 mutagenesis. Four of them displayed homology to the previously cloned and sequenced Agrobacterium tumefaciens cellulose genes celA, celB, celC and celE. These genes are organized similarly in R. leguminosarum bv. trifolii. In addition, there were strong indications that two tandemly located genes, celR1 and celR2, probably organized as one operon, are involved in the regulation of cellulose synthesis. The deduced amino acid sequences of these genes displayed a high degree of similarity to the Caulobacter crescentus DivK and PleD proteins that belong to the family of two-component response regulators. This is to our knowledge the first report of genes involved in the regulation of cellulose synthesis. Results from attachment assays and electron microscopic studies indicated that cellulose synthesis in R. leguminosarum bv. trifolii is induced upon close contact with plant roots during the attachment process.
  •  
4.
  • BADER, P, et al. (författare)
  • WOOD-INHABITING FUNGI AND SUBSTRATUM DECLINE IN SELECTIVELY LOGGED BOREAL SPRUCE FORESTS
  • 1995
  • Ingår i: Biological Conservation. - 0006-3207 .- 1873-2917. ; 72:3, s. 355-362
  • Tidskriftsartikel (refereegranskat)abstract
    • Eleven Norway spruce Picea abies (L.) Karst. forests in the boreal zone of Sweden were studied to investigate the effects of selective cuttings on wood-inhabiting fungi from the families Polyporaceae, Hymenochaetaceae and Corticiaceae (Basidiomycota). The II sites constitute a gradient from extensively logged to semi-natural forests. Old selective leggings that occurred about 100 years ago have significantly decreased the availability of large and highly decayed logs. Based on fruit bodies, both the total species number as well as the number of threatened species decreased with increasing degree of cutting. Some of the occurring wood-inhabiting fungi are commonly accepted as indicator species of forests with old-growth conditions. These species showed pronounced preferences for well decayed and large logs. They were also more frequent in the less affected sites and became rarer with increasing degree of cutting; they therefore seem to be good indicators of forests less affected by logging.
  •  
5.
  •  
6.
  •  
7.
  • Hedbom, Hans, et al. (författare)
  • A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT
  • 1997
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we present a preliminary evaluation of the security of a non-distributed version of Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. Thus the architecture and security mechanisms of Windows NT have been studied. Furthermore, the paper contains a few examples of successful intrusions on the target system, which was a standard personal computer with Windows NT Workstation 3.51 and one with NT Workstation 4.0, both working in a stand-alone mode. We have also found some evidence that other, more severe security flaws exist in the system
  •  
8.
  • Hedbom, Hans, et al. (författare)
  • A Security Evaluation of a Non-Distributed Version of Windows NT
  • 1997
  • Rapport (refereegranskat)abstract
    • In this paper we present an evaluation of the security in Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. To investigate the latter, the authors, have adopted the role of attackers. This paper contains results from several attempts to violate the security of Windows NT. In some cases, the attempts were successful, meaning that we gained access to information or resources that should be protected. The target systems were standard personal computers with Windows NT Workstation 3.51 and Windows NT Workstation 4.0 respectively, both working in stand-alone mode
  •  
9.
  • Jonsson, Erland, et al. (författare)
  • On the Functional Relation between Security and Dependability Impairments
  • 1999
  • Konferensbidrag (refereegranskat)abstract
    • Problems related to security and dependability/reliability are still treated separately in many contexts. It has been shown that there is a considerable conceptual overlap, however, and an integrated framework for the two disciplines has already been suggested. This paper shows that there is also a conceptual overlap of impairments from these areas and suggests an integrated approach that clarifies the functional relation between these, both from dependability and security viewpoints. The overall objective is to arrive at a general and clear-cut framework that would describe how trustable (dependable, secure) a system is, regardless of the reason for its not being totally trustable. For example, it should be possible to treat a system failure caused by an intentional intrusion or a hardware fault using the same methodology. A few examples from real-world situations are given to support the suggested approach
  •  
10.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 42

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy