Bibliography
A few notes on the bibliography: URLs are used sparingly because the pages they reference tend to move, disappear, or change. URLs are given for some older papers that are hard to locate any other way and that are posted at sites that will probably serve as archives.
The following abbreviations are used in this bibliography.
ACM | Association for Computing Machinery |
Comm | Communications |
Conf | Conference |
Corp | Corporation |
Dept | Department |
IEEE | Institute for Electrical and Electronics Engineers |
Proc | Proceedings |
Symp | Symposium |
Trans | Transactions |
Univ | University |
[ABA94] Abadi, M., and Needham, R. "Prudent Engineering Practice for Cryptographic Protocols." Proc IEEE Symp on Security & Privacy , 1994, p122136.
[ABB76] Abbott, R., et al. "Security Analysis and Enhancements of Computer Operating Systems." NBS Tech Report , NBSIR-76-1041, 1976.
[ABR87] Abrams, M., and Podell, H. Computer & Network SecurityTutorial . IEEE Computer Society Press, 1987.
[ACT02] ActivNewsletter. "Lloyd's TSB Secures Online Banking Services with ActivCard Gold." ActivNewsletter , Feb 2002.
[ADA89] Adam, N., and Wortman, J. "Security-Control Methods for Statistical Databases: A Study." ACM Computing Surveys , v21 n4, Dec 1989, p515556.
[ADA92a] Adam, J. "Threats and Countermeasures." IEEE Spectrum , v29 n8, Aug 1992, p2128.
[ADA92b] Adam, J. "Cryptography = Privacy?" IEEE Spectrum , v29 n8, Aug 1992, p2935.
[ADA92c] Adam, J. "Data Security." IEEE Spectrum , v29 n8, Aug 1992, p1920.
[ADA92d] Adam, J., ed. "A Security Roundtable." IEEE Spectrum , v29 n8, Aug 1992, p4144.
[ADA95] Adam, J. "The Privacy Problem." IEEE Spectrum , v32 n12, Dec 1995, p4652.
[ADL82] Adleman, L. "On Breaking the Iterated MerkleHellman Public-Key Cryptosystem." Proc Crypto Conf , 1982, p303308.
[ADL83] Adleman, L. "On Breaking Generalized Knapsack Public Key Cryptosystems." Proc ACM Symp Theory of Computing , 1983, p402412.
[AFS83] AFSB (Air Force Studies Board). "Multilevel Data Management Security." National Academy of Sciences Report , 1983.
[AGN84] Agnew, G., et al. "Secrecy and Privacy in a Local Area Network Environment." Proc Eurocrypt Conf , 1984, p349357.
[AGN88] Agnew, G., et al. "A Secure Public Key Protocol Based on Discrete Exponentiation." Proc Eurocrypt Conf , 1988.
[AGR00] Agrawal, R., and Srikant, R. "Privacy-Preserving Data Mining." Proc ACM SIGMOD Conf on Management of Data , May 2000.
[AIR00] U.S. Air Force. "Operational Risk Management." Air Force Policy Directive , 90-9, 1 Apr 2000.
[AKL83] Akl, S. "Digital Signatures: A Tutorial Survey." IEEE Computer , v16 n2, Feb 1983, p1526.
[ALB01] Alberts, C., et al. "OCTAVE Catalog of Practices." Software Engineering Institute Technical Report , CMU/SEI-2001-TR-020, Oct 2001.
[ALB99] Alberts, C., et al. "Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)" Software Engineering Institute Technical Report , CMU/SEI-99-TR-017, Jun 1999.
[ALE96] Aleph One. "Smashing the Stack for Fun and Profit." Phrack , v7 n49, Nov 1996.
[ALL99] Allen, J., et al. "State of the Practice of Intrusion Detection Technologies." Software Engineering Institute Technical Report , CMU/SEI-99-TR-028, 1999.
[AME83] Ames, S., et al. "Security Kernel Design and Implementation: An Introduction." IEEE Computer , v16 n7, Jul 1983, p1423.
[AND01] Anderson, R. Security Engineering: Guide to Building Dependable Distributed Systems . Wiley, 2001.
[AND02] Anderson, R. "Security in Open versus Closed SystemsThe Dance of Boltzmann, Coase and Moore." Proc Open Source Software Conf: Economics, Law and Policy , Toulouse, France, 21 Jun 2002.
[AND02a] Anderson, R. "Unsettling Parallels Between Security and the Environment." Presentation at Univ of California Berkeley Workshop , 2002.
[AND72] Anderson, J. "Computer Security Technology Planning Study." U.S. Air Force Electronic Systems Division , TR-73-51, Oct 1972. URL: http://csrc.nist.gov/publications/history/ande72.pdf.
[AND80] Anderson, J. "Computer Security Threat Monitoring and Surveillance." James P. Anderson Co. Technical Report , 1980.
[AND82] Anderson, J. "Accelerating Computer Security Innovation." Proc IEEE Symp on Security & Privacy , 1982, p9197.
[AND85] Anderson, J. "A Unification of Computer and Network Security Concepts." Proc IEEE Symp on Security & Privacy , 1985, p7787.
[AND94] Anderson, R. "Why Cryptosystems Fail." Comm of the ACM , v37 n11, Nov 1994, p3241.
[AND98] Anderson, R. "The DeCODE Proposal for an Icelandic Health Database." unpublished report , 20 Oct 1998.
[AND98a] Anderson, R., et al. "Serpent: A Proposal for the Advanced Encryption Standard." unpublished report , undated. URL: http://www.cs.technion.ac.il/~biham/Reports/Serpent.
[ANT02] Antn, P., et al. "Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology." RAND Corp Technical Report , MR-1601-DARPA, 2002.
[ARB97] Arbaugh, W., et al. "A Secure and Reliable Bootstrap Architecture." Proc IEEE Symp on Security & Privacy , 1997, p6571.
[ASL95] Aslam, T. "A Taxonomy of Security Faults in the UNIX Operating System." Purdue Univ Dept of Computer Science Master's Thesis , Aug 1995.
[ATT76] Attanasio, C., et al. "A Study of VM/370 Integrity." IBM Systems Journal , v15 n1, 1976, p102116.
[BAD89] Badger, L. "A Model for Specifying Multi-Granularity Integrity Policies." Proc IEEE Symp on Security & Privacy , 1989, p269277.
[BAD91a] Badger, L. "Covert Channel Analysis Planning for Large Systems." TIS Technical Report , Trusted Information Systems, Feb 1991.
[BAD91b] Badger, L. "TMach Covert Channel Analysis Plan." TIS Technical Report , Trusted Information Systems, Jan 1991.
[BAH02] Bahadur, G., et al. Privacy Defended: How to Protect Your Privacy and Secure Your PC . Que, 2002.
[BAL85] Baldwin, R., and Gramlich, W. "Cryptographic Protocol for Trustable Match Making." Proc IEEE Symp on Security & Privacy , 1985.
[BAL93] Balenson, D. "Privacy Enhancement for Internet Electronic Mail, Part III." Internet report , RFC 1423: Algorithms, Modes, Identifiers, Feb 1993.
[BAM82] Bamford, J. The Puzzle Palace . Houghton Mifflin, 1982.
[BAR90] Barker, W., and Pfleeger, C. "Civil and Military Applications of Trusted Systems Criteria." TIS Technical Report , 304, Feb 1990.
[BAR92] Barlow, J. "Decrypting the Puzzle Palace." Comm of the ACM , v35 n7, Jul 1992, p2531.
[BAR99] Barwick, C., et al. "The MARS Encryption Algorithm." unpublished IBM Corp Technical Report , 27 Aug 1999. URL: http://www.research.ibm.com/security/mars.html.
[BEA88] Beauchemin, P., et al. "The Generation of Random Numbers That Are Probably Prime." Journal Cryptology , v1 n1, 1988, p5364.
[BEC80] Beck, L. "A Security Mechanism for Statistical Data Bases." ACM Trans on Data Base Systems , v5 n3, Sep 1980, p316338.
[BEK82] Beker, H., and Piper, F. Cipher Systems . Northwood Books, 1982.
[BEL02] Belcher, T., and Yoram, E. "Riptech Internet Security Threat Report." Riptech, Inc Technical Report , vII, Jul 2002.
[BEL73] Bell, D., and La Padula, L. "Secure Computer Systems: Mathematical Foundations and Model." MITRE Report , MTR 2547 v2, Nov 1973.
[BEL76] Bell, D., and La Padula, L. "Secure Computer Systems: Unified Exposition and Multics Interpretation." U.S. Air Force Electronic Systems Division Technical Report , ESD-TR-75-306, 1976. URL: http://csrc.nist.gov/publications/history/bell76.pdf