Bibliography

[biblio01entry01] 1. M. Abadi, “Explicit Communication Revisited: Two New Attacks on Authentication Protocols,” IEEE Transactions on Software Engineering 23 (3), pp. 185–186 (Mar. 1997).

[biblio01entry02] 2. M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 122–136 (May 1994).

[biblio01entry03] 3. R. Abbott, J. Chin, J. Donnelley, W. Konigsford, S. Tokubo, and D. Webb, “Security Analysis and Enhancements of Computer Operating Systems,” Technical Report NBSIR 76–1041, ICET, National Bureau of Standards, Washington, DC 20234 (Apr. 1976).

[biblio01entry04] 4. M. Abrams and D. Bailey, “Abstraction and Refinement of Layered Security Policy,” in Information Security: An Integrated Collection of Essays [6], pp. 126–136.

[biblio01entry05] 5. M. Abrams and P. Brusil, “Application of the Common Criteria to a System: A Real-World Example,” Computer Security Journal 16 (2), pp. 11–21 (Spring 2000).

[biblio01entry06] 6. M.Abrams, S.Jajodia, and H.Podell (eds.), Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA (<year>1975</year>).

[biblio01entry07] 7. C. Adams and S. Lloyd, Understanding the Public-Key Infrastructure, Macmillan, New York, NY (<year>1999</year>).

[biblio01entry08] 8. E. Adams and S. Muchnick, “Dbxtool: A Window-Based Symbolic Debugger for Sun Workstations,” Software—Practice and Experience 16 (7), pp. 653–669 (July 1986).

[biblio01entry09] 9. L. Adleman, “An Abstract Theory of Computer Viruses,” Advances in Cryptology—Proceedings of CRYPTO '88 (<year>1988</year>).

[biblio01entry10] 10. L. Adleman, C. Pomerance, and R. Rumley, “On Distinguishing Prime Numbers from Composite Numbers,” Annals of Mathematics 117 (1), pp. 173–206 (1983).

[biblio01entry11] 11. Adobe Systems, Inc., PostScript Language Reference, 3rd Edition, Addison-Wesley, Reading, MA (<year>1999</year>).

[biblio01entry12] 12. G. Agnew, “Random Sources for Cryptographic Systems,” Advances in Cryptology—Proceedings of EUROCRYPT '87, pp. 77–81 (<year>1988</year>).

[biblio01entry13] 13. Aleph One, “Smashing the Stack,” PHRACK 7 (49), File 14 (1998).

[biblio01entry14] 14. S. Alexander and R. Droms, DHCP Options and BOOTP Vendor Extensions, RFC 2132 (Mar. 1997).

[biblio01entry15] 15. J. Allen, The CERT® Guide to System and Network Security Practices, Addison-Wesley, Boston, MA (<year>2001</year>).

[biblio01entry16] 16. P. Allen, “A Comparison of Non-Interference and Non-Deducibility Using CSP,” Proceedings of the Computer Security Foundations Workshop IV, pp. 43–54 (June 1991).

[biblio01entry17] 17. J. Alves-Foss, D. Frincke, and G. Saghi, “Applying the TCSEC Guidelines to a Real-Time Embedded System Environment,” Proceedings of the 19th National Information Systems Security Conference, pp. 89–97 (Oct. 1996).

[biblio01entry18] 18. P. Ammann and P. Black, “A Specification-Based Coverage Metric to Evaluate Test Sets,” Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering, pp. 239–248 (Nov. 1999).

[biblio01entry19] 19. P. Ammann and R. Sandhu, “Expressive Power of the Schematic Protection Model (Extended Abstract),” Proceedings of the Computer Security Foundations Workshop, MITRE Technical Report M88-37 MITRE Corporation, Bedford, MA, pp. 188–193 (June 1988).

[biblio01entry20] 20. P. Ammann and R. Sandhu, “The Extended Schematic Protection Model,” Journal of Computer Security 1 (3, 4), pp. 335–385 (1992).

[biblio01entry21] 21. P. Ammann, R. Sandhu, and R. Lipton, “The Expressive Power of Multi-Parent Creation in Monotonic Access Control Models,” Journal of Computer Security 4 (2, 3), pp. 149–166 (Dec. 1996).

[biblio01entry22] 22. E. Amoroso, Intrusion Detection, Intrusion.net Books, Sparta, NJ (<year>1999</year>).

[biblio01entry23] 23. E. Amoroso, T. Nguyen, J. Weiss, J. Watson, P. Lapiska, and T. Starr, “Towards an Approach to Measuring Software Trust,” Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pp. 198–218 (May 1991).

[biblio01entry24] 24. R. Anand, N. Islam, T. Jaeger, and J. Rao, “A Flexible Security Model for Using Internet Content,” Proceedings of the 16th Symposium on Reliable Distributed Systems, pp. 89–96 (Oct. 1997).

[biblio01entry25] 25. J. Anderson, “Information Security in a Multi-User Computer Environment,” in MorrisRubinoff (ed.), Advances in Computers 12, Academic Press, New York, NY (1972).

[biblio01entry26] 26. J. Anderson, “Computer Security Technology Planning Study,” Technical Report ESD-TR-73–51, Electronic Systems Division, Hanscom Air Force Base, Hanscom, MA (1974).

[biblio01entry27] 27. J. Anderson, “Computer Security Threat Monitoring and Surveillance,” James P. Anderson Co., Fort Washington, PA (<year>1980</year>).

[biblio01entry28] 28. J. Anderson, “On the Feasibility of Connecting RECON to an External Network,” James P. Anderson Co., Fort Washington, PA (1981).

[biblio01entry29] 29. R. Anderson, “UEPS—A Second Generation Electronic Wallet,” Proceedings of the 2nd European Symposium on Research in Computer Security, pp. 411–418 (Nov. 1992).

[biblio01entry30] 30. R. Anderson, “A Security Policy Model for Clinical Information Systems,” Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 34–48 (May 1996).

[biblio01entry31] 31. R. Anderson and A. Johnston, UNIX® Unleashed, 4th Edition, SAMS Publishing, Indianapolis, IN (<year>2002</year>).

[biblio01entry32] 32. R. Anderson and R. Needham, “Robustness Principles for Public Key Protocols,” Advances in Cryptology—Proceedings of CRYPTO '95, pp. 236–247 (<year>1995</year>).

[biblio01entry33] 33. N. Andrews, “A Standard for Assuring/Monitoring Telephony Switching Real Time Performance,” Proceedings of the 1990 IEEE Global Telecommunications Conference and Exhibition, pp. 237–240 (Dec. 1990).

[biblio01entry34] 34. G. Andrews and R. Reitman, “An Axiomatic Approach to Information Flow in Parallel Programs,” ACM Transactions on Programming Languages 2 (1), pp. 56–76 (Jan. 1980).

[biblio01entry35] 35. A. Appel and A. Felty, “A Semantic Model of Types and Machine Instructions for Proof-Carrying Code,” Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 243–253 (Jan. 2000).

[biblio01entry36] 36. R. Arbo, E. Johnson, and R. Sharp, “Extending Mandatory Access Controls to a Networked MLS Environment,” Proceedings of the 12th National Computer Security Conference, pp. 286–295 (Oct. 1990).

[biblio01entry37] 37. M. Ardis, J. Chaves, L. Jagadeesan, P. Mataga, C. Puchol, M. Staskauskas, and J. von Olnhausen, “A Framework for Evaluating Specification Methods for Reactive Systems Experience Report,” IEEE Transactions on Software Engineering 22 (6), pp. 378–389 (June 1996).

[biblio01entry38] 38. J. Arnold, “Analysis Requirements for Low Assurance Evaluations,” Proceedings of the 18th National Information Systems Security Conference, pp. 356–365 (Oct. 1995).

[biblio01entry39] 39. N. Arnold, UNIX Security: A Practical Tutorial, McGraw-Hill, New York, NY (<year>1993</year>).

[biblio01entry40] 40. A. Arsenault and R. Housley, “Protection Profiles for Certificate Issuing and Management Systems,” Proceedings of the 22nd National Information Systems Security Conference, pp. 189–199 (Oct. 1999).

[biblio01entry41] 41. J. Ashworth, The Naming of Hosts, RFC 2100 (Apr. 1997).

[biblio01entry42] 42. T. Aslam, “A Taxonomy of Security Faults in the UNIX Operating System,” Master's Thesis, Department of Computer Sciences, Purdue University, West Lafayette, IN (1995).

[biblio01entry43] 43. T. Aslam, I. Krsul, and E. H. Spafford, “Use of a Taxonomy of Security Faults,” Proceedings of the 19th National Information Systems Security Conference, pp. 551–560 (Oct. 1996).

[biblio01entry44] 44. C. Asmuth and J. Bloom, “A Modular Approach to Key Safeguarding,” IEEE Transactions on Information Theory 29 (2), pp. 208–210 (Mar. 1983).

[biblio01entry45] 45. S. Atkinson and D. Scholefield, “Transformational vs. Reactive Refinement in Real-Time Systems,” Information Processing Letters 55 (4), pp. 201–210 (Apr. 1995).

[biblio01entry46] 46. V. Atluri, E. Betino, and S. Jajodia, “Achieving Stricter Correctness Requirements in Multilevel Secure Databases,” Proceedings of the 1993 Symposium on Research in Security and Privacy, pp. 135–147 (May 1993).

[biblio01entry47] 47. C. Augier, “Excel-lent Leaks,” Risks Digest 21 (39) (May 2001).

[biblio01entry48] 48. A. Avizienis, “The N-Version Approach to Fault-Tolerant Software,” IEEE Transactions on Software Engineering 11 (12), pp. 1491–1501 (Dec. 1985).

[biblio01entry49] 49. S. Axelsson, “The Base-Rate Fallacy and the Difficulty of Intrusion Detection,” ACM Transactions on Information and System Security 3 (3), pp. 186–205 (Aug. 2000).

[biblio01entry50] 50. A. Bacard, The Computer Privacy Handbook, Peachpit Press, Berkeley, CA (<year>1995</year>).

[biblio01entry51] 51. A. Bacard, “Anonymous Remailer FAQ” (Nov. 1999); available at http://www.andrebacard.com/remail.html.

[biblio01entry52] 52. R. Bace, Intrusion Detection, Macmillan Technical Publishing, Indianapolis, IN (<year>2000</year>).

[biblio01entry53] 53. L. Badger, “Information Security: From Reference Monitors to Wrappers,” IEEE Aerospace and Electronic Systems Magazine 13 (3), pp. 32–34 (Mar. 1998).

[biblio01entry54] 54. L. Badger, D. Sterne, D. Sherman, and K. Walker, “A Domain and Type Enforcement UNIX Prototype,” Computing Systems 9 (1), pp. 47–83 (Winter 1996).

[biblio01entry55] 55. D. Bailey, “A Philosophy of Security Management,” in Information Security: An Integrated Collection of Essays [6], pp. 98–110.

[biblio01entry56] 56. J. Balasubramaniyan, J. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, “An Architecture for Intrusion Detection Using Autonomous Agents,” Proceedings of the 14th Annual Computer Security Applications Conference, pp. 13–24 (Dec. 1998).

[biblio01entry57] 57. D. Balenson and T. Markham, “ISAKMP Key Recovery Extensions,” Computers and Security 19 (1), pp. 91–99 (Jan./Feb. 2000).

[biblio01entry58] 58. D. Balfanz and D. Simon, “WindowBox: A Simple Security Model for the Connected Desktop,” Proceedings of the 4th USENIX Windows Systems Symposium (Aug. 2000).

[biblio01entry59] 59. M. Banks, Web Psychos, Stalkers, and Pranksters: How to Protect Yourself in Cyberspace, The Coriolis Group (<year>1997</year>).

[biblio01entry60] 60. D. Banning, G. Ellingwood, C. Franklin, C. Muckenhirn, and D. Price, “Auditing of Distributed Systems,” Proceedings of the 14th National Computer Security Conference, pp. 59–68 (Oct. 1991).

[biblio01entry61] 61. D. Barrett, Bandits on the Information Superhighway (What You Need to Know), O'Reilly and Associates (<year>1996</year>).

[biblio01entry62] 62. J. Bartlett, Familiar Quotations, Little, Brown and Co., Boston, MA (<year>1901</year>).

[biblio01entry63] 63. B. Bayh, “Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard (United States Senate Select Committee on Intelligence),” IEEE Communications Society Magazine 16 (6), pp. 53–55 (1978).

[biblio01entry64] 64. D. Bell, “Concerning 'Modeling' of Computer Security,” Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 8–13 (Apr. 1988).

[biblio01entry65] 65. P. Barker and S. Kille, The COSINE and Internet X.500 Schema, RFC 1274 (Nov. 1991).

[biblio01entry66] 66. H. Beker and F. Piper, Cipher Systems: The Protection of Communications, Northwood Books, London, UK (<year>1982</year>).

[biblio01entry67] 67. D. Bell and L. LaPadula, “Secure Computer Systems: Mathematical Foundations,” Technical Report MTR-2547, Vol. I, MITRE Corporation, Bedford, MA (Mar. 1973).

[biblio01entry68] 68. D. Bell and L. LaPadula, “Secure Computer System: Unified Exposition and Multics Interpretation,” Technical Report MTR-2997 Rev. 1, MITRE Corporation, Bedford, MA (Mar. 1975).

[biblio01entry69] 69. M. Bellare, R. Canetti, and H. Krawczyk, “Keyed Hash Functions and Message Authentication,” Advances in Cryptology—Proceedings of CRYPTO '96, pp. 1–15 (<year>1996</year>).

[biblio01entry70] 70. M. Bellare and S. Micali, “Non-Interactive Oblivious Transfer and Applications,” Advances in Cryptology—Proceedings of CRYPTO '89, pp. 547–559 (<year>1989</year>).

[biblio01entry71] 71. M. Bellare and R. Rivest, “Translucent Cryptography—An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer,” Journal of Cryptology 12 (2), pp. 117–139 (Spring 1999).

[biblio01entry72] 72. S. Bellovin, “Security Problems in the TCP/IP Protocol Suite,” Computer Communication Review 19 (2), pp. 32–48 (Apr. 1989).

[biblio01entry73] 73. S. Bellovin, “Using the Domain Name System for System Break-Ins,” Proceedings of the 5th USENIX UNIX Security Symposium, pp. 199–208 (June 1995).

[biblio01entry74] 74. S. Bellovin, “Probable Plaintext Cryptanalysis of the IP Security Protocols,” Proceedings of the 1997 Symposium on Network and Distributed System Security, pp. 52–59 (Feb. 1997).

[biblio01entry75] 75. S. Bellovin and W. Cheswick, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, Reading, MA (<year>1994</year>).

[biblio01entry76] 76. S. Bellovin and M. Merritt, “Limitations of the Kerberos Protocol,” Proceedings of the 1991 Winter USENIX Conference, pp. 253–267 (Jan. 1991).

[biblio01entry77] 77. S. Bellovin and M. Merritt, “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks,” Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy, pp. 74–82 (May 1992).

[biblio01entry78] 78. F. Belvin, D. Bodeau, and S. Razvi, “Design Analysis in Evaluations Against the TCSEC C2 Criteria,” Proceedings of the 19th National Information Systems Security Conference, pp. 67–75 (Oct. 1996).

[biblio01entry79] 79. J. Bennett, “Analysis of the Encryption in Word Perfect,” Cryptologia 11 (4), pp. 206–210 (Oct. 1987).

[biblio01entry80] 80. S. Berezin and A. Groce, “SyMP: The User's Guide,” Computer Science Dept., Carnegie Mellon University (Dec. 2000); available at http://www-2.cs.cmu.edu/~modelcheck/symp.

[biblio01entry81] 81. F. Bergadano, B. Crispo, and G. Ruffo, “Proactive Password Checking with Decision Trees,” Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 67–77 (Nov. 1998).

[biblio01entry82] 82. F. Bergadano, B. Crispo, and G. Ruffo, “High Dictionary Compression for Proactive Password Checking,” ACM Transactions on Information and System Security 1 (1), pp. 3–25 (Apr. 1997).

[biblio01entry83] 83. H. Bergen and W. Caelli, “File Security in WordPerfect 5.0,” Cryptologia 15 (1), pp. 57–66 (Jan. 1991).

[biblio01entry84] 84. A. Bernstein, “Analysis of Programs for Parallel Processing,” IEEE Transactions on Computers 15 (5), pp. 757–762 (Oct. 1966).

[biblio01entry85] 85. C. Bernstein and B. Woodward, All the President's Men, Simon and Schuster, New York, NY (<year>1974</year>).

[biblio01entry86] 86. C. Bernstein and B. Woodward, The Final Days, Simon and Schuster, New York, NY (<year>1976</year>).

[biblio01entry87] 87. D. Bernstein and E. Schenk, “Syncookies Mailing List Archive” (Oct. 1996); available at http://cr.yp.to/syncookies.html.

[biblio01entry88] 88. B. Bershad and C. Pinkerton, “Watchdogs: Extending the UNIX File System,” Proceedings of the 1988 Winter USENIX Conference, pp. 267–276 (Feb. 1988).

[biblio01entry89] 89. B. Bershad, S. Savage, P. Pardyak, E. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers, “Extensibility, Safety, and Performance in the SPIN Operating System,” Proceedings of the 15th Symposium on Operating Systems Principles, pp. 267–284 (Dec. 1995).

[biblio01entry90] 90. V. Berzins, Software Engineering with Abstractions, Addison-Wesley, Reading, MA (<year>1991</year>).

[biblio01entry91] 91. T. Beth, H.-J. Knobloch, M. Otten, G. Simmons, and P. Wichmann, “Towards Acceptable Key Escrow Systems,” Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 51–58 (Nov. 1994).

[biblio01entry92] 92. W. Bevier and W. Young, “A State-Based Approach to Noninterference,” Journal of Computer Security 3 (1), pp. 55–70 (1994/1995).

[biblio01entry93] 93. R. Bharadwaj and C. Heitmeyer, “Developing High Assurance Avionics Systems with the SCR Requirements Method,” Proceedings of the 19th Digital Avionics Systems Conference, pp. 1D1/1–8 (Oct. 2000).

[biblio01entry94] 94. K. Biba, “Integrity Considerations for Secure Computer Systems,” Technical Report MTR-3153, MITRE Corporation, Bedford, MA (Apr. 1977).

[biblio01entry95] 95. E. Biham and A. Shamir, “Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI, and Lucifer,” Advances in Cryptology—Proceedings of CRYPTO '91, pp. 156–171 (Aug. 1991).

[biblio01entry96] 96. E. Biham and A. Shamir, “Differential Cryptanalysis of DES-Like Cryptosystems,” Journal of Cryptology 4 (1), pp. 3–72 (1991).

[biblio01entry97] 97. E. Biham and A. Shamir, “Differential Cryptanalysis of the Full 16-Round DES,” Advances in Cryptology—Proceedings of CRYPTO '92, pp. 487–496 (<year>1992</year>).

[biblio01entry98] 98. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, NY (<year>1993</year>).

[biblio01entry99] 99. E. Bina, R. McCool, V. Jones, and M. Winslett, “Secure Access to Data Over the Internet,” Proceedings of the 3rd International Conference on Parallel and Distributed Information Systems, pp. 99–102 (Sep. 1984).

[biblio01entry100] 100. R. Biro, F. van Kempen, M. Evans, C. Minyard, F. La Roche, C. Hedrick, L. Torvalds, A. Cox, M. Dillon, A. Gulbrandsen, and J. Cwik, Linux Kernel 2.4.9 Networking Source Code, directory linux/net/ipv4 (Aug. 2001).

[biblio01entry101] 101. R. Bisbey, II and D. Hollingworth, “Protection Analysis: Final Report,” Technical Report ISI/SR-78–13, University of Southern California Information Sciences Institute, Marina Del Rey, CA (May 1978).

[biblio01entry102] 102. R. Bisbey, II, G. Popek, and J. Carlstedt, “Protection Errors in Operating Systems: Inconsistency of a Single Data Value Over Time,” Technical Report ISI/SR-75–4, University of Southern California Information Sciences Institute, Marina Del Rey, CA (Dec. 1975).

[biblio01entry103] 103. M. Bishop, “Security Problems with the UNIX Operating System” (unpublished) (Jan. 1981).

[biblio01entry104] 104. M. Bishop, “Sendmail Wizardry,” Research Memo 86.3, Research Institute for Advanced Computer Science, NASA Ames Research Center, Moffett Field, CA (Jan. 1986).

[biblio01entry105] 105. M. Bishop, “The RIACS Intelligent Auditing and Checking System,” Technical Report 86.3, Research Institute for Advanced Computer Science, NASA Ames Research Center, Moffett Field, CA (June 1986).

[biblio01entry106] 106. M. Bishop, “Analyzing the Security of an Existing Computer System,” Proceedings of the 1986 Fall Joint Computer Conference, pp. 1115–1119 (Nov. 1986).

[biblio01entry107] 107. M. Bishop, “How to Write a Setuid Program,” ;login: 12 (1), pp. 5–11 (Jan. 1987).

[biblio01entry108] 108. M. Bishop, “Profiling Under UNIX by Patching,” Software—Practice and Experience 17 (10), pp. 729–739 (Oct. 1987).

[biblio01entry109] 109. M. Bishop, “An Application of a Fast Data Encryption Standard Implementation,” Computing Systems 1 (3), pp. 221–254 (Summer 1988).

[biblio01entry110] 110. M. Bishop, “Auditing Files on a Network of UNIX Machines,” Proceedings of the USENIX UNIX Security Workshop, pp. 51–52 (Aug. 1988).

[biblio01entry111] 111. M. Bishop, “Collaboration Using Roles,” Software—Practice and Experience 20 (5), pp. 485–497 (May 1990).

[biblio01entry112] 112. M. Bishop, “A Security Analysis of the NTP Protocol Version 2,” Proceedings of the 6th Annual Computer Security Applications Conference, pp. 20–29 (Dec. 1990).

[biblio01entry113] 113. M. Bishop, “Password Management,” Proceedings of COMPCON '91, pp. 167–169 (Feb. 1991).

[biblio01entry114] 114. M. Bishop, “A Proactive Password Checker,” in Information Security, D.T.Lindsay and W.L.Price (eds.), North-Holland, New York, NY, pp. 169–180 (May 1991).

[biblio01entry115] 115. M. Bishop, “Anatomy of a Proactive Password Changer,” Proceedings of the 3rd USENIX Security Symposium, pp. 171–184 (Sep. 1992).

[biblio01entry116] 116. M. Bishop and D. Bailey, “A Critical Analysis of Vulnerability Taxonomies,” Technical Report CSE-96–11, Department of Computer Science, University of California, Davis, CA (Sep. 1996).

[biblio01entry117] 117. M. Bishop and M. Dilger, “Checking for Race Conditions in File Accesses,” Computing Systems 9 (2), pp. 131–152 (Spring 1996).

[biblio01entry118] 118. M. Bishop and D. Klein, “Improving System Security via Proactive Password Checking,” Computers and Security 14 (3), pp. 233–249 (Apr. 1995).

[biblio01entry119] 119. J. Biskup, “Some Variants of the Take-Grant Protection Model,” Information Processing Letters 19 (3), pp. 151–156 (Mar. 1984).

[biblio01entry120] 120. J. Biskup and U. Flegel, “Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection,” Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, pp. 28–48 (Oct. 2000).

[biblio01entry121] 121. G. Blakley, “Safeguarding Cryptographic Keys,” 1979 National Computer Conference, AFIPS Conference Proceedings 48, pp. 313–317 (Nov. 1979).

[biblio01entry122] 122. G. Blakley, “One-Time Pads are Key Safeguarding Schemes, Not Cryptosystems: Fast Key Safeguarding Schemes (Threshold Schemes) Exist,” Proceedings of the 1980 IEEE Symposium on Security and Privacy, pp. 108–113 (Apr. 1980).

[biblio01entry123] 123. M. Blaze, “Protocol Failure in the Escrowed Encryption Standard,” Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 59–67 (Nov. 1994).

[biblio01entry124] 124. W. Boebert, “On the Inability of an Unmodified Capability Machine to Enforce the *-Property,” Proceedings of the 7th DOD/NBS Computer Security Conference, pp. 291–293 (Sep. 1984).

[biblio01entry125] 125. W. Boebert and C. Ferguson, “A Partial Solution to the Discretionary Trojan Horse Problem,” Proceedings of the 8th National Computer Security Conference, pp. 245–253 (Sep. 1985).

[biblio01entry126] 126. W. Boebert and R. Kain, “A Practical Alternative to Hierarchical Integrity Policies,” Proceedings of the 8th National Computer Security Conference, p. 18 (Oct. 1985).

[biblio01entry127] 127. W. Boebert, W. Young, R. Kain, and S. Hansohn, “Secure Ada Target: Issues, System Design, and Verification,” Proceedings of the 1985 IEEE Symposium on Security and Privacy, pp. 176–183 (Apr. 1985).

[biblio01entry128] 128. D. Bolignano, D. Le Metayer, and C. Loiseaux, “Formal Methods in Context: Security and Java Card,” Proceedings of the 1st International Workshop on Java on Smart Cards: Programming and Security, pp. 1–5 (Sep. 2000).

[biblio01entry129] 129. T. Bolognesi and E. Brinksma, “Introduction to the ISO Specification Language LOTOS,” Computer Networks 14 (1), pp. 25–59 (Jan. 1988).

[biblio01entry130] 130. J.-P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. Mjølsnes, F. Muller, T. Pedersen, B. Pfitzmann, P. De Rooji, B. Schoenmakers, M. Schunter, L. Vallee, and M. Waidner, “The ESPRIT Project CAFE—High Security Digital Payment Systems,” Proceedings of the 3rd European Symposium on Research in Computer Security, pp. 217–229 (Nov. 1994).

[biblio01entry131] 131. A. Bomberger, A. Frantz, W. Frantz, A. Hardy, N. Hardy, C. Landau, and J. Shapiro, “The KeyKOS Nanokernel Architecture,” Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, pp. 95–112 (Apr. 1992).

[biblio01entry132] 132. D. Bonyun, “The Role of a Well-Defined Auditing Process in the Enforcement of Privacy Policy and Data Security,” Proceedings of the 1981 IEEE Symposium on Security and Privacy, pp. 19–26 (<year>1981</year>).

[biblio01entry133] 133. D. Bonyun, “The Use of Architectural Principles in the Design of Certifiably Secure Systems,” Computers and Security 2 (2), pp. 153–162 (June 1983).

[biblio01entry134] 134. A. Borrett, “A Perspective of Evaluation in the UK Versus the US,” Proceedings of the 18th National Information Systems Security Conference, pp. 322–334 (Oct. 1995).

[biblio01entry135] 135. M. Bovee, D. Paul, and K. Nelson, “A Framework for Assessing the Use of Third-Party Software Quality Assurance Standards to Meet FDA Medical Device Software Process Control Guidelines,” IEEE Transactions on Engineering Management 48 (4), pp. 465–478 (Nov. 2001).

[biblio01entry136] 136. J. Bowen and M. Hinchley, “Ten Commandments of Formal Methods,” IEEE Computer 28 (4), pp. 56–63 (Apr. 1995).

[biblio01entry137] 137. J. Bowen and M. Hinchley, “Seven More Myths of Formal Methods,” IEEE Software 12 (4), pp. 34–41 (July 1995).

[biblio01entry138] 138. R. Bowen, K. Coar, and M. Marlowe, Apache Server Unleashed, SAMS Publishing, Indianapolis, IN (<year>2000</year>).

[biblio01entry139] 139. J. Boyer, “Inferring Sequences Produced by Pseudo-Random Number Generators,” Journal of the ACM 36 (1), pp. 129–141 (Jan. 1989).

[biblio01entry140] 140. J. Boyer, “Inferring Sequences Produced by a Linear Congruential Generator Missing Low-Order Bits,” Journal of Cryptology 1 (3), pp. 177–184 (1989).

[biblio01entry141] 141. R. Boyer and J. Moore, “Proving Theorems About LISP Functions,” Journal of the ACM 22 (1), pp. 129–144 (Jan. 1975).

[biblio01entry142] 142. S. Brackin, C. Meadows, and J. Millen, “CAPSL Interface for the NRL Protocol Analyzer,” Proceedings of the 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology, pp. 64–73 (Mar. 1999).

[biblio01entry143] 143. K. Brady, “Integrating B2 Security into a UNIX System,” Proceedings of the 14th National Computer Security Conference, pp. 338–346 (Oct. 1991).

[biblio01entry144] 144. S. Brands, “Electronic Cash on the Internet,” Proceedings of the 1995 Symposium on Network and Distributed System Security, pp. 64–84 (Feb. 1995).

[biblio01entry145] 145. C. Braun, UNIX™ System Security Essentials, Addison-Wesley, Reading, MA (<year>1995</year>).

[biblio01entry146] 146. D. Brewer and M. Nash, “The Chinese Wall Security Policy,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214 (May 1989).

[biblio01entry147] 147. E. Brickell and D. Stinson, “The Detection of Cheaters in Threshold Schemes,” Advances in Cryptology—Proceedings of CRYPTO '88 pp. 564–577 (Aug. 1988).

[biblio01entry148] 148. P. Brinch Hansen, Operating System Principles, Prentice-Hall, Englewood Cliffs, NJ (<year>1973</year>).

[biblio01entry149] 149. F. Brooks, The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, Addison-Wesley, Reading, MA (<year>1995</year>).

[biblio01entry150] 150. L. Brown, J. Pieprzyk, and J. Seberry, “LOKI: A Cryptographic Primitive for Authentication and Secrecy Applications,” Advances in Cryptology—Proceedings of AUSCRYPT '90, pp. 229–236 (Jan. 1990).

[biblio01entry151] 151. L. Brown, M. Kwan, J. Pieprzyk, and J. Seberry, “Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI,” Advances in Cryptology—Proceedings of ASIACRYPT '91, pp. 36–50 (<year>1991</year>).

[biblio01entry152] 152. M. Brown and S. Rodgers, “User Identification via Keystroke Characteristics of Typed Names Using Neural Networks,” International Journal of Man-Machine Studies 39 (6), pp. 999–1014 (1993).

[biblio01entry153] 153. R. Browne, “Mode Security: An Infrastructure for Covert Channel Suppression,” Proceedings of the 1994 Symposium on Research In Privacy and Security, pp. 39–45 (May 1994).

[biblio01entry154] 154. T. Budd, “Safety in Grammatical Protection Systems,” International Journal of Computer and Information Sciences 12 (6), pp. 413–431 (1983).

[biblio01entry155] 155. J. Bull, L. Gong, and K. Sollins, “Towards Security in an Open Systems Federation,” Proceedings of the 2nd European Symposium on Research in Computer Security, pp. 3–20 (Nov. 1992).

[biblio01entry156] 156. G. Bullough, J. Loomis, and P. Weiss, “An Assertion Mapping Approach to Software Test Design,” Proceedings of the 13th National Computer Security Conference, pp. 266–276 (Oct. 1990).

[biblio01entry157] 157. J. Burch, E. Clarke, D. Long, K. McMillan, and D. Dill, “Symbolic Model Checking for Sequential Circuit Verification,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 13 (4), pp. 401–424 (Apr. 1994).

[biblio01entry158] 158. J. Burch, E. Clarke, K. McMillan, D. Dill, and L. Hwang, “Symbolic Model Checking: 1020 States and Beyond,” Information and Computation 98 (2), pp. 142–170 (June 1992).

[biblio01entry159] 159. M. Burgess, “A Site Configuration Engine,” Computing Systems 8 (1), pp. 309–324 (Winter 1995).

[biblio01entry160] 160. M. Burgess, “Automated System Administration with Feedback Regulation,” Software—Practice and Experience 28 (14), pp. 1519–1530 (Dec. 1998).

[biblio01entry161] 161. M. Burgess, “Theoretical System Administration,” Proceedings of the 14th Systems Administration Conference (LISA 2000), pp. 1–13 (Dec. 2000).

[biblio01entry162] 162. M. Burmester, Y. Desmedt, and J. Seberry, “Equitable Key Escrow with Limited Time Span (Or, How to Enforce Time Expiration Cryptographically),” Advances in Cryptology—Proceedings of ASIACRYPT '98, pp. 380–391 (Oct. 1998).

[biblio01entry163] 163. M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Transactions on Computer Systems 8 (1), pp. 18–36 (Feb. 1990).

[biblio01entry164] 164. J. Burton, The Pentagon Wars: Reformers Challenge the Old Guard, Naval Institute Press, Annapolis, MD (<year>1993</year>).

[biblio01entry165] 165. W. Caelli and A. Rhodes, “An Evaluation of HP-UX (UNIX) for Database Protection Using the European ITSEC,” Computers and Security 11 (5), pp. 463–479 (Sep. 1992).

[biblio01entry166] 166. B. Callaghan, B. Pawlowski, and P. Staubach, NFS Version 3 Protocol Specification, RFC 1813 (June 1995).

[biblio01entry167] 167. J. Callas, L. Donnerhacke, H. Finney, and R. Thayer, OpenPGP Message Format, RFC 2440 (Nov. 1998).

[biblio01entry168] 168. B. Calloni, M. DelPrincipe, T. Marz, and K. Littlejohn, “INSERT: a COTS-Based Solution for Building High-Assurance Applications,” Proceedings of the 18th Digital Avionics Systems Conference, pp. 2.D.6–8 (Oct. 1999).

[biblio01entry169] 169. J. Campbell,, Jr., “Speaker Recognition: A Tutorial,” Proceedings of the IEEE 85 (9), pp. 1437–1462 (Sep. 1997).

[biblio01entry170] 170. M. Campione, K. Walrath, A. Huml, and the Tutorial Team, The Java™ Tutorial Continued: The Rest of the JDK™, Addison-Wesley, Reading, MA (<year>1999</year>).

[biblio01entry171] 171. S. Campos, E. Clarke, W. Marrero, and M. Minea, “Verus: A Tool for Quantitative Analysis of Finite-State Real-Time Systems,” Proceedings of the ACM SIGPLAN 1995 Workshop on Languages, Compilers, and Tools for Real-Time Systems, pp. 70–78 (Nov. 1995).

[biblio01entry172] 172. S. Campos, E. Clarke, and M. Minea, “Symbolic Techniques for Formally Verifying Industrial Systems,” Science of Computer Programming 29 (1–2), pp. 79–98 (July 1997).

[biblio01entry173] 173. Canadian System Security Centre, The Canadian Trusted Computer Product Evaluation Criteria, Version 3.0e (Jan. 1993).

[biblio01entry174] 174. J. Canoles, “Quality Assurance in the ATC System,” Proceedings of the 44th Annual Air Traffic Control Association Conference, pp. 151–153 (Sep. 1999).

[biblio01entry175] 175. G. Caronni, S. Kumar, C. Schuba, and G. Scott, “Virtual Enterprise Networks: the Next Generation of Secure Enterprise Networking,” Proceedings of the 16th Annual Computer Security Applications Conference, pp. 42–51 (Dec. 2000).

[biblio01entry176] 176. L. Carroll, The Annotated Alice, New American Library, New York, NY (<year>1960</year>).

[biblio01entry177] 177. L. Chalmers, “An Analysis of the Differences Between the Computer Security Practices in the Military and Private Sector,” Proceedings of the 1986 IEEE Symposium on Privacy and Security, pp. 71–74 (Apr. 1986).

[biblio01entry178] 178. R. Chandramouli, “Implementation of Multiple Access Control Policies Within a CORBASEC Framework,” Proceedings of the 22nd National Information Systems Security Conference, pp. 112–130 (Oct. 1999).

[biblio01entry179] 179. K. Chandy and L. Lamport, “Distributed Snapshots: Determining Global States of Distributed Systems,” ACM Transactions on Computer Systems 3 (1), pp. 63–75 (Feb. 1985).

[biblio01entry180] 180. F. Chang, A. Itzkovitz, and V. Karamcheti, “User-Level Resource-Constrained Sandboxing,” Proceedings of the 4th USENIX Windows Systems Symposium, pp. 25–35 (Aug. 2000).

[biblio01entry181] 181. D. Chapman, “Network (In)security Through IP Packet Filtering,” Proceedings of the 3rd USENIX UNIX Security Symposium, pp. 63–76 (Sep. 1992).

[biblio01entry182] 182. D. Chapman, Developing Secure Applications with Visual Basic, Microsoft Press, Redmond, WA (<year>2000</year>).

[biblio01entry183] 183. E. Charles, D. Diodati, and W. Mozdzierz, “Trusted Systems: Applying the Theory in a Commercial Firm,” Proceedings of the 13th National Computer Security Conference, pp. 283–291 (Sep. 1993).

[biblio01entry184] 184. D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM 24 (2), pp. 84–88 (Feb. 1981).

[biblio01entry185] 185. D. Chaum, “Security Without Identification: Transaction Systems to Make Big Brother Obsolete,” Communications of the ACM 28 (10), pp. 1030–1044 (Oct. 1985).

[biblio01entry186] 186. D. Chaum, “The Dining Cryptographers Problem: Unconditional Sender and Receiver Untraceability,” Journal of Cryptology 1 (1), pp. 65–75 (1988).

[biblio01entry187] 187. D. Chaum, “Online Cash Checks,” Advances in Cryptology—Proceedings of EUROCRYPT '89, pp. 288–293 (Aug. 1989).

[biblio01entry188] 188. D. Chaum, “Numbers Can Be a Better Form of Cash than Paper,” Selected Papers from the 2nd International Smart Card 2000 Conference, pp. 151–156 (Oct. 1989).

[biblio01entry189] 189. D. Chaum, B. den Boer, E. van Heyst, S. Mjølsnes, and A. Steenbeek, “Efficient Offline Electronic Checks,” Advances in Cryptology—Proceedings of EUROCRYPT '89, pp. 294–301 (Aug. 1989).

[biblio01entry190] 190. D. Chaum and T. Pedersen, “Wallet Databases with Observers,” Advances in Cryptology—Proceedings of CRYPTO '92, pp. 89–105 (Aug. 1992).

[biblio01entry191] 191. M. Cheheyl, M. Gasser, G. Huff, and J. Millen, “Verifying Security,” Computing Surveys 13 (3), pp. 279–339 (Sep. 1981).

[biblio01entry192] 192. W. Cheswick, “An Evening with Berferd, in Which a Cracker Is Lured, Endured, and Studied,” Proceedings of the 1992 Winter USENIX Conference, pp. 163–173 (Jan. 1992).

[biblio01entry193] 193. S. Chokhani, “Trusted Products Evaluation,” Communications of the ACM 35 (7), pp. 64–76 (July 1992).

[biblio01entry194] 194. L. Cholvy and F. Cuppens, “Analyzing Consistency of Security Policies,” Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 103–112 (May 1997).

[biblio01entry195] 195. S. Christey, D. Baker, W. Hill, and D. Mann, “The Development of a Common Vulnerabilities and Exposures List,” Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Detection (Sep. 1999).

[biblio01entry196] 196. A. Cinelli, “Using PortSentry and LogCheck,” SysAdmin 10 (3), pp. 29–31 (Mar. 2001).

[biblio01entry197] 197. A. Clark, “Key Recovery—Why, How, Who?” Computers and Security 16 (8), pp. 669–674 (Dec. 1997).

[biblio01entry198] 198. D. Clark and D. Wilson, “A Comparison of Commercial and Military Security Policies,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 184–194 (Apr. 1987).

[biblio01entry199] 199. E. Clarke, E. Emerson, and A. Sistla, “Axiomatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specifications,” ACM Transactions on Programming Languages and Systems 1 (2), pp. 244–263 (1986).

[biblio01entry200] 200. E. Clarke, S. Jha, and W. Marrero, “Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols,” Proceedings of the IFIP Working Conference on Programming Concepts and Methods, pp. 87–106 (June 1998).

[biblio01entry201] 201. W. Clocksin and C. Mellish, Programming in Prolog, Springer-Verlag, New York, NY (<year>1981</year>).

[biblio01entry202] 202. T. Coe and T. Peter, “It Takes Six Ones to Reach a Flaw (Pentium Processor),” Proceedings of the 12th Symposium on Computer Arithmetic, pp. 140–146 (July 1995).

[biblio01entry203] 203. E. Cohen and D. Jefferson, “Protection in the HYDRA Operating System,” Proceedings of the 5th Symposium on Operating System Principles, pp. 141–160 (Nov. 1975).

[biblio01entry204] 204. F. Cohen, “Computer Viruses: Theory and Experiments,” Proceedings of the 7th DOD/NBS Computer Security Conference, pp. 240–263 (Sep. 1984).

[biblio01entry205] 205. F. Cohen, “Computer Viruses: Theory and Experiments,” Computers and Security 6 (1), pp. 22–35 (Feb. 1987).

[biblio01entry206] 206. F. Cohen, “Practical Defenses Against Computer Viruses,” Computers and Security 8 (2), pp. 149–160 (Apr. 1989).

[biblio01entry207] 207. F. Cohen, “Computational Aspects of Computer Viruses,” Computers and Security 8 (4), pp. 325–344 (Nov. 1989).

[biblio01entry208] 208. F. Cohen, A Short Course on Computer Viruses, 2nd Edition, John Wiley and Sons, New York, NY (<year>1994</year>).

[biblio01entry209] 209. F. Cohen, “A Note on the Role of Deception in Information Protection,” Computers and Security 17 (6), pp. 483–506 (Nov. 1998).

[biblio01entry210] 210. Commission of the European Communities, Information Technology Security Evaluation Criteria, Version 1.2 (<year>1991</year>).

[biblio01entry211] 211. “Common Criteria Web Site,” http://www.commoncriteria.org.

[biblio01entry212] 212. Computer Emergency Response Team, SunOS SPARC Integer4 Division Vulnerability, CERT Advisory CA-91.16 (Sep. 1991).

[biblio01entry213] 213. Computer Emergency Response Team, Writable /etc/utmp Vulnerability, CERT Advisory CA-94.06 (Mar. 1994).

[biblio01entry214] 214. Computer Emergency Response Team, Sendmail v5 Vulnerability, CERT Advisory CA-95.08 (Aug. 1995).

[biblio01entry215] 215. Computer Emergency Response Team, Ghostscript Vulnerability, CERT Advisory CA-95.10 (Aug. 1995).

[biblio01entry216] 216. Computer Emergency Response Team, Sun 4.1.X Loadmodule Vulnerability, CERT Advisory CA-95.12 (Oct. 1995).

[biblio01entry217] 217. Computer Emergency Response Team, rpc.ypupdated Vulnerability, CERT Advisory CA-95.17 (Dec. 1995).

[biblio01entry218] 218. Computer Emergency Response Team, Sendmail Vulnerabilities, CERT Advisory CA-96.20 (Sep. 1996).

[biblio01entry219] 219. Computer Emergency Response Team, Sendmail Daemon Mode Vulnerability, CERT Advisory CA-96.24 (Nov. 1996).

[biblio01entry220] 220. Computer Emergency Response Team, Sendmail Group Permissions Vulnerability, CERT Advisory CA-96.25 (Dec. 1996).

[biblio01entry221] 221. Computer Emergency Response Team, MIME Conversion Buffer Overflow in Sendmail Versions 8.8.3 and 8.8.4, CERT Advisory CA-97.05 (Jan. 1997).

[biblio01entry222] 222. Computer Emergency Response Team, IP Denial-of-Service Attacks, CERT Advisory CA-97.28 (Dec. 1997; revised May 1998).

[biblio01entry223] 223. Computer Emergency Response Team, Trojan Horse Version of TCP Wrappers, CERT Advisory CA-99.01 (Jan. 1999).

[biblio01entry224] 224. Computer Emergency Response Team, Buffer Overflows in SSH Daemon and RSAREF2 Library, CERT Advisory CA-99.15 (Dec. 1999).

[biblio01entry225] 225. Computer Emergency Response Team, Buffer Overflow in Sun Solstice AdminSuite Daemon sadmind, CERT Advisory CA-99.16 (Dec. 1999).

[biblio01entry226] 226. Computer Emergency Response Team, Multiple Buffer Overflows in Kerberos Authenticated Services, CERT Advisory CA-2000.06 (May 2000).

[biblio01entry227] 227. Computer Emergency Response Team, Input Validation Problem in rpc.statd, CERT Advisory CA-2000.17 (Aug. 2000).

[biblio01entry228] 228. Computer Emergency Response Team, Unauthentic “Microsoft Corporation” Certificates, CERT Advisory CA-2001.04 (Mar. 2001).

[biblio01entry229] 229. Computer Emergency Response Team, Nimda Worm, CERT Advisory CA-2001.17 (Sep. 2001).

[biblio01entry230] 230. R. Conway, W. Maxwell, and H. Morgan, “On the Implementation of Security Measures in Information Systems,” Communications of the ACM 15 (4), pp. 211–220 (Apr. 1972).

[biblio01entry231] 231. C. Coombs, R. Dawes, and A. Tversky, Mathematical Psychology: An Elementary Introduction, Mathesis Press, Ann Arbor, MI (<year>1981</year>).

[biblio01entry232] 232. D. Cooper, “A Model of Certificate Revocation,” Proceedings of the 15th Annual Computer Security Applications Conference, pp. 256–264 (Dec. 1999).

[biblio01entry233] 233. M. Cooper, S. Northcutt, M. Fearnow, and K. Frederick, Intrusion Signatures and Analysis, New Riders Publishing, Indianapolis, IN 46290 (<year>2001</year>).

[biblio01entry234] 234. D. Coppersmith, “The Data Encryption Standard (DES) and Its Strength Against Attacks,” IBM Journal of Research and Development 38 (3), pp. 243–250 (May 1994)

[biblio01entry235] 235. F. Corbató and V. Vyssotsky, “Introduction and Overview of the Multics System,” Proceedings of the 1965 Fall Joint Computer Conference, pp. 185–196 (Fall 1965).

[biblio01entry236] 236. O. Costich and I. Moskowitz, “Analysis of a Storage Channel in the Two Phase Commit Protocol,” Proceedings of the Foundations of Computer Security Workshop IV, pp. 201–208 (June 1991).

[biblio01entry237] 237. L. Cottrell, “Frequently Asked Questions About Mixmaster Remailers,” Obscura Information Security, La Mesa, CA (July 1996); available at http://www.obscura.com/~loki/remailer/mixmaster-faq.html.

[biblio01entry238] 238. L. Cottrell, “Mixmaster and Remailer Attacks,” Obscura Information Security, La Mesa, CA (1996); available at http://www.obscura.com/~loki/remailer/remailer-essay.html.

[biblio01entry239] 239. A. Couch and M. Gilfix, “It's Elementary, Dear Watson: Applying Logic Programming to Convergent System Management Processes,” Proceedings of the 13th Systems Administration Conference (LISA 1999), pp. 123–137 (<year>1999</year>).

[biblio01entry240] 240. S. Coutinho, The Mathematics of Ciphers: Number Theory and RSA Cryptography, A. K. Peters Publishing Co., Natick, MA (<year>1999</year>).

[biblio01entry241] 241. C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proceedings of the 7th USENIX Security Symposium, pp. 63–77 (Jan. 1998).

[biblio01entry242] 242. C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor, “SubDomain: Parsimonious Server Security,” Proceedings of the 14th LISA Conference, pp. 355–367 (Dec. 2000).

[biblio01entry243] 243. M. Crabb, “Password Security in a Large Distributed Environment,” Proceedings of the 2nd USENIX UNIX Security Workshop, pp. 17–30 (Aug. 1990).

[biblio01entry244] 244. S. Crawford, Windows 2000 Pro: The Missing Manual, O'Reilly and Associates, Sebastopol, CA (<year>2000</year>).

[biblio01entry245] 245. Cray Research, Inc., UNICOS® Security Administration Reference Manual, Document Number SR-2062A, Cray Research, Inc., Mendota Heights, MN (<year>1989</year>).

[biblio01entry246] 246. D. Crocker, Standard for the Format of ARPA Internet Text Messages, RFC 822 (Aug. 1982).

[biblio01entry247] 247. S. Crocker and M. Pozzo, “A Proposal for a Verification-Based Virus Filter,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 319–324 (May 1989).

[biblio01entry248] 248. M. Crosbie and E. Spafford, “Defending a Computer System Using Autonomous Agents,” Proceedings of the 18th National Information Systems Security Conference, pp. 549–558 (Oct. 1995).

[biblio01entry249] 249. J. Crow, S. Ovire, J. Rushby, N. Shankar, and M. Srivas, “A Tutorial Introduction to PVS,” Computer Science Laboratory, SRI International, Menlo Park, CA 94025 (June 1995).

[biblio01entry250] 250. J. Cugini, R. Dobry, V. Gligor, and T. Mayfield, “Functional Security Criteria for Distributed Systems,” Proceedings of the 18th National Information Systems Security Conference, pp. 310–321 (Oct. 1995).

[biblio01entry251] 251. P. Cummings, D. Fullam, M. Goldstein, M. Gosselin, J. Picciotto, J. Woodward, and J. Wynn, “Compartmented Mode Workstation: Results Through Prototyping,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 2–12 (Apr. 1987).

[biblio01entry252] 252. T. Cusdick and M. Wood, “The REDOC-II Cryptosystem,” Advances in Cryptology—Proceedings of CRYPTO '90, pp. 1–16 (Aug. 1990).

[biblio01entry253] 253. K. Cutler and F. Jones, Commercial International Security Requirements, draft (Jan. 1991).

[biblio01entry254] 254. J. Daemen and V. Rijmen, The Design of Rijndael, Springer-Verlag, New York, NY (<year>2002</year>).

[biblio01entry255] 255. T. Daniels and E. Spafford, “Identification of Host Audit Data to Detect Attacks on Low-Level IP Vulnerabilities,” Journal of Computer Security 7 (1), pp. 3–35 (1999).

[biblio01entry256] 256. I. Darwin and G. Collyer, “Can't Happen or /* NOTREACHED */ or Real Programs Dump Core,” Proceedings of the 1985 Winter USENIX Conference, pp. 136–151 (Winter 1985).

[biblio01entry257] 257. Data General Corporation, Managing Security on the DG/UX® System, Manual 093-701138-04, Westboro, MA (Nov. 1996).

[biblio01entry258] 258. J. Daughman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 15 (11), pp. 1148–1161 (Nov. 1993).

[biblio01entry259] 259. G. Davida and B. Matt, “UNIX Guardians: Delegating Security to the User,” Proceedings of the UNIX Security Workshop, pp. 14–23 (Aug. 1988).

[biblio01entry260] 260. G. Davida, Y. Desmedt, and B. Matt, “Defending Systems Against Viruses Through Cryptographic Authentication,” Proceedings of the 1989 Symposium on Security and Privacy, pp. 312–318 (May 1989).

[biblio01entry261] 261. D. Davis, R. Ihaka, and P. Fenstermacher, “Cryptographic Randomness from Air Turbulence in Disk Drives,” Advances in Cryptology—Proceedings of CRYPTO '94, pp. 114–120 (Aug. 1994).

[biblio01entry262] 262. D. Dean, E. Felten, and D. Wallach, “Java Security: From HotJava to Netscape and Beyond,” Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 190–200 (May 1996).

[biblio01entry263] 263. D. Dean, M. Franklin, and A. Stubblefield, “An Algebraic Approach to IP Traceback,” Proceedings of the 2000 Symposium on Network and Distributed System Security (Feb. 2001).

[biblio01entry264] 264. H. Debar, M. Becker, and D. Siboni, “A Neural Network Component for an Intrusion Detection System,” Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy, pp. 240–250 (May 1992).

[biblio01entry265] 265. R.Demillo, D.Dobkin, A.Jones, and R.Lipton (eds.), Foundations of Secure Computing, Academic Press, New York, NY (<year>1978</year>).

[biblio01entry266] 266. D. Denning, “Secure Information Flow in Computer Systems,” Ph.D. thesis, Dept. of Computer Sciences, Purdue University, West Lafayette, IN (May 1975); cited in Cryptography and Data Security [269].

[biblio01entry267] 267. D. Denning, “A Lattice Model of Secure Information Flow,” Communications of the ACM 19 (5), pp. 236–243 (May 1976).

[biblio01entry268] 268. D. Denning, “Secure Personal Computing in an Insecure Network,” Communications of the ACM 22 (8), pp. 476–482 (Aug. 1979).

[biblio01entry269] 269. D. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA (<year>1982</year>).

[biblio01entry270] 270. D. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering 13 (2), pp. 222–232 (Feb. 1987).

[biblio01entry271] 271. D. Denning, Information Warfare and Security, Addison-Wesley, Reading, MA (<year>1999</year>).

[biblio01entry272] 272. D. Denning, S. Akl, M. Heckman, T. Lunt, M. Morgenstern, P. Neumann, and R. Schell, “Views for Multilevel Database Security,” IEEE Transactions on Software Engineering 13 (2), pp. 129–140 (Feb. 1987).

[biblio01entry273] 273. D. Denning and D. Branstad, “A Taxonomy for Key Escrow Encryption Systems,” Communications of the ACM 39 (3), pp. 34–40 (Mar. 1996).

[biblio01entry274] 274. D. Denning and P. Denning, “Certification of Programs for Secure Information Flow,” Communications of the ACM 20 (7), pp. 504–513 (July 1977).

[biblio01entry275] 275. D. Denning, T. Lunt, R. Schell, W. Shockley, and M. Heckman, “The Sea View Security Model,” Proceedings of the 1988 Symposium on Security and Privacy, pp. 218–233 (May 1988).

[biblio01entry276] 276. D. Denning and P. MacDoran, “Location-Based Authentication: Grounding Cyberspace for Better Security,” Computer Fraud and Security, pp. 12–16 (Feb. 1996).

[biblio01entry277] 277. D. Denning and G. Sacco, “Timestamps in Key Distribution Protocols,” Communications of the CACM 24 (8), pp. 533–536 (Aug. 1981).

[biblio01entry278] 278. D. Denning and M. Smid, “Key Escrowing Today,” IEEE Communications Magazine 32 (9), pp. 58–68 (Sep. 1994).

[biblio01entry279] 279. P. Denning, “Third Generation Computer Systems,” Computing Surveys 3 (4), pp. 175–216 (Dec. 1971).

[biblio01entry280] 280. P. Denning, “Fault-Tolerant Operating Systems,” Computing Surveys 8 (4), pp. 359–390 (Dec. 1976).

[biblio01entry281] 281. P. Denning, “The Science of Computing: Computer Viruses,” American Scientist 76 (3), pp. 236–238 (May 1988).

[biblio01entry282] 282. P. Denning, Computers Under Attack: Intruders, Worms, and Viruses, Addison-Wesley, Reading, MA (<year>1990</year>).

[biblio01entry283] 283. J. Dennis and E. Van Horn, “Programming Semantics for Multiprogrammed Computations,” Communications of the ACM 9 (3), pp. 143–155 (Mar. 1966).

[biblio01entry284] 284. Department of Defense, Password Management Guideline, CSC-STD-002-85 (Apr. 1985).

[biblio01entry285] 285. Department of Defense, Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (Dec. 1985).

[biblio01entry286] 286. Department of Defense, Trusted Network Interpretation of the Trusted System Evaluation Criteria, NCSC-TG-005 (July 1987).

[biblio01entry287] 287. Department of Defense, A Guide to Understanding Audit in Trusted Systems, NCSC-TG-001 Version 2 (June 1988).

[biblio01entry288] 288. Department of Defense, Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria, NCSC-TG-021 Version 1 (Apr. 1991).

[biblio01entry289] 289. Department of Defense, A Guide to Understanding Covert Channel Analysis of Trusted Systems, NCSC-TG-030 (Nov. 1993).

[biblio01entry290] 290. A. Dewdeny, “Computer Recreations: A Core War Bestiary of Viruses, Worms, and Other Threats to Computer Memories,” Scientific American 252 (3), pp. 14–23 (Mar. 1985).

[biblio01entry291] 291. P. D'Haeseleer, S. Forrest, and P. Helman, “An Immunological Approach to Change Detection: Algorithms, Analysis, and Implications,” Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 110–119 (May 1996).

[biblio01entry292] 292. U. Dieckmann, P. Plankensteiner, and T. Wagner, “SESAM: a Biometric Person Identification System Using Sensor Fusion,” Pattern Recognition Letters 18 (9), pp. 827–833 (Sep. 1997).

[biblio01entry293] 293. T. Dierks and C. Allen, The TLS Protocol Version 1.0, RFC 2246 (Jan. 1999).

[biblio01entry294] 294. H. Dietel, An Introduction to Operating Systems (Revised 1st Edition), Addison-Wesley, Reading, MA (<year>1984</year>).

[biblio01entry295] 295. W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory 22 (6), pp. 644–654 (Nov. 1976).

[biblio01entry296] 296. W. Diffie and M. Hellman, “Exhaustive Cryptanalysis of the NBS Data Encryption Standard,” IEEE Computer 10 (6), pp. 74–84 (June 1977).

[biblio01entry297] 297. Digital Equipment Corporation, PDP-11 Architecture Handbook, Maynard, MA (<year>1983</year>).

[biblio01entry298] 298. E. Dijkstra, “The Structure of the T. H. E. Multiprogramming System,” Communications of the ACM 11 (5), pp. 341–346 (May 1968).

[biblio01entry299] 299. A. Diller, Z: An Introduction to Formal Methods, Wiley, Chichester, UK (<year>1990</year>).

[biblio01entry300] 300. L. Dion, “A Complete Protection Model,” Proceedings of the 1981 IEEE Symposium on Security and Privacy, pp. 49–55 (Apr. 1981).

[biblio01entry301] 301. B. Di Vito, P. Palmquist, E. Anderson, and M. Johnston, “Specification and Verification of the ASOS Kernel,” Proceedings of the 1990 Symposium on Research in Security and Privacy, pp. 61–74 (May 1990).

[biblio01entry302] 302. H. Dobbertin, “The Status of MD5 After a Recent Attack,” CryptoBytes 2 (2), pp. 1ff. (Summer 1996).

[biblio01entry303] 303. H. Dobbertin, “Cryptanalysis of MD4,” Journal of Cryptology 11 (4), pp. 253–271 (1998).

[biblio01entry304] 304. D. Dobkin, A. Jones, and R. Lipton, “Secure Databases: Protection Against User Inference,” ACM Transactions on Database Systems 4 (1), pp. 97–106 (Mar. 1979).

[biblio01entry305] 305. T. Doeppner, P. Klein, and A. Koyfman, “Using Router Stamping to Identify the Source of IP Packets,” Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 184–189 (Nov. 2000).

[biblio01entry306] 306. B. Dole, S. Lodin, and E. Spafford, “Misplaced Trust: Kerberos 4 Session Keys,” Proceedings of the 1997 Symposium on Network and Distributed System Security, pp. 60–70 (Mar. 1997).

[biblio01entry307] 307. D. Dolev and A. Yao, “On the Security of Public Key Protocols,” IEEE Transactions on Information Theory 29 (2), pp. 198–208 (Mar. 1983).

[biblio01entry308] 308. F. Donner, The Un-Americans, Ballantine Books, New York, NY (<year>1961</year>).

[biblio01entry309] 309. N. Doraswamy and D. Harkins, IPSEC: The New Security Standard for the Internet, Intranets, and Virtual Private Networks, Prentice Hall, Upper Saddle River, NJ (<year>1999</year>).

[biblio01entry310] 310. D. Downs, J. Rub, K. Kung, and C. Jordan, “Issues in Discretionary Access Control,” Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 208–218 (Apr. 1984).

[biblio01entry311] 311. B. Duc, E. Bigun, J. Bigun, G. Maire, and S. Fischer, “Fusion of Audio and Video Information for Multi-Model Person Authentication,” Pattern Recognition Letters 18 (9), pp. 835–843 (Sep. 1997).

[biblio01entry312] 312. T. Duff, “Experiences with Viruses on UNIX Systems,” Computing Systems 2 (2), pp. 155–172 (Spring 1989).

[biblio01entry313] 313. R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, “Testing and Evaluating Computer Intrusion Detection Systems,” Communications of the ACM 42 (7), pp. 53–61 (July 1999).

[biblio01entry314] 314. D. Eastlake, Domain Name System Security Extensions, RFC 2535 (Mar. 1999).

[biblio01entry315] 315. D. Eastlake, DSA KEYs and SIGs in the Domain Name System (DNS), RFC 2536 (Mar. 1999).

[biblio01entry316] 316. D. Eastlake, RSA/MD5 KEYs and SIGs in the Domain Name System (DNS), RFC 2537 (Mar. 1999).

[biblio01entry317] 317. D. Eastlake, Storage of Diffie-Hellman Keys in the Domain Name System (DNS), RFC 2539 (Mar. 1999).

[biblio01entry318] 318. D. Eastlake and O. Gudmundsson, Storing Certificates in the Domain Name System (DNS), RFC 2538 (Mar. 1999).

[biblio01entry319] 319. D. Eastlake, S. Crocker, and J. Schiller, Randomness Recommendations for Security, RFC 1750 (Dec. 1994).

[biblio01entry320] 320. S. Eckmann, “Eliminating Formal Flows in Automated Information Flow Analysis,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 30–38 (May 1994).

[biblio01entry321] 321. W. Ehrsam, S. Matyas, C. Meyer, and W. Tuchman, “A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard,” IBM Systems Journal 17 (2), pp. 106–125 (1978).

[biblio01entry322] 322. M. Eichin and J. Rochlis, “With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 326–343 (May 1989).

[biblio01entry323] 323. T. Eisenberg, D. Gries, J. Hartmanis, D. Holcomb, M. Lynn, and T. Santoro, The Computer Worm: A Report to the Provost of Cornell University on an Investigation Conducted by the Commission of Preliminary Enquiry, Cornell University, Ithaca, NY (Feb. 1989).

[biblio01entry324] 324. T. El Gamal, “A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms,” IEEE Transactions in Information Theory 31 (4), pp. 469–472 (July 1985).

[biblio01entry325] 325. J. Eller, M. Mastrorocco, and B. Stauffer, “The Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP),” Proceedings of the 19th National Information Systems Security Conference, pp. 46–53 (Oct. 1996).

[biblio01entry326] 326. B. Elliott, “A High-Level Debugger for PL/1, FORTRAN and BASIC,” Software—Practice and Experience 12 (4), pp. 331–340 (April 1982).

[biblio01entry327] 327. C. Ellison, “Establishing Identity Without Certification Authorities,” Proceedings of the 6th USENIX Security Symposium, pp. 67–76 (July 1996).

[biblio01entry328] 328. C. Ellison, “Naming and Certificates,” CFP '00, Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, pp. 213–217 (Apr. 2000).

[biblio01entry329] 329. E. Engeler, Introduction to the Theory of Computation, Academic Press, New York, NY (<year>1973</year>).

[biblio01entry330] 330. A. Engelfriet, “Anonymity and Privacy on the Internet” (Jan. 1997); available at http://www.stack.nl/~galactus/remailers/index.html.

[biblio01entry331] 331. J. Epstein, J. McHugh, H. Orman, R. Pascale, A. Marmor-Squires, B. Danner, C. Martin, M. Branstad, G. Benson, and D. Rothnie, “A High Assurance Window System Prototype,” Journal of Computer Security 2 (2, 3), pp. 159–190 (1993).

[biblio01entry332] 332. J. Epstein, L. Thomas, and E. Monteith, “Using Operating System Wrappers to Increase the Resiliency of Commercial Firewalls,” Proceedings of the 16th Annual Computer Security Applications Conference, pp. 236–245 (Dec. 2000).

[biblio01entry333] 333. Ernst & Whinney, Audit, Control, and Security Issues in RACF Environments, Technical Reference Series No. 37052, The EDP Auditors Foundation, Inc., Carol Stream, IL (<year>1992</year>).

[biblio01entry334] 334. K. Eswaran and D. Chamberlin, “Functional Specifications of Subsystem for Database Integrity,” Proceedings of the International Conference on Very Large Data Bases, pp. 48–68 (Sep. 1975).

[biblio01entry335] 335. S. Evans, S. Bush, and J. Hershey, “Information Assurance Through Kolmogorov Complexity,” Proceedings of the DARPA Information Survivability Conference and Exposition II, pp. 322–331 (June 2001).

[biblio01entry336] 336. R. Fabry, “Capability-Based Addressing,” Communications of the ACM 17 (7), pp. 403–412 (July 1974).

[biblio01entry337] 337. R. Fagin, “On an Authorization Mechanism,” ACM Transactions on Database Systems 3 (3), pp. 310–319 (Sep. 1978).

[biblio01entry338] 338. R. Fairfield, R. Mortenson, and K. Joulthart, “An LSI Random Number Generator (RNG),” Advances in Cryptology—Proceedings of CRYPTO '84, pp. 115–143 (Aug. 1984).

[biblio01entry339] 339. D. Farmer and B. Powell, “TITAN,” Proceedings of the 12th Systems Administration Conference (LISA '98), pp. 1–10 (Dec. 1998).

[biblio01entry340] 340. D. Farmer and E. Spafford, “The Cops Security Checker System,” Proceedings of the 1990 Summer USENIX Conference, pp. 165–170 (June 1990).

[biblio01entry341] 341. R. Feiertag, K. Levitt, and L. Robinson, “Proving Multilevel Security of a System Design,” Proceedings of the 6th Symposium on Operating System Principles, pp. 57–65 (Dec. 1977).

[biblio01entry342] 342. R. Feiertag and P. Neumann, “The Foundations of a Provably Secure Operating System (PSOS),” Proceedings of the National Computer Conference 48, pp. 329–334 (1979).

[biblio01entry343] 343. H. Feistel, “Cryptography and Computer Privacy,” Scientific American 228 (5), pp. 15–23 (May 1973).

[biblio01entry344] 344. D. Feldmeier and P. Karn, “UNIX Password Security—Ten Years Later,” Advances in Cryptology—Proceedings of CRYPTO '89, pp. 44–63 (Aug. 1989).

[biblio01entry345] 345. J. Fenton, “Memoryless Subsystems,” Computer Journal 17 (2), pp. 143–147 (Feb. 1974).

[biblio01entry346] 346. D. Ferbrache, A Pathology of Computer Viruses, Springer-Verlag, New York, NY (<year>1991</year>).

[biblio01entry347] 347. K. Ferraiolo, L. Gallagher, and V. Thompson “Building a Case for Assurance from Process,” Proceedings of the 21st National Information Systems Security Conference, pp. 49–61 (Oct. 1998).

[biblio01entry348] 348. K. Ferraiolo, “Tutorial: The Systems Security Engineering Capability Maturity Model,” Proceedings of the 21st National Information Systems Security Conference, pp. 719–729 (Oct. 1998).

[biblio01entry349] 349. G. Fink and M. Bishop, “Property-Based Testing: A New Approach to Testing for Assurance,” Software Engineering Notes 22 (4), pp. 74–80 (July 1997).

[biblio01entry350] 350. G. Fink and K. Levitt, “Property-Based Testing of Privileged Programs,” Proceedings of the 10th Annual Computer Security Applications Conference, pp. 154–163 (Dec. 1994).

[biblio01entry351] 351. R. Finkel and B. Sturgill, “Tools for System Administration in a Heterogeneous Environment,” Proceedings of the 3rd Large Installation Systems Administration Workshop (LISA 1989), pp. 15–30 (<year>1989</year>).

[biblio01entry352] 352. R. Finlayson and D. Cheriton, “Log Files: An Extended File Service Exploiting Write-Once Storage,” Proceedings of the 11th Symposium on Operating Systems Principles, pp. 139–148 (Nov. 1987).

[biblio01entry353] 353. E. Fisch, G. White, and U. Pooch, “The Design of an Audit Trail Analysis Tool,” Proceedings of the 10th Annual Computer Security Applications Conference, pp. 126–132 (Dec. 1994).

[biblio01entry354] 354. J. Fisch and L. Hoffman, “The Cascade Problem: Graph Theory Can Help,” Proceedings of the 14th National Computer Security Conference, pp. 88–100 (Oct. 1991).

[biblio01entry355] 355. P. Fites, P. Johnston, and M. Kratz, The Computer Virus Crisis, Van Nostrand Reinhold, New York, NY (<year>1988</year>).

[biblio01entry356] 356. K. Fithen and B. Fraser, “CERT Incident Response and the Internet,” Communications of the ACM 37 (8), pp. 108–113 (Aug. 1994).

[biblio01entry357] 357. C. Flack and M. Atallah, “Better Logging Through Formality: Applying Formal Specification Techniques to Improve Audit Logs and Log Consumers,” Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, pp. 1–16 (Oct. 2000).

[biblio01entry358] 358. E. Flahavin and R. Snouffer, “The Certification of the Interim Key Escrow System,” Proceedings of the 19th National Information Systems Security Conference, pp. 26–33 (Oct. 1996).

[biblio01entry359] 359. C. Flink, II and J. Weiss, “System V/MLS Labeling and Mandatory Policy Alternatives,” Proceedings of the 1989 Winter USENIX Conference, pp. 413–427 (Jan. 1989).

[biblio01entry360] 360. S. Fluhrer and D. McGrew, “Statistical Analysis of the Alleged RC4 Keystream Generator,” Proceedings of the 7th International Workshop on Fast Software Encryption, pp. 19–39 (Apr. 2000).

[biblio01entry361] 361. R. Focardi and R. Gorrieri, “A Classification of Security Properties for Process Algebras,” Journal of Computer Security 3 (1), pp. 5–33 (1994/1995).

[biblio01entry362] 362. S. Foley, “A Model for Secure Information Flow,” Proceedings of the 1989 IEEE Symposium on Research in Security and Privacy, pp. 248–258 (May 1989).

[biblio01entry363] 363. S. Foley, “Separation of Duty Using High Water Marks,” Proceedings of the Computer Security Foundations Workshop IV, pp. 79–88 (June 1991).

[biblio01entry364] 364. S. Foley and J. Jacob, “Specifying Security for CSCW Systems,” Proceedings of the 8th IEEE Computer Security Foundations Workshop, pp. 136–145 (June 1995).

[biblio01entry365] 365. W. Ford and M. Baum, Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Prentice-Hall, Upper Saddle River, NJ (<year>1997</year>).

[biblio01entry366] 366. S. Forrest, S. Hofmeyr, and A. Somayaji, “Computer Immunology,” Communications of the ACM 40 (10), pp. 88–96 (Oct. 1997).

[biblio01entry367] 367. S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff, “A Sense of Self for UNIX Processes,” Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120–128 (May 1996).

[biblio01entry368] 368. S. Forrest, A. Perelson, L. Allen, and R. Cherukuri, “Self-Nonself Discrimination,” Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 202–212 (May 1994).

[biblio01entry369] 369. J. Frank, “Artificial Intelligence and Intrusion Detection: Current and Future Directions,” Proceedings of the 17th National Computer Security Conference, pp. 21–33 (Oct. 1994).

[biblio01entry370] 370. M. Frantzen, F. Kerschbaum, E. Schultz, and S. Fahmy, “A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals,” Computers and Security 20 (3), pp. 263–270 (May 2001).

[biblio01entry371] 371. T. Fraser and L. Badger, “Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE,” Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 15–26 (May 1998).

[biblio01entry372] 372. T. Fraser, L. Badger, and M. Feldman, “Hardening COTS Software with Generic Software Wrappers,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 2–16 (May 1999).

[biblio01entry373] 373. A. Freedman, “How to Make BSD (SunOS) Kernels SYN-Attack Resistant” (Sep. 1996); available at http://www.netaxs.com/~freedman/syn/.

[biblio01entry374] 374. D. Freedman and C. Mann, At Large: The Strange Case of the World's Biggest Internet Invasion, Simon and Schuster, New York, NY (<year>1997</year>).

[biblio01entry375] 375. A. Freier, P. Kariton, and P. Kocher, The SSL Protocol: Version 3.0, Netscape Communications, Inc., Mountain View, CA (Mar. 1996).

[biblio01entry376] 376. A. E. Frisch, Essential System Administration, O'Reilly and Associates, Sebastopol, CA (<year>1991</year>).

[biblio01entry377] 377. J. Gaffney and J. Ulvila, “Evaluation of Intrusion Detectors: a Decision Theory Approach,” Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 50–61 (May 2001).

[biblio01entry378] 378. H. Gaines, Cryptanalysis: A Study of Ciphers and Their Solution, Dover, New York, NY (<year>1956</year>).

[biblio01entry379] 379. D. Gambel, “Security Modeling for Public Safety Communication Specifications,” Proceedings of the 20th National Information Systems Security Conference, pp. 514–521 (Oct. 1997).

[biblio01entry380] 380. R. Ganesan and C. Davies, “A New Attack on Pronounceable Password Generators,” Proceedings of the 17th National Computer Security Conference, pp. 184–197 (Oct. 1994).

[biblio01entry381] 381. R. Ganesan, “The Yaksha Security System,” Communications of the ACM 39 (3), pp. 55–60 (Mar. 1996).

[biblio01entry382] 382. S. Garfinkel and E. Spafford, Practical UNIX and Internet Security, 2nd Edition, O'Reilly and Associates, Sebastopol, CA (<year>1996</year>).

[biblio01entry383] 383. S. Garfinkel and E. Spafford, Web Security & Commerce, O'Reilly and Associates, Sebastopol, CA (<year>1996</year>).

[biblio01entry384] 384. A. Gargantini, L. Liberati, A. Morzenti, and C. Zacchetti, “Specifying, Validating, and Testing a Traffic Management System in the TRIO Environment,” Proceedings of the 11th Annual Conference on Computer Assurance, pp. 65–76 (June 1996).

[biblio01entry385] 385. P. Garnett, “Selective Disassembly: A First Step Towards Developing a Virus Filter,” Proceedings of the 4th Aerospace Computer Security Conference, pp. 2–6 (Dec. 1988).

[biblio01entry386] 386. M. Gasser, “A Random Word Generator for Pronounceable Passwords,” Technical Report ESD-TR-75-97, Electronic Systems Division, Hanscom Air Force Base, Bedford, MA (Nov. 1975).

[biblio01entry387] 387. M. Gendler-Fishman and E. Gudes, “Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases,” Proceedings of the IFIP TC11 WG11.3 11th International Conference on Database Security, pp. 110–133 (Aug. 1997).

[biblio01entry388] 388. T. George, “A Touch of Magex,” Banking Technology 16 (6), p. 54 (July-Aug. 1999).

[biblio01entry389] 389. A. Ghosh, E-Commerce Security: Weak Links, Best Defenses, John Wiley and Sons, New York, NY (<year>1998</year>).

[biblio01entry390] 390. A. Ghosh, T. O'Connor, and G. McGraw, “An Automated Approach for Identifying Potential Vulnerabilities in Software,” Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 104–114 (May 1998).

[biblio01entry391] 391. A. Ghosh, V. Rana, B. Johnson, and J. Profeta, III, “A Distributed Safety-Critical System for Real-Time Train Control,” Proceedings of the 21st IEEE International Conference on Industrial Electronics, Control, and Instrumentation, pp. 760–767 (Nov. 1995).

[biblio01entry392] 392. D. Gifford, “Cryptographic Sealing for Information Secrecy and Authentication,” Communications of the ACM 25 (4), pp. 274–286 (Apr. 1982).

[biblio01entry393] 393. H. Gilbert and G. Chase, “A Statistical Attack on the Feal-8 Cryptosystem,” Advances in Cryptology—Proceedings of CRYPTO '90, pp. 22–33 (Aug. 1990).

[biblio01entry394] 394. D. Gilliam, J. Kelly, J. Powell, and M. Bishop, “Development of a Software Security Assessment Instrument to Reduce Software Security Risk,” Proceedings of the 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 144–149 (June 2001).

[biblio01entry395] 395. J. Gilmore, Cracking the DES, O'Reilly and Associates, Sebastopol, CA (<year>1998</year>).

[biblio01entry396] 396. G. Glass, UNIX® for Programmers and Users, Prentice-Hall, Englewood Cliffs, NJ (<year>1993</year>).

[biblio01entry397] 397. V. Gligor, “Guidelines for Trusted Facility Management and Audit,” University of Maryland, College Park, MD (1985); cited in A Guide to Understanding Audit in Trusted Systems [287].

[biblio01entry398] 398. V. Gligor, C. Chandersekaran, R. Chapman, L. Dotterer, M. Hecht, W.-D. Jiang, A. Johri, G. Luckenbaugh, and N. Vasudevan, “Design and Implementation of Secure Xenix,” IEEE Transactions on Software Engineering 13 (2), pp. 208–221 (Feb. 1987).

[biblio01entry399] 399. V. Gligor, S. Gavrila, and D. Ferraiolo, “On the Formal Definition of Separation of Duty Policies and Their Composition,” Proceedings of the 1998 Symposium on Security and Privacy, pp. 172–183 (May 1998).

[biblio01entry400] 400. B. Gold, R. Linde, and P. Cudney, “KVM/370 in Retrospect,” Proceedings of the 1984 Symposium on Security and Privacy, pp. 13–24 (Apr. 1984).

[biblio01entry401] 401. B. Gold, R. Linde, R. Peeler, M. Schaefer, J. Scheid, and P. Ward, “A Security Retrofit of VM/370,” Proceedings of the National Computer Conference 48, pp. 335–344 (June 1979).

[biblio01entry402] 402. I. Goldberg, D. Wagner, R. Thomas, and E. Brewer, “A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker,” Proceedings of the 6th USENIX Security Symposium, pp. 1–13 (July 1996).

[biblio01entry403] 403. O. Goldreich, Modern Cryptography, Probabilistic Proofs, and Pseudorandomness, Springer-Verlag, New York, NY (<year>1999</year>).

[biblio01entry404] 404. J. Golic, “Linear Statistical Weakness of Alleged RC4 Keystream Generator,” Advances in Cryptology—Proceedings of EUROCRYPT '97, pp. 226–238 (May 1997).

[biblio01entry405] 405. L. Gong, “A Secure Identity-Based Capability System,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 56–63 (May 1989).

[biblio01entry406] 406. L. Gong, “A Security Risk of Depending on Synchronized Clocks,” Operating Systems Review 26 (1), pp. 49–53 (Jan. 1992).

[biblio01entry407] 407. L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java™ Development Kit 1.2,” Proceedings of the USENIX Symposium on Internet Technologies and Systems, pp. 103–112 (Dec. 1997).

[biblio01entry408] 408. L. Gong and X. Qian, “The Complexity and Composability of Secure Interoperation,” Proceedings of the 1994 Symposium on Security and Privacy, pp. 190–200 (May 1994).

[biblio01entry409] 409. L. Gong and X. Qian, “Computational Issues in Secure Interoperation,” IEEE Transactions on Software Engineering 22 (1), pp. 43–52 (Jan. 1996).

[biblio01entry410] 410. L. Gong and S. Dodda, “Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2),” Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering, pp. 89–93 (Nov. 1999).

[biblio01entry411] 411. M.Gordon and T.Melham (eds.), Introduction to HOL: A Theorem Proving Environment for Higher Order Logic, Cambridge University Press, Cambridge, UK (<year>1993</year>).

[biblio01entry412] 412. J. A. Gougen and J. Meseguer, “Security Policies and Security Models,” Proceedings of the 1982 Symposium on Privacy and Security, pp. 11–20 (Apr. 1982).

[biblio01entry413] 413. G. Graham and P. Denning, “Protection—Principles and Practice,” Spring Joint Computer Conference, AFIPS Conference Proceedings 40, pp. 417–429 (1972).

[biblio01entry414] 414. J. Graham-Cumming, “Laws of Non-Interference in CSP,” Journal of Computer Security 2 (1), pp. 37–52 (1993).

[biblio01entry415] 415. F. Grampp and R. Morris, “UNIX Operating System Security,” AT&T Bell Laboratories Technical Journal 63 (8), pp. 1649–1672 (Oct. 1984).

[biblio01entry416] 416. G. Grant, Understanding Digital Signatures, McGraw-Hill, New York, NY (<year>1998</year>).

[biblio01entry417] 417. L. Grant, “DES Key Crunching for Safer Cipher Keys,” ACM Special Interest Group Security Audit and Control Review 5 (3), pp. 9–16 (Summer 1987).

[biblio01entry418] 418. R. Graubart, “The Integrity-Lock Approach to Secure Database Management,” Proceedings of the 1990 Symposium on Security and Privacy, pp. 62–74 (Apr. 1990).

[biblio01entry419] 419. R. Graubert, “On the Need for a Third Form of Access Control,” Proceedings of the 12th National Computer Security Conference, pp. 296–304 (Oct. 1989).

[biblio01entry420] 420. J. Gray, III, “Towards a Mathematical Model of Information Flow Security,” Journal of Computer Security 1 (3,4), pp. 255–294 (1992).

[biblio01entry421] 421. J. Gray, III, “On Introducing Noise into the Bus-Contention Channel,” Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 90–98 (May 1993).

[biblio01entry422] 422. J. Green and P. Sisson, “The 'Father Christmas' Worm,” Proceedings of the 12th National Computer Security Conference, pp. 359–368 (Oct. 1989).

[biblio01entry423] 423. M. Greenberg, L. Byington, and D. Harper, “Mobile Agents and Security,” IEEE Communications Magazine 36 (7), pp. 76–85 (July 1998).

[biblio01entry424] 424. M. Greenwald, S. Singh, J. Stone, and D. Cheriton, “Designing an Academic Firewall: Policy, Practice, and Experience,” Proceedings of the 1996 Symposium on Network and Distributed Systems Security, pp. 79–92 (Feb. 1996).

[biblio01entry425] 425. P. Gregory, Solaris™ Security, Prentice-Hall, Upper Saddle River, NJ (<year>2000</year>).

[biblio01entry426] 426. P. Griffiths and B. Wade, “An Authorization Mechanism for a Relational Database System,” ACM Transactions on Database Systems 1 (3), pp. 242–255 (Sep. 1976).

[biblio01entry427] 427. C. Gülcü and G. Tsudik, “Mixing Email with BABEL,” Proceedings of the 1996 Symposium on Network and Distributed System Security, pp. 1–15 (Feb. 1996).

[biblio01entry428] 428. S. Gupta and V. Gligor, “Towards a Theory of Penetration-Resistant Systems and Its Applications,” Proceedings of the Computer Security Foundations Workshop IV, pp. 62–78 (June 1991).

[biblio01entry429] 429. S. Gupta and V. Gligor, “Experience with a Penetration Analysis Method and Tool,” Proceedings of the 15th National Computer Security Conference, pp. 165–183 (Oct. 1992).

[biblio01entry430] 430. J. Guttman, “Information Flow and Invariance,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 67–73 (Apr. 1987).

[biblio01entry431] 431. J. Guttman and M. Nadel, “What Needs Securing?” Proceedings of the Computer Security Foundations Workshop MITRE Technical Report M88-37, pp. 34–57, MITRE Corporation, Bedford, MA, (June 1988).

[biblio01entry432] 432. K. Hafner and J. Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, Simon and Schuster, New York, NY (<year>1991</year>).

[biblio01entry433] 433. B. Hagemark and K. Zadeck, “Site: A Language and System for Configuring Many Computers as One Computer Site,” Proceedings of the 3rd Large Installation Systems Administration Workshop (LISA 1989), pp. 1–15 (<year>1989</year>).

[biblio01entry434] 434. J. Haigh and W. Young, “Extending the Non-Interference Version of MLS for SAT,” Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 232–239 (Apr. 1986).

[biblio01entry435] 435. J. Haigh, R. Kemmerer, J. McHugh, and W. Young, “An Experience Using Two Covert Channel Analysis Techniques on a Real System Design,” Proceedings of the 1986 Symposium on Security and Privacy, pp. 14–24 (Apr. 1986).

[biblio01entry436] 436. J. Haigh, R. Kemmerer, J. McHugh, and W. Young, “An Experience Using Two Covert Channel Analysis Techniques on a Real System Design,” IEEE Transactions on Software Engineering 13 (2), (Feb. 1987).

[biblio01entry437] 437. N. Haller, “The S/Key™ One-Time Password System,” Proceedings of the 1994 Symposium on Network and Distributed System Security, pp. 151–157 (Feb. 1994).

[biblio01entry438] 438. S. Hambridge and J. Sedayao, “Horses and Barn Doors: Evolution of Corporate Guidelines for Internet Usage,” Proceedings of the 7th Systems Administration Conference (LISA 1993), pp. 9–16 (Nov. 1993).

[biblio01entry439] 439. A. Hamilton, J. Madison, and J. Jay, The Federalist Papers (C.Rossiter, ed.), New American Library, New York, NY (<year>1961</year>).

[biblio01entry440] 440. J. Han and Y. Zheng, “Security Characterisation and Integrity Assurance for Component-Based Software,” Proceedings of the International Conference on Software Methods and Tools, pp. 61–66 (Nov. 2000).

[biblio01entry441] 441. K. Hanks, J. Knight, and E. Strunk, “Erroneous Requirements: A Linguistic Basis for Their Occurrence and an Approach to Their Reduction,” Proceedings of the 26th Annual NASA Goddard Software Engineering Workshop, pp. 115–119 (Nov. 2001).

[biblio01entry442] 442. D. Hanson, “A Machine-Independent Debugger—Revisited,” Software—Practice and Experience 29 (10), pp. 849–862 (Oct. 1999).

[biblio01entry443] 443. S. Hansen and E. Atkins, “Centralized System Monitoring with Swatch,” Proceedings of the 3rd USENIX UNIX Security Symposium, pp. 105–117 (Sep. 1992).

[biblio01entry444] 444. S. Hansen and E. Atkins, “Automated System Monitoring and Notification with Swatch,” Proceedings of the 7th Systems Administration Conference (LISA 1993), pp. 145–155 (Nov. 1993).

[biblio01entry445] 445. S. Hardcastle-Kille, Encoding Network Addresses to Support Operation over Non-OSI Lower Layers, RFC 1277 (Nov. 1991).

[biblio01entry446] 446. S. Hardcastle-Kille, A String Encoding of Presentation Address, RFC 1278 (Nov. 1991).

[biblio01entry447] 447. N. Hardy, “KeyKOS Architecture,” Operating Systems Review 19 (4), pp. 8–25 (Oct. 1985).

[biblio01entry448] 448. A. Harmon, “Hackers May 'Net' Good PR for Studio,” Los Angeles Times, p. D1 (Aug. 12, 1995).

[biblio01entry449] 449. B. Harris and R. Hunt, “Firewall Certification,” Computers and Security 18 (2), pp. 165–177 (Mar./Apr. 1999).

[biblio01entry450] 450. M. Harrison, W. Ruzzo, and J. Ullman, “Protection in operating systems,” Communications of the ACM 19 (8), pp. 461–471 (Aug. 1976).

[biblio01entry451] 451. M. Harrison and W. Ruzzo, “Monotonic Protection Systems,” in Foundations of Secure Computing [265], pp. 337–363 (Oct. 1977).

[biblio01entry452] 452. H. Härtig, O. Kowalski, and W. Kühnhauser, “The BirliX Security Architecture,” Journal of Computer Security 2 (1), pp. 5–21 (1993).

[biblio01entry453] 453. H. Hartson and D. Hsiao, “Full Protection Specifications in the Semantic Model for Database Protection Languages,” Proceedings of the 1976 ACM Annual Conference, pp. 90–95 (Oct. 1976).

[biblio01entry454] 454. J. Haskett, “Pass-Algorithms: A User Validation Scheme Based on Knowledge of Secret Algorithms,” Communications of the ACM 27 (8), pp. 777–781 (Aug. 1984).

[biblio01entry455] 455. J. Haugh, II, “Shadow Password Suite,” Proceedings of the 3rd USENIX UNIX Security Symposium, pp. 133–144 (Sep. 1992).

[biblio01entry456] 456. S. Heatley and J. Otto, “Data Mining Computer Audit Logs to Detect Computer Misuse,” International Journal of Intelligent Systems in Accounting, Finance and Management 7 (3), pp. 125–134 (Sep. 1998).

[biblio01entry457] 457. B. Hebbard, P. Grosso, T. Baldridge, C. Chan, D. Fishman, P. Goshgarian, T. Hilton, J. Hoshen, K. Hoult, G. Huntley, M. Stolarchuk, and L. Warner, “A Penetration Analysis of the Michigan Terminal System,” Operating Systems Review 14 (1), pp. 7–20 (Jan. 1980).

[biblio01entry458] 458. L. Heberlein and M. Bishop, “Attack Class: Address Spoofing,” Proceedings of the 19th National Information Systems Security Conference, pp. 371–377 (Oct. 1996).

[biblio01entry459] 459. L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, “A Network Security Monitor,” Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 296–304 (May 1990).

[biblio01entry460] 460. L. Heberlein, K. Levitt, and B. Mukherjee, “Internetwork Security Monitor: An Intrusion-Detection System for Large-Scale Networks,” Proceedings of the 15th National Information Systems Security Conference, pp. 262–271 (Oct. 1992).

[biblio01entry461] 461. R. Hefner, “Lessons Learned with the Systems Security Engineering Capability Maturity Model,” Proceedings of the 1997 International Conference on Software Engineering, pp. 566–567 (May 1997).

[biblio01entry462] 462. R. Hefner, “A Process Standard for System Security Engineering: Development Experiences and Pilot Results,” Proceedings of the IEEE International Symposium on Software Engineering Standards, pp. 217–221 (June 1997).

[biblio01entry463] 463. G. Held and K. Hundley, Cisco® Access Lists Field Guide, McGraw-Hill, New York, NY (<year>1999</year>).

[biblio01entry464] 464. H. Hellman, Great Feuds in Science: Ten of the Liveliest Disputes Ever, John Wiley and Sons, New York, NY (<year>1998</year>).

[biblio01entry465] 465. M. Hellman, “A Cryptanalytic Time-Memory Tradeoff,” IEEE Transactions on Information Theory 26 (4), pp. 401–406 (July 1980).

[biblio01entry466] 466. P. Helman and G. Liepins, “Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse,” IEEE Transactions on Software Engineering 19 (9), pp. 886–901 (Sep. 1993).

[biblio01entry467] 467. J. Helsingius, Press Release: Johan Helsingius Closes His Internet Remailer, Oy Penetic Ab (Aug. 1996).

[biblio01entry468] 468. Hewlett-Packard Co., Sendmail Release 8.8.6 Causes Denial of Service Failures, Security Bulletin #00097 (Apr. 1999).

[biblio01entry469] 469. F. Hickman, “An 'Intelligent' Approach to Audit Trail Analysis,” Proceedings of the 2nd International Meeting on Expert Systems Applications, pp. 51–63 (<year>1992</year>).

[biblio01entry470] 470. H. Highland, “Random Bits and Bytes: Case History of a Virus Attack,” Computers and Security 7 (1), pp. 3–5 (Feb. 1988).

[biblio01entry471] 471. H. Highland, Computer Virus Handbook, Elsevier Advanced Technology, Oxford, UK (<year>1990</year>).

[biblio01entry472] 472. H. Highland, “Random Bits and Bytes: Testing a Password System,” Computers and Security 11 (2), pp. 110–113 (Apr. 1992).

[biblio01entry473] 473. J. Hoagland, C. Wee, and K. Levitt, “Audit Log Analysis Using the Visual Audit Browser Toolkit,” Technical Report CSE-95-11, Department of Computer Science, University of California, Davis, CA (Sep. 1995).

[biblio01entry474] 474. L. Hoffman, “The Formulary Model for Flexible Privacy and Access Control,” Proceedings of the 1971 Fall Joint Computer Conference, pp. 587–601 (<year>1971</year>).

[biblio01entry475] 475. L. Hoffman, Modern Methods for Computer Security and Privacy, Prentice-Hall, Englewood Cliffs, NJ 07632 (<year>1977</year>).

[biblio01entry476] 476. L. Hoffman, Rogue Programs: Viruses, Worms, and Trojan Horses, Van Nostrand Reinhold, New York, NY (<year>1990</year>).

[biblio01entry477] 477. L. Hoffman and R. Davis, “Security Pipeline Interface (SPI),” Proceedings of the 6th Annual Computer Security Applications Conference, pp. 349–355 (Dec. 1990).

[biblio01entry478] 478. S. Hofmeyr, S. Forrest, and A. Somayaji, “Intrusion Detection Using Sequences of System Calls,” Journal of Computer Security 6 (3), pp. 151–180 (1988).

[biblio01entry479] 479. C. Hogan, A. Cox, and T. Hunter, “Decentralizing Distributed System Administration,” Proceedings of the 9th Systems Administration Conference (LISA 1995), pp. 139–147 (Sep. 1995).

[biblio01entry480] 480. C. Holley and F. Millar, “Auditing the On-Line, Real-Time Computer System,” Journal of Systems Management 34 (1), pp. 14–19 (Jan. 1983).

[biblio01entry481] 481. G. Holzmann, “The Model Checker SPIN,” IEEE Transactions on Software Engineering 23 (5), pp. 1–17 (May 1997).

[biblio01entry482] 482. Homer, The Odyssey (translated by E. V. Rieu), Penguin Books, New York, NY (<year>1946</year>).

[biblio01entry483] 483. The Honeypot Project, “Know Your Enemy: III” (March 2000); available at http://project.honeynet.org/papers/enemy3.

[biblio01entry484] 484. The Honeypot Project, “Know Your Enemy: Passive Fingerprinting” (May 2000); available at http://project.honeynet.org/papers/finger.

[biblio01entry485] 485. The Honeypot Project, “Know Your Enemy: A Forensic Analysis” (May 2000); available at http://project.honeynet.org/papers/forensics.

[biblio01entry486] 486. The Honeypot Project, “Know Your Enemy” (July 2000); available at http://project.honeynet.org/papers/enemy.

[biblio01entry487] 487. The Honeypot Project, “Know Your Enemy: Honeynets” (Apr. 2001); available at http://project.honeynet.org/papers/honeynet.

[biblio01entry488] 488. The Honeypot Project, “Know Your Enemy: II” (June 2001); available at http://project.honeynet.org/papers/enemy2.

[biblio01entry489] 489. The Honeypot Project, “Know Your Enemy: Statistics” (July 2001); available at http://project.honeynet.org/papers/stats.

[biblio01entry490] 490. J. Horton, R. Cooper, W. Hyslop, B. Nickerson, O. Ward, R. Harland, E. Ashby, and W. Stewart, “The Cascade Vulnerability Problem,” Journal of Computer Security 2 (4), pp. 279–290 (1993).

[biblio01entry491] 491. J. Horton, R. Harland, E. Ashby, R. Cooper, W. Hyslop, B. Nickerson, W. Stewart, and O. Ward, “The Cascade Vulnerability Problem,” Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 110–116 (May 1993).

[biblio01entry492] 492. M. Howard, Designing Secure Web-Based Applications for Microsoft® Windows® 2000, Microsoft Press, Redmond, WA (<year>2000</year>).

[biblio01entry493] 493. M. Howard and D. LeBlanc, Writing Secure Code, Microsoft Press, Redmond, WA (<year>2001</year>).

[biblio01entry494] 494. B. Howell and B. Satdeva, “We Have Met the Enemy, an Informal Survey of Policy Practices in the Internetworked Community,” Proceedings of the 5th Large Installation Systems Administration Conference (LISA 1991), pp. 159–170 (Sep./Oct. 1991).

[biblio01entry495] 495. J. Hruska, Computer Viruses and Anti-Virus Warfare, Ellis Horwood, New York, NY (<year>1992</year>).

[biblio01entry496] 496. W. Hsieh, M. Fiuczynski, C. Garrett, S. Savage, D. Becker, and B. Bershad, “Language Support for Extensible Operating Systems,” Proceedings of the Inaugural Workshop on Compiler Support for Systems Software, pp. 127–133 (Feb. 1996).

[biblio01entry497] 497. N. Htoo-Mosher, R. Nasser, N. Zunic, and J. Straw, “E4 ITSEC Evaluation of PR/SM on ES/9000 Processors,” Proceedings of the 19th National Information Systems Security Conference, pp. 1–11 (Oct. 1996).

[biblio01entry498] 498. W.-M. Hu, “Reducing Timing Channels with Fuzzy Time,” Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pp. 52–61 (May 1991).

[biblio01entry499] 499. W.-M. Hu, “Lattice Scheduling and Covert Channels,” Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy, pp. 8–20 (May 1992).

[biblio01entry500] 500. R. Hudson, Windows NT Administration and Security, Prentice-Hall, Upper Saddle River, NJ (<year>2001</year>)

[biblio01entry501] 501. J. Hughes, “Certificate Inter-Operability White Paper,” Computers and Security 18 (3), pp. 221–250 (May 1999).

[biblio01entry502] 502. J. Hughes, “The Realities of PKI Inter-Operability,” Proceedings of Secure Networking—CQRE [Secure] '99 International Exhibition and Congress, pp. 127–132 (Nov. 1999).

[biblio01entry503] 503. M. Huth and M. Ryan, Logic in Computer Science: Modelling and Reasoning About Systems, Cambridge University Press, Cambridge, UK (<year>2000</year>).

[biblio01entry504] 504. J.-J. Hwang, K.-C. Wu, and D.-R. Liu, “Access Control with Role Attribute Certificates,” Computer Standards and Interfaces 22 (1), pp. 43–53 (Mar. 2000).

[biblio01entry505] 505. G. Iachello and K. Rannenberg, “Protection Profiles for Remailer Mixes,” Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, pp. 181–225 (July 2000).

[biblio01entry506] 506. C. I'Anson and C. Mitchell, “Security Defects in CCITT Recommendation X.509—the Directory Authentication Framework,” Computer Communication Review 20 (2), pp. 30–34 (Apr. 1990).

[biblio01entry507] 507. D. Icove, “Collaring the Cybercrook: An Investigator's View,” IEEE Spectrum 34 (6), pp. 31–36 (June 1997).

[biblio01entry508] 508. K. Ilgun, R. Kemmerer, and P. Porras, “State Transition Analysis: A Rule-Based Intrusion Detection Approach,” IEEE Transactions on Software Engineering 21 (3), pp. 181–199 (Mar. 1995).

[biblio01entry509] 509. J. Iliffe and J. Jodeit, “A Dynamic Storage Allocation System,” Computer Journal 5, pp. 200–209 (1962); cited in Cryptography and Data Security [269].

[biblio01entry510] 510. J. Iliffe, Basic Machine Principles, 2nd Edition, Elsevier MacDonald Publishing Co., New York, NY (<year>1972</year>); cited in Cryptography and Data Security [269].

[biblio01entry511] 511. Information Sciences Institute, Transmission Control Protocol DARPA Internet Program Protocol Specification, RFC 793 (Sep. 1981).

[biblio01entry512] 512. International Telecommunications Union, Recommendation X.509—the Directory Authentication Framework (<year>1993</year>).

[biblio01entry513] 513. C. Irvine and D. Volpano, “A Practical Tool for Developing Trusted Applications,” Proceedings of the 11th Annual Computer Security Applications Conference, pp. 190–195 (Dec. 1995).

[biblio01entry514] 514. H. Isa, W. Shockley, and C. Irvine, “A Multi-threading Architecture for Multilevel Secure Transaction Processing,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 166–180 (May 1999).

[biblio01entry515] 515. D. Isenor and S. Zaky, “Fingerprint Identification Using Graph Matching,” Pattern Recognition 19 (2), pp. 113–122 (1986).

[biblio01entry516] 516. H. Israel, “Computer Viruses: Myth or Reality?” Proceedings of the 10th National Computer Security Conference, pp. 226–230 (Sep. 1987).

[biblio01entry517] 517. N. Itoi and P. Honeyman, “Pluggable Authentication Modules for Windows NT,” Proceedings of the 2nd USENIX Windows NT Symposium, pp. 97–108 (Aug. 1998).

[biblio01entry518] 518. S. Jajodia, S. Gadia, G. Bhargava, and E. Sibley, “Audit Trail Organization in Relational Databases,” Results of the IFIP WG 11.3 Workshop on Database Security, III: Status and Prospects, pp. 269–281 (Sep. 1989).

[biblio01entry519] 519. S. Jajodia and B. Kogan, “Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture,” Proceedings of the 1990 Symposium on Research in Security and Privacy, pp. 360–368 (May 1990).

[biblio01entry520] 520. S. Jajodia, P. Samarati, and V. Subrahamanian, “A Logical Language for Expressing Authorizations,” Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 31–42 (May 1997).

[biblio01entry521] 521. S. Jajodia and R. Sandhu, “Towards a Multilevel Secure Relational Data Model,” Proceedings of the ACM-SIGMOD Conference, pp. 50–59 (May 1991).

[biblio01entry522] 522. K. Jensen and N. Wirth, PASCAL: User Manual and Report, 2nd Edition, Springer-Verlag, New York, NY (<year>1974</year>).

[biblio01entry523] 523. I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin, “The Design and Analysis of Graphical Passwords,” Proceedings of the 8th USENIX Security Symposium, pp. 1–14 (Aug. 1999).

[biblio01entry524] 524. D. Johnson and F. Thayer, “Security and the Composition of Machines,” Proceedings of the Computer Security Foundations Workshop, MITRE Technical Report M88-37, MITRE Corporation, Bedford, MA, pp. 72–89 (June 1988).

[biblio01entry525] 525. H. Johnson and M. De Vilbiss, “Use of the Trusted Computer System Evaluation Criteria (TCSEC) for Complex, Evolving, Multipolicy Systems,” Proceedings of the 16th National Computer Security Conference, pp. 137–145 (Sep. 1993).

[biblio01entry526] 526. A. Jones and R. Lipton, “The Enforcement of Security Policies for Computation,” Proceedings of the 5th Symposium on Operating System Principles, pp. 197–206 (Nov. 1975).

[biblio01entry527] 527. A. Jones, R. Lipton, and L. Snyder, “A Linear-Time Algorithm for Deciding Security,” Proceedings of the 17th Symposium on the Foundations of Computer Science, pp. 33–41 (Oct. 1976).

[biblio01entry528] 528. V. Jones and D. Schrodel, “Balancing Security and Convenience,” Proceedings of the Large Installation Systems Administration Workshop, pp. 5–6 (Apr. 1987).

[biblio01entry529] 529. M. Joseph, “Towards the Elimination of the Effects of Malicious Logic: Fault Tolerance Approaches,” Proceedings of the 10th National Computer Security Conference, pp. 238–244 (Sep. 1987).

[biblio01entry530] 530. M. Joseph and A. Aviÿzienis, “A Fault Tolerant Approach to Computer Viruses,” Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 52–58 (Apr. 1988).

[biblio01entry531] 531. R. Joyce and G. Gupta, “Identity Authorization Based on Keystroke Latencies,” Communications of the ACM 33 (2), pp. 168–176 (Feb. 1990).

[biblio01entry532] 532. J. Juni and R. Ponto, “Computer-Virus Infection of a Medical Diagnostic Computer,” New England Journal of Medicine 320 (12), pp. 811–812 (Mar. 12, 1989).

[biblio01entry533] 533. J. Jumes, N. Cooper, P. Chamoun, and T. Feinman, Microsoft® Windows NT® 4.0 Security, Audit, and Control, Microsoft Press, Redmond, WA (<year>1999</year>).

[biblio01entry534] 534. F. Kafka, The Trial, Alfred Knopf, New York, NY (<year>1992</year>).

[biblio01entry535] 535. C. Kahn and M. Zurko, “Incentives to Help Stop Floods,” Proceedings of the 2000 New Security Paradigms Workshop, pp. 127–132 (Sep. 2000).

[biblio01entry536] 536. D. Kahn, The Codebreakers: The Story of Secret Writing (revised edition), Macmillan Publishing Co., New York, NY (<year>1967</year>).

[biblio01entry537] 537. D. Kahn, Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939–1943, Houghton Mifflin Co., Boston, MA (<year>1991</year>).

[biblio01entry538] 538. D. Kahn, Codebreaking and the Battle of the Atlantic, US Air Force Academy, Colorado Springs, CO (<year>1994</year>).

[biblio01entry539] 539. D. Kahn, The Codebreakers; The Story of Secret Writing (revised edition), Scribner, New York, NY (<year>1996</year>).

[biblio01entry540] 540. R. Kahn, W. Corwin, T. Dennis, H. D'Hooge, D. Hubka, L. Hutcchins, J. Montague, F. Pollack, and M. Gifkins, “iMAX: A Multiprocessor Operating System for an Object-Based Computer,” Proceedings of the 8th Symposium on Operating Systems Principles, pp. 117–121 (Dec. 1979).

[biblio01entry541] 541. R. Kain, Advanced Computer Architecture: A Systems Design Approach, Prentice-Hall, Englewood Cliffs, NJ 07632 (<year>1996</year>).

[biblio01entry542] 542. R. Kain and C. Landwehr, “On Access Checking in Capability-Based Systems,” Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 95–100 (May 1986).

[biblio01entry543] 543. B. Kaliski, The MD2 Message Digest Algorithm, RFC 1319 (Apr. 1992).

[biblio01entry544] 544. P.-H. Kamp and R. Watson, “Jails: Confining the Omnipotent Root,” Proceedings of the SANE 2000 Conference (<year>2000</year>).

[biblio01entry545] 545. M. Kang, A. Moore, and I. Moskowitz, “Design and Assurance Strategy for the NRL Pump,” IEEE Computer 31 (4), pp. 56–64 (Apr. 1998).

[biblio01entry546] 546. M. Kang and I. Moskowitz, “A Pump for Rapid, Reliable, Secure Communication,” Proceedings of the 1st ACM Conference on Computer and Communication Security, pp. 119–129 (Nov. 1993).

[biblio01entry547] 547. M. Kang, I. Moskowitz, and D. Lee, “A Network Version of the Pump,” Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp.144–154 (May 1995).

[biblio01entry548] 548. M. Kang, I. Moskowitz, and D. Lee, “A Network Pump,” IEEE Transactions on Software Engineering 22 (5), pp. 329–338 (May 1996).

[biblio01entry549] 549. B. Kantor, BSD Rlogin, RFC 1282 (Dec. 1991).

[biblio01entry550] 550. P. Karger, “Limiting the Damage Potential of Discretionary Trojan Horses,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 32–37 (Apr. 1987).

[biblio01entry551] 551. P. Karger and A. Herbert, “An Augmented Capability Architecture to Support Lattice Security and Traceability of Access,” Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 2–12 (Apr. 1984).

[biblio01entry552] 552. P. Karger and R. Schell, “MULTICS Security Evaluation, Volume II: Vulnerability Analysis,” ESD-TR-74-193, Vol. II, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA (June 1974).

[biblio01entry553] 553. P. Karger and J. Wray, “Covert Storage Channels in Disk Arm Optimization,” Proceedings of the 1991 Symposium on Research in Security and Privacy, pp. 52–61 (May 1991).

[biblio01entry554] 554. P. Karger, M. Zurko, D. Bonin, A. Mason, and C. Kahn, “A VMM Security Kernel for the VAX Architecture,” Proceedings of the 1990 Symposium on Research in Security and Privacy, pp. 2–19 (May 1990).

[biblio01entry555] 555. M. Kaufmann and J. Moore, “ACL2: An Industrial Strength Version of Nqthm,” Proceedings of the 11th Annual Conference on Computer Assurance, pp. 23–34 (June 1996).

[biblio01entry556] 556. G. Kedem and Y. Ishihara, “Brute Force Attack on UNIX Passwords with SIMD Computer,” Proceedings of the 8th USENIX Security Symposium, pp. 93–98 (Aug. 1999).

[biblio01entry557] 557. R. Kemmerer, “A Practical Approach to Identifying Storage and Timing Channels,” Proceedings of the 1982 IEEE Symposium on Security and Privacy, pp. 66–73 (Apr. 1982).

[biblio01entry558] 558. R. Kemmerer, “Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels,” ACM Transactions on Computer Systems, 1 (3), pp. 256–277 (Aug. 1983).

[biblio01entry559] 559. R. Kemmerer, “Analyzing Encryption Protocols Using Formal Verification Techniques,” IEEE Journal on Selected Areas in Communications SAC-7 (4), pp. 448–457 (May 1989).

[biblio01entry560] 560. R. Kemmerer, C. Meadows, and J. Millen, “Three Systems for Cryptographic Protocol Analysis,” Journal of Cryptology 7 (2), pp. 79–130 (Spring 1994).

[biblio01entry561] 561. S. Kent, “Encryption-Based Protection Protocols for Interactive User-Computer Communication,” Technical Report MIT/LCS/TR-162, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA (May 1976); cited in Cryptography and Data Security [269].

[biblio01entry562] 562. S. Kent, “Comments on 'Security Problems in the TCP/IP Protocol Suite',” Computer Communications Review 19 (3), pp. 10–19 (July 1989).

[biblio01entry563] 563. S. Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, RFC 1422 (Feb. 1993).

[biblio01entry564] 564. B. Kernighan and P. Plauger, The Elements of Programming Style, McGraw-Hill Book Co., Reading, MA (<year>1974</year>).

[biblio01entry565] 565. B. Kernighan and P. Plauger, Software Tools, Addison-Wesley, Reading, MA (<year>1976</year>).

[biblio01entry566] 566. K. Keus, W. Kirth, and D. Loevenich, “Quality Assurance in the ITSEC-Evaluation Environment in Germany,” Proceedings of the 16th National Information Systems Security Conference, pp. 324–333 (Sep. 1993).

[biblio01entry567] 567. K. Keus and K.-W. Schröder, “Measuring Correctness and Effectiveness: A New Approach Using Process Evaluation,” Proceedings of the 18th National Information Systems Security Conference, pp. 366–373 (Oct. 1995).

[biblio01entry568] 568. G. Kim and E. Spafford, “Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection,” Proceedings of SANS III, pp. 89–102 (Apr. 1994).

[biblio01entry569] 569. G. Kim and E. Spafford, “The Design and Implementation of Tripwire: A File System Integrity Checker,” Proceedings of the 2nd ACM Conference on Computer and Communications Security (Nov. 1994).

[biblio01entry570] 570. J.-Y. Kim and K.-C. Kwon, “Methodology for Safety-Related Software Development [for Nuclear Power Plants],” Proceedings of the 1996 American Nuclear Society International Topical Meeting on Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies, pp. 1041–1046 (May 1996).

[biblio01entry571] 571. J. Kirby, Jr., M. Archer, and C. Heitmeyer, “SCR: A Practical Approach to Building a High Assurance COMSEC System,” Proceedings of the 15th Annual Computer Security Applications Conference, pp. 109–118 (Dec. 1999).

[biblio01entry572] 572. D. Klein, “A Capability Based Protection Mechanism Under Unix,” Proceedings of the 1985 Winter USENIX Conference, pp. 152–159 (Jan. 1995).

[biblio01entry573] 573. D. Klein, “Foiling the Cracker: A Survey of, and Improvements to, Password Security,” Proceedings of the 2nd USENIX UNIX Security Workshop, pp. 5–14 (Aug. 1990).

[biblio01entry574] 574. J. Knight and N. Leveson, “An Experimental Evaluation of the Assumption of Independence in Multi-Version Programming,” IEEE Transactions on Software Engineering 12 (1), pp. 96–109 (Jan. 1986).

[biblio01entry575] 575. J. Knight and N. Leveson, “On N-version Programming,” Software Engineering Notes 15 (1), pp. 24–35 (Jan. 1990).

[biblio01entry576] 576. Knightmare, Secrets of a Super Hacker, Loompanics Unlimited (<year>1994</year>).

[biblio01entry577] 577. L. Knudsen, “Cryptanalysis of LOKI91,” Advances in Cryptology—AUSCRYPT '92 Proceedings, pp. 196–208 (<year>1992</year>).

[biblio01entry578] 578. D. Knuth, The Art of Computer Programming Volume 2: Seminumerical Algorithms, 3rd Edition, Addison-Wesley, Reading, MA (1998).

[biblio01entry579] 579. L. Kohnfelder, “A Method for Certification,” Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA (May 1978); cited in Cryptography and Data Security [269].

[biblio01entry580] 580. C. Ko, G. Fink, and K. Levitt, “Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring,” Proceedings of the10th Annual Computer Security Applications Conference, pp. 134–144 (Dec. 1994).

[biblio01entry581] 581. C. Ko, T. Fraser, L. Badger, and D. Kilpatrick, “Detecting and Countering System Intrusions Using Software Wrappers,” Proceedings of the 9th USENIX Security Symposium, pp. 145–156 (Aug. 2000).

[biblio01entry582] 582. C. Ko, M. Ruschitzka, and K. Levitt, “Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach,” Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 175–187 (May 1997).

[biblio01entry583] 583. H.-P. Ko, “Security Properties of Ring Brackets,” Proceedings of the Computer Security Foundations Workshop II, pp. 41–46 (June 1989).

[biblio01entry584] 584. N. Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, New York, NY (<year>1994</year>).

[biblio01entry585] 585. C. Kocher, “Connecting Classified Nets to the Outside World: Costs and Benefits,” Proceedings of the 20th National Information Systems Security Conference, pp. 534–542 (Oct. 1997).

[biblio01entry586] 586. P. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” Advances in Cryptology—Proceedings of CRYPTO '96, pp. 104–113 (Aug. 1996).

[biblio01entry587] 587. P. Kocher, J. Jaffe, and B. Jun, “Differential Power Analysis,” Advances in Cryptology—Proceedings of CRYPTO '99, pp. 388–397 (Aug. 1999).

[biblio01entry588] 588. A. Koenig, C Traps and Pitfalls, Addison-Wesley, Reading, MA (<year>1989</year>).

[biblio01entry589] 589. J. Kohl and C. Neuman, The Kerberos Network Authentication Service (V5), RFC 1510 (Sep. 1993).

[biblio01entry590] 590. A. Konheim, Cryptography: A Primer, John Wiley and Sons, New York, NY (<year>1981</year>).

[biblio01entry591] 591. C. Kormos, L. Gallagher, N. Givans, and N. Bartol, “Using Security Metrics to Assess Risk Management Capabilities,” Proceedings of the 22nd National Information Systems Security Conference, pp. 370–388 (Oct. 1999).

[biblio01entry592] 592. D. Kosiur, Building and Managing Virtual Private Networks, John Wiley and Sons, New York, NY (<year>1998</year>).

[biblio01entry593] 593. S. Kramer, “On Incorporating Access Control Lists into the UNIX Operating System,” Proceedings of the USENIX UNIX Security Workshop, pp. 38–48 (Aug. 1988).

[biblio01entry594] 594. H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104 (Feb. 1997).

[biblio01entry595] 595. H. Krawczyk, “How to Predict Congruential Generators,” Journal of Algorithms 13 (4), pp. 527–545 (Dec. 1992).

[biblio01entry596] 596. W. Kremer, H. Saraidaridis, and A. Sripad, “The D5 Digital Terminal System: A Case Study of a Comprehensive Quality and Reliability Program,” IEEE Journal on Selected Areas in Communications 4 (7), pp. 1099–1103 (Oct. 1986).

[biblio01entry597] 597. D. Kristol and L. Montulli, HTTP State Management Mechanism, RFC 2109 (Feb. 1997).

[biblio01entry598] 598. I. Krsul and E. Spafford, “Authorship Analysis: Identifying the Author of a Program,” Proceedings of the 18th National Information Systems Security Conference, pp. 514–524 (Oct. 1995).

[biblio01entry599] 599. C. Kubicki, “The System Administration Maturity Model—SAMM,” Proceedings of the 7th Systems Administration Conference (LISA 1993), pp. 213–225 (Nov. 1993).

[biblio01entry600] 600. R. Kuhn, “Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems,” Proceedings of the 2nd ACM Workshop on Role-Based Access Control, pp. 23–30 (Nov. 1997).

[biblio01entry601] 601. S. Kumar and E. Spafford, “A Pattern Matching Model for Misuse Intrusion Detection,” Proceedings of the 17th National Computer Security Conference, pp. 11–21 (Oct. 1994).

[biblio01entry602] 602. J. Lacy, D. Mitchell, and W. Schell, “CrptoLib: Cryptography in Software,” Proceedings of the 4th USENIX UNIX Security Symposium, pp. 1–17 (June 1993).

[biblio01entry603] 603. N. Lai and T. Gray, “Strengthening Discretionary Access Controls to Inhibit Trojan Horses and Computer Viruses,” Proceedings of the 1988 Summer USENIX Conference, pp. 275–286 (June 1988).

[biblio01entry604] 604. X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis,” Advances in Cryptology—Proceedings of EUROCRYPT '91, pp. 17–38 (<year>1991</year>).

[biblio01entry605] 605. B. LaMacchia and A. Odlyzko, “Computation of Discrete Logarithms in Prime Fields,” Designs, Codes, and Cryptography 1, pp. 46–62 (May 1991).

[biblio01entry606] 606. L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM 24 (11), pp. 770–771 (Nov. 1981).

[biblio01entry607] 607. L. Lamport, “Time, Clocks, and the Ordering of Events in a Distributed System,” Communications of the ACM 21 (7), pp. 558–565 (July 1978).

[biblio01entry608] 608. B. Lampson, “Protection,” Proceedings of the Fifth Princeton Symposium of Information Science and Systems, pp. 437–443 (Mar. 1971); reprinted in Operating Systems Review 8 (1), pp. 18–24 (Jan. 1974).

[biblio01entry609] 609. B. Lampson, “A Note on the Confinement Problem,” Communications of the ACM 16 (10), pp. 613–615 (Oct. 1973).

[biblio01entry610] 610. L. Laudan, The Book of Risks: Fascinating Facts About the Chances We Take Every Day, John Wiley and Sons, New York, NY 10158 (<year>1994</year>).

[biblio01entry611] 611. T. Lane and C. Brodley, “Temporal Sequence Learning and Data Reduction for Anomaly Detection,” ACM Transactions on Information and System Security 2 (3), pp. 295–332 (Aug. 1999).

[biblio01entry612] 612. C. Landwehr, “Formal Models for Computer Security,” Computing Surveys 13 (3), pp. 247–278 (Sep. 1981).

[biblio01entry613] 613. C. Landwehr, C. Heitmeyer, and J. McLean, “A Security Model for Military Message Systems,” ACM Transactions on Computer Systems 2 (2), pp. 198–222 (Aug. 1984).

[biblio01entry614] 614. C. Landwehr, A. Bull, J. McDermott, and W. Choi, “A Taxonomy of Computer Program Security Flaws,” Computing Surveys 26 (3), pp. 211–254 (Sep. 1994).

[biblio01entry615] 615. C. Landwehr and D. Goldschlag, “Security Issues in Networks with Internet Access,” Proceedings of the IEEE 85 (12), pp. 2034–2051 (Dec. 1997).

[biblio01entry616] 616. L. Lankewicz and M. Benard, “Real-Time Anomaly Detection Using a Nonparametric Pattern Recognition Approach,” Proceedings of the 7th Annual Computer Security Applications Conference, pp. 80–89 (Dec. 1991).

[biblio01entry617] 617. L. LaPadula, “The 'Basic Security Theorem' of Bell and LaPadula Revisited,” handout from Computer Security Foundations Workshop (April 18, 1988).

[biblio01entry618] 618. G. Lawton, “Biometrics: A New Era in Security,” IEEE Computer 31 (8), pp. 16–18 (Aug. 1998).

[biblio01entry619] 619. T. Lee, “Using Mandatory Integrity to Enforce 'Commercial' Security,” Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 140–146 (Apr. 1988).

[biblio01entry620] 620. W. Lee, “A Data Mining Framework for Building Intrusion Detection Models,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120–132 (May 1999).

[biblio01entry621] 621. P. Leong and C. Tham, “UNIX Password Encryption Considered Insecure,” Proceedings of the 1991 Winter USENIX Technical Conference, pp. 269–280 (Jan. 1991).

[biblio01entry622] 622. N. Leveson, Safeware: System Safety and Computers, Addison-Wesley, Reading, MA (<year>1995</year>).

[biblio01entry623] 623. A. Levi and M. Caglayan, “An Efficient, Dynamic, and Trust Preserving Public Key Infrastructure,” Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 203–214 (May 2000).

[biblio01entry624] 624. R. Levin, The Computer Virus Handbook, Osborne McGraw-Hill, Berkeley, CA (<year>1990</year>).

[biblio01entry625] 625. W. Ley, Watchers of the Skies: An Informal History of Astronomy from Babylon to the Space Age, Viking Press, New York, NY (<year>1966</year>).

[biblio01entry626] 626. Q. Li and B.-H. Juang, “Speaker Verification Using Verbal Information Verification for Automatic Enrollment,” Proceedings of the 1998 IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 133–136 (May 1998).

[biblio01entry627] 627. Q. Li, B.-H. Juang, and C.-H. Lee, “Automatic Verbal Information Verification for User Authentication,” IEEE Transactions on Speech and Audio Processing 8 (5), pp. 585–596 (Sep. 2000).

[biblio01entry628] 628. Q. Li, B.-H. Juang, C.-H. Lee, Q. Zhou, and F. K. Soong, “Recent Advancements in Automatic Speaker Authentication,” IEEE Robotics and Automation Magazine 6 (1), pp. 24–34 (Mar. 1999).

[biblio01entry629] 629. A. Liebenberg and J. Eloff, “MASS—Model for an Auditing Security System,” Proceedings of SEC 2000: Information Security, pp. 141–150 (Aug. 2000).

[biblio01entry630] 630. H.-Y. Lin and L. Harn, “A Generalized Secret Sharing Scheme with Cheater Detection,” Advances in Cryptology—Proceedings of ASIACRYPT '91, pp. 149–158 (<year>1991</year>).

[biblio01entry631] 631. T. Lin, “Chinese Wall Security Policy—An Aggressive Model,” Proceedings of the 5th Annual Computer Security Conference, pp. 282–289 (Dec. 1989).

[biblio01entry632] 632. R. Linde, “Operating Systems Penetration,” 1978 National Computer Conference, AFIPS Conference Proceedings 44, pp. 361–368 (Nov. 1975).

[biblio01entry633] 633. R. Linde, C. Weissman, and C. Fox, “The ADEPT-50 Time-Sharing System,” Proceedings of the 1969 Fall Joint Computer Conference, pp. 39–50 (Nov. 1969).

[biblio01entry634] 634. J. Linn, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, RFC 1421 (Feb. 1993).

[biblio01entry635] 635. S. Lipner, “A Comment on the Confinement Problem,” Proceedings of the 5th Symposium on Operating Systems Principles, pp. 192–196 (Nov. 1975).

[biblio01entry636] 636. S. Lipner, “Non-Discretionary Controls for Commercial Applications,” Proceedings of the 1982 Symposium on Privacy and Security, pp. 2–10 (Apr. 1982).

[biblio01entry637] 637. S. Lipner, “Twenty Years of Evaluation Criteria and Commercial Technology,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 111–112 (May 1999).

[biblio01entry638] 638. R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation,” Proceedings of the DARPA Information Survivability Conference and Exposition, 2, pp. 12–26 (Jan. 2000).

[biblio01entry639] 639. R. Lippmann, J. Haines, D. Fired, J. Korba, and K. Das, “Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation,” Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, pp. 162–182 (Oct. 2000).

[biblio01entry640] 640. R. Lipton and T. Budd, “On Classes of Protection Systems,” in Foundations of Secure Computing [265], pp. 281–291.

[biblio01entry641] 641. R. Lipton and L. Snyder, “A Linear Time Algorithm for Deciding Subject Security,” Journal of the ACM 24 (3), pp. 455–464 (July 1977).

[biblio01entry642] 642. J. Littman, The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen, Little, Brown, & Co., Boston, MA (<year>1997</year>).

[biblio01entry643] 643. S. Lodin and C. Schuba, “Firewalls Fend Off Invasions from the Net,” IEEE Spectrum 35 (2), pp. 26–34 (Feb. 1998).

[biblio01entry644] 644. L. Lopez and J. Carracedo, “Hierarchical Organization of Certification Authorities for Secure Environments,” Proceedings of the 1997 Symposium on Network and Distributed System Security, pp. 112–121 (Feb. 1997).

[biblio01entry645] 645. M. Ludwig, The Giant Black Book of Computer Viruses, American Eagle Publishers, Phoenix, AZ (<year>1998</year>).

[biblio01entry646] 646. E. Lundin and E. Jonsson, “Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problems,” Computer Networks 34 (4), pp. 623–640 (Oct. 2000).

[biblio01entry647] 647. U. Lindqvist, T. Olovsson, and E. Jonsson, “An Analysis of a Secure System Based on Trusted Components,” Proceedings of the 11th Annual Conference on Computer Assurance, pp. 213–223 (June 1996).

[biblio01entry648] 648. T. Lunt and R. Jagannathan, “A Prototype Real-Time Intrusion-Detection Expert System,” Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 2–10 (Apr. 1988).

[biblio01entry649] 649. T. Lunt, R. Schell, W. Shockley, M. Heckman, and D. Warren, “ A Near-Term Design for the SeaView Multilevel Database System,” Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 234–244 (Apr. 1988).

[biblio01entry650] 650. E. Lupu and M. Sloman, “Towards a Role-Based Framework for Distributed Systems Management,” Journal of Network and Systems Management 5 (1), pp. 5–30 (Mar. 1997).

[biblio01entry651] 651. R. Lutz, “Analyzing Software Requirements Errors in Safety-Critical, Embedded Systems,” Proceedings of the IEEE International Symposium on Requirements Engineering, pp. 126–133 (Jan. 1993).

[biblio01entry652] 652. S. Maguire, Writing Solid Code: Microsoft's Techniques for Developing Bug-Free C Programs, Microsoft Press, Redmond, WA (<year>1993</year>).

[biblio01entry653] 653. Her Majesty's Stationery Office, Securities and Investment Board Rules, Chapter III, Part 5:08, London, UK; cited in “The Chinese Wall Policy” [146].

[biblio01entry654] 654. Her Majesty's Stationery Office, Financial Services Act 1986, §48(2)(h), London, UK (<year>1986</year>); cited in “The Chinese Wall Policy” [146].

[biblio01entry655] 655. D. Malkhi, M. Reiter, and A. Rubin, “Secure Execution of Java Applets Using a Remote Playground,” Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 40–51 (May 1998).

[biblio01entry656] 656. U. Manber, “A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack,” Computers and Security 15 (2), pp. 171–176, (Mar. 1996).

[biblio01entry657] 657. D. Mann and S. Christey, “Towards a Common Enumeration of Vulnerabilities,” Proceedings of the 2nd Workshop on Research with Security Vulnerability Databases (Jan. 1999).

[biblio01entry658] 658. C. Markantonakis, “Secure Log File Download Mechanisms for Smart Cards,” Proceedings of the 3rd International Conference on Smart Card Research and Applications, pp. 285–304 (Sep. 1998).

[biblio01entry659] 659. C. Markantonakis and S. Xenitellis, “Implementing a Secure Log File Download Manager for the Java Card,” Proceedings of the Conference on Communications and Multi-Media Security, pp. 143–159 (Sep. 1999).

[biblio01entry660] 660. T. Markham and C. Williams, “Key Recovery Header for IPSEC,” Computers and Security 19 (1), pp. 86–90 (Jan./Feb. 2000).

[biblio01entry661] 661. M. Marrinan, “In the Chips (Smart Card Applications),” Bank Systems and Technology 32 (5), pp. 46–48 (May 1995).

[biblio01entry662] 662. D. Martin, S. Rajagopalan, and A. Rubin, “Blocking Java Applets at the Firewall,” Proceedings of the 1997 Symposium on Network and Distributed System Security, pp. 16–26 (Feb. 1997).

[biblio01entry663] 663. M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” Advances in Cryptology—Proceedings of EUROCRYPT '93, pp. 386–397 (May 1993).

[biblio01entry664] 664. M. Matsumoto, S. Shimagaki, D. Watanabe, and K. Mori, “Assurance Technologies for Autonomous Train On-Board Computer System,” Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computing Systems, pp. 170–175 (Oct. 2001).

[biblio01entry665] 665. S. Matyas and C. Meyer, “Generation, Distribution, and Installation of Cryptographic Keys,” IBM Systems Journal 17 (2), pp. 126–137 (1978).

[biblio01entry666] 666. D. Maughan, M. Schertler, M. Schneider, and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP), RFC 2408 (Nov. 1998).

[biblio01entry667] 667. A. Mayer, A. Wool, and E. Ziskind, “Fang: a Firewall Analysis Engine,” Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 177–187 (May 2000).

[biblio01entry668] 668. D. Mazières and M. Kaashoek, “The Design, Implementation, and Operation of an Email Pseudonym Server,” Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 27–36 (Nov. 1998).

[biblio01entry669] 669. S. McCanne and V. Jacobson, “The BSD Packet Filter: A New Architecture for User-Level Packet Capture,” Proceedings of the 1993 Winter USENIX Conference, pp. 259–269 (Jan. 1993).

[biblio01entry670] 670. C. McCollum, J. Messing, and L. Notargiacomo, “Beyond the Pale of MAC and DAC—Defining New Forms of Access Control,” Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 190–200 (May 1990).

[biblio01entry671] 671. D. McCullagh, “DVD Lawyers Make Secret Public,” Wired News (Jan. 26, 2000); available at http://www.wired.com/news/politics/0,1283,33922,00.html.

[biblio01entry672] 672. D. McCullough, “Specifications for Multi-Level Security and a Hook-Up Theorem,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 161–166 (Apr. 1987).

[biblio01entry673] 673. D. McCullough, “Non-Interference and the Composability of Security Properties,” Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 177–186 (Apr. 1988).

[biblio01entry674] 674. J. McDermid and Q. Shi, “Secure Composition of Systems,” Proceedings of the 8th Annual Computer Security Applications Conference, pp. 112–122 (Dec. 1992).

[biblio01entry675] 675. J. McDermott and C. Fox, “Using Abuse Case Models for Security Requirements Analysis,” Proceedings of the 15th Annual Computer Security Applications Conference, pp. 55–64 (Dec. 1999).

[biblio01entry676] 676. G. McGraw, “Software Assurance for Security,” IEEE Computer 32 (4), pp. 103–105 (Apr. 1999).

[biblio01entry677] 677. J. McHugh, “The 1998 Lincoln Laboratory IDS Evaluation: A Critique,” Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, pp. 145–161 (Oct. 2000).

[biblio01entry678] 678. J. McHugh and D. Good, “An Information Flow Tool for Gypsy,” Proceedings of the 1985 IEEE Symposium on Security and Privacy, pp. 46–48 (Apr. 1985).

[biblio01entry679] 679. M. McIlroy, “Virology 101,” Computing Systems 2 (2), pp. 173–181 (Spring 1989).

[biblio01entry680] 680. M. McKusick, K. Bostic, M. Karels, and J. Quarterman, The Design and Implementation of the 4.4BSD Operating System, Addison-Wesley Publishing Co., Reading, MA (<year>1996</year>).

[biblio01entry681] 681. I. McLean, Windows 2000 Security, The Coriolis Group, LLC., Scottsdale, AZ (<year>2000</year>).

[biblio01entry682] 682. J. McLean, “A Comment on the 'Basic Security Theorem' of Bell and LaPadula,” Information Processing Letters 20 (2), pp. 67–70 (Feb. 1985).

[biblio01entry683] 683. J. McLean, “Reasoning About Security Models,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 123–131 (Apr. 1987).

[biblio01entry684] 684. J. McLean, “Proving Noninterference and Functional Correctness Using Traces,” Journal of Computer Security 1 (1), pp. 37–57 (1992).

[biblio01entry685] 685. J. McLean, “Is the Trusted Computing Base Concept Fundamentally Flawed?” Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 2 (May 1997).

[biblio01entry686] 686. J. McLean, “Twenty Years of Formal Methods,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 115–116 (May 1999).

[biblio01entry687] 687. D. McNutt, “Role-Based System Administration or Who, What, Where, and How,” Proceedings of the 7th System Administration Conference (LISA '93), pp. 107–112 (Nov. 1993).

[biblio01entry688] 688. C. Meadows, “The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 212–218 (Apr. 1987).

[biblio01entry689] 689. C. Meadows, “Extending the Brewer-Nash Model to a Multilevel Context,” Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 95–102 (May 1990).

[biblio01entry690] 690. C. Meadows, “The NRL Protocol Analyzer: An Overview,” Journal of Logic Programming 26 (2), pp. 113–131 (Feb. 1996).

[biblio01entry691] 691. C. Meadows, “Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches,” Proceedings of the 4th European Symposium on Research in Computer Security, pp. 351–364 (Sep. 1996).

[biblio01entry692] 692. C. Meadows, “Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 216–231 (May 1999).

[biblio01entry693] 693. G. Medvinsky and B. Neuman, “NetCash: A Design for Practical Electronic Currency on the Internet,” Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 102–106 (Oct. 1993).

[biblio01entry694] 694. N. Mehta and K. Sollins, “Expanding and Extending the Security Features of Java,” Proceedings of the 7th USENIX Security Symposium, pp. 159–172 (Jan. 1998).

[biblio01entry695] 695. A. Menezes, P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL (<year>1997</year>).

[biblio01entry696] 696. C. Menk, III, “System Security Engineering Capability Maturity Model and Evaluations: Partners Within the Assurance Framework,” Proceedings of the 19th National Information Systems Security Conference, pp. 76–88 (Oct. 1996).

[biblio01entry697] 697. R. Merkle, “Protocols for Public Key Cryptosystems,” Proceedings of the 1980 Symposium on Privacy and Security, pp. 122–133 (Apr. 1980).

[biblio01entry698] 698. R. Merkle, “A Fast Software One-Way Hash Function,” Journal of Cryptology 3 (1), pp. 43–58 (1990).

[biblio01entry699] 699. R. Merkle, “Fast Software Encryption Functions,” Advances in Cryptology—Proceedings of CRYPTO '90, pp. 476–501 (Aug. 1990).

[biblio01entry700] 700. R. Merkle and M. Hellman, “On the Security of Multiple Encryption,” Communications of the ACM 24 (7), pp. 465–467 (July 1981).

[biblio01entry701] 701. C. Meyer, “Ciphertext/Plaintext and Ciphertext/Key Dependence vs. Number of Rounds for the Data Encryption Standard,” 1978 National Computer Conference, AFIPS Conference Proceedings 47, pp. 1119–1126 (June 1978).

[biblio01entry702] 702. C. Meyer and S. Matyas, Cryptography: A New Dimension in Computer Data Security: A Guide for the Design and Implementation of Secure Systems, John Wiley and Sons, New York, NY (<year>1982</year>).

[biblio01entry703] 703. G. Meyer, The PPP Encryption Control Protocol (ECP), RFC 1968 (June 1996).

[biblio01entry704] 704. S. Mhlaba, “The Efficacy of International Regulation of Transborder Data Flows: The Case for the Clipper Chip,” Government Information Quarterly 12 (4), pp. 353–366 (1995).

[biblio01entry705] 705. C. Michael and A. Ghosh, “Two State-Based Approaches to Program-Based Anomaly Detection,” Proceedings of the 16th Annual Computer Security Applications Conference, pp. 21–30 (Dec. 2000).

[biblio01entry706] 706. G. Michaelson and M. Prior, Naming Guidelines for the AARNet X.500 Directory Service, RFC 1562 (Dec. 1993).

[biblio01entry707] 707. J. Millen, “The Interrogator: A Tool for Cryptographic Protocol Security,” Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 134–141 (Apr. 1984).

[biblio01entry708] 708. J. Millen, C. Clark, and S. Freedman, “The Interrogator: Protocol Security Analysis,” IEEE Transactions on Software Engineering 13 (2), pp. 274–288 (Feb. 1987).

[biblio01entry709] 709. J. Millen, “The Cascading Problem for Interconnected Networks,” Proceedings of the 4th Aerospace Computer Security Applications Conference, pp. 269–274 (Dec. 1988).

[biblio01entry710] 710. J. Millen, “Covert Channel Capacity,” Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 60–65 (May 1993).

[biblio01entry711] 711. J. Millen, “Unwinding Forward Correctability,” Journal of Computer Security 3 (1), pp. 35–54 (1994/1995).

[biblio01entry712] 712. J. Millen, “20 Years of Covert Channel Modeling and Analysis,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 113–114 (May 1999).

[biblio01entry713] 713. B. Miller, “Vital Signs of Identity,” IEEE Spectrum 31 (2), pp. 22–30 (Jan. 1994).

[biblio01entry714] 714. B. Miller, L. Fredriksen, and B. So, “An Empirical Study of the Reliability of UNIX Utilities,” Communications of the ACM 33 (12), pp. 32–44 (Dec. 1990).

[biblio01entry715] 715. D. Miller and R. Baldwin, “Access Control by Boolean Expression Evaluation,” Proceedings of the 5th Annual Computer Security Applications Conference, pp. 131–139 (Dec. 1990).

[biblio01entry716] 716. T. Miller and T. De Raadt, “strlcpy and strlcat—Consistent, Safe, String Copy and Concatenation,” Proceedings of the FREENIX Track of the 1999 USENIX Conference, pp. 175–178 (June 1999).

[biblio01entry717] 717. M. Minsky, Computation: Finite and Infinite Machines, Prentice-Hall, Englewood Cliffs, NJ (<year>1967</year>).

[biblio01entry718] 718. N. Minsky, “Selective and Locally Controlled Transport of Privileges,” ACM Transactions on Programming Languages and Systems 6 (4), pp. 573–602 (Oct. 1984).

[biblio01entry719] 719. S. Mister and S. Tavares, “Cryptanalysis of RC4-Like Ciphers,” Proceedings of the 5th Annual International Workshop on Selected Areas in Cryptography, pp. 131–143 (Aug. 1998).

[biblio01entry720] 720. J. Mitchell, V. Shmatikov, and U. Stern, “Finite-State Analysis of SSL 3.0,” Proceedings of the 7th USENIX Security Symposium, pp. 201–215 (Jan. 1998).

[biblio01entry721] 721. S. Miyaguchi, “The FEAL Cipher Family,” Advances in Cryptology—Proceedings of EUROCRYPT '90, pp. 627–638 (<year>1991</year>).

[biblio01entry722] 722. P. Mockapetris, Domain Names Concepts and Facilities, RFC 1034 (Nov. 1987).

[biblio01entry723] 723. P. Mockapetris, Domain Names Implementation and Specification, RFC 1035 (Nov. 1987).

[biblio01entry724] 724. J. Mogul, R. Rashid, and M. Accetta, “The Packet Filter: An Efficient Mechanism for User-Level Network Code,” Proceedings of the 11th Symposium on Operating Systems Principles, pp. 39–51 (Nov. 1987).

[biblio01entry725] 725. V.Molak (ed.), Fundamentals of Risk Analysis and Risk Management, CRC Press, Boca Raton, FL (<year>1996</year>).

[biblio01entry726] 726. F. Monrose, “Biometrics for Automatic Identity Verification,” Technical Report 722, Department of Computer Science, New York University, New York, NY (1998).

[biblio01entry727] 727. F. Monrose and A. Rubin, “Authentication via Keystroke Dynamics,” Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56 (Nov. 1997).

[biblio01entry728] 728. A. Moore and C. Payne,, Jr., “Increasing Assurance with Literate Programming Techniques,” Proceedings of the 11th Annual Conference on Computer Assurance, pp. 187–198 (June 1996).

[biblio01entry729] 729. J. Moore, “Protocol Failures in Cryptosystems,” Proceedings of the IEEE 76 (5), pp. 594–602 (May 1988).

[biblio01entry730] 730. M. Moriconi, X. Qian, R. Riemenschneider, and L. Gong, “Secure Software Architectures,” Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 84–93 (May 1997).

[biblio01entry731] 731. R. Morris and K. Thompson, “Password Security: A Case History,” Communications of the ACM 22 (11), pp. 594–597 (Nov. 1979).

[biblio01entry732] 732. I. Moskowitz, “Variable Noise Effects upon a Simple Timing Channel,” Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pp. 362–372 (May 1991).

[biblio01entry733] 733. I. Moskowitz and A. Miller, “The Influence of Delay upon an Idealized Channel's Bandwidth,” Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp. 62–67 (May 1992).

[biblio01entry734] 734. I. Moskowitz, S. Greenwald, and M. Kang, “An Analysis of the Timed Z-Channel,” Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 2–9 (May 1996).

[biblio01entry735] 735. G. Mourani, Securing and Optimizing Linux: Red Hat Edition—A Hands-On Guide, OpenDocs, LLC, Salem, OR (Aug. 2000).

[biblio01entry736] 736. A. Muffett, “crack” (unpublished) (1992).

[biblio01entry737] 737. A. Muffett, “WAN-Hacking with AutoHack: Auditing Security Behind the Firewall,” Proceedings of the 5th USENIX UNIX Security Symposium, pp. 21–34 (June 1995).

[biblio01entry738] 738. S. Murphy, “The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts,” Journal of Cryptology 2 (3), pp. 145–154 (1990).

[biblio01entry739] 739. W. Murray, “The Application of Epidemiology to Computer Viruses,” Computers and Security 7 (1), pp. 139–150 (Feb. 1988).

[biblio01entry740] 740. A. Myers and B. Liskov, “Complete, Safe Information Flow with Decentralized Labels,” Proceedings of the 1998 IEEE Computer Society Symposium on Security and Privacy, pp. 186–197 (May 1998).

[biblio01entry741] 741. M. Nash and R. Kennett, “Security Policy in a Complex Logistics Procurement,” Proceedings of the 9th Annual Computer Security Applications Conference, pp. 46–53 (Dec. 1993).

[biblio01entry742] 742. M. Nash and K. Poland, “Some Conundrums Concerning Separation of Duty,” Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 201–207 (May 1990).

[biblio01entry743] 743. National Bureau of Standards, Data Encryption Standard, FIPS PUB 46 (Jan. 1977).

[biblio01entry744] 744. National Bureau of Standards, DES Modes of Operation, FIPS PUB 81 (Dec. 1980).

[biblio01entry745] 745. National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180 (May 1993).

[biblio01entry746] 746. National Institute of Standards and Technology, Escrowed Encryption Standard (EES), FIPS PUB 185 (Feb. 1994).

[biblio01entry747] 747. National Institute of Standards and Technology, Digital Signature Standard, FIPS PUB 187 (May 1994).

[biblio01entry748] 748. National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180-1 (Apr. 1995).

[biblio01entry749] 749. National Institute of Standards and Technology, “SKIPJACK and KEA Algorithm Specifications,” Version 2.0 (May 1998); available at http://csrc.nist.gov/encryption/skipjack.pdf.

[biblio01entry750] 750. National Institute of Standards and Technology, Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model, Version 2.1, CCIMB-99-031 (Aug. 1999).

[biblio01entry751] 751. National Institute of Standards and Technology, Common Criteria for Information Technology Security Evaluation, Part 2: Security Function Requirements, Version 2.1, CCIMB-99-031 (Aug. 1999).

[biblio01entry752] 752. National Institute of Standards and Technology, Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Requirements, Version 2.1, CCIMB-99-031 (Aug. 1999).

[biblio01entry753] 753. National Institute of Standards and Technology, Security Requirements for Cryptographic Modules, FIPS PUB 140-2 (May 2001).

[biblio01entry754] 754. National Institute of Standards and Technology, Advanced Encryption Standard (AES), FIPS PUB 197 (Nov. 2001).

[biblio01entry755] 755. National Institute of Standards and Technology, “National Information Assurance Partnership: Common Criteria Evaluation and Validation Scheme Web Site,” http://niap.nist.gov/cc-scheme (Apr. 2002).

[biblio01entry756] 756. National Institute of Standards and Technology, “Cryptographic Module Validation (CMV) Program Web Site,” http://csrc.nist.gov/cryptval (May 2002).

[biblio01entry757] 757. National Institute of Standards and Technology and National Security Agency, Federal Criteria for Information Technology Security, Version 1.0 (<year>1992</year>).

[biblio01entry758] 758. National Security Agency, Cryptolog Interface Programmers Guide for the Fortezza Crypto Card, Revision 1.52, Ft. George Meade, MD (Nov. 1995).

[biblio01entry759] 759. National Security Agency, Fortezza Message Security Protocol Software Interface Control Document, Version 3.01, Ft. George Meade, MD (Nov. 1995).

[biblio01entry760] 760. National Security Agency, Press Release: NSA Releases Fortezza Algorithms, Ft. George Meade, MD (June 1998).

[biblio01entry761] 761. National Security Telecommunications and Information Systems Security Committee, National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009 (Sep. 2000).

[biblio01entry762] 762. G. Necula, “Proof-Carrying Code,” Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–119 (Jan. 1997).

[biblio01entry763] 763. G. Necula and P. Lee, “Safe Kernel Extensions Without Run-Time Checking,” Proceedings of the 2nd Symposium on Operating Systems Design and Implementation, pp. 229–243 (Oct. 1996).

[biblio01entry764] 764. R. Needham and M. Schroeder, “Using Encryption for Authentication in Large Networks of Computers,” Communications of the ACM 21 (12), pp. 993–999 (Dec. 1978).

[biblio01entry765] 765. R. Needham and M. Schroeder, “Authentication Revisited,” Operating Systems Review 21 (1), p. 7 (Jan. 1987).

[biblio01entry766] 766. R. Needham and R. Walker, “The Cambridge CAP Computer and Its Protection System,” Proceedings of the 5th Symposium on Operating System Principles, pp. 1–10 (Nov. 1975).

[biblio01entry767] 767. E. Nemeth, G. Snyder, S. Seebass, and T. Hein, UNIX System Administration Handbook, Prentice-Hall, Upper Saddle River, NJ (<year>2000</year>).

[biblio01entry768] 768. B. Neuman and S. Stubblebine, “A Note on the Use of Timestamps as Nonces,” Operating Systems Review 27 (2), pp. 10–14 (Apr. 1993).

[biblio01entry769] 769. P. Neumann, “Computer Security Evaluation,” 1978 National Computer Conference, AFIPS Conference Proceedings 47, pp. 1087–1095 (June 1978).

[biblio01entry770] 770. P. Neumann, R. Feiertag, L. Robinson, and K. Levitt, “Software Development and Proofs of Multi-Level Security,” Proceedings of the 2nd International Conference on Software Engineering, pp. 421–428 (Oct. 1976).

[biblio01entry771] 771. P. Neumann, “Rainbows and Arrows: How the Security Criteria Address Computer Misuse,” Proceedings of the 13th National Computer Security Conference, pp. 414–422 (Oct. 1990).

[biblio01entry772] 772. P. Neumann, Computer-Related Risks, Addison-Wesley, Reading, MA (<year>1995</year>).

[biblio01entry773] 773. P. Neumann, L. Robinson, K. Levitt, R. Boyer, and A. Saxena, “A Provably Secure Operating System: The System, Its Applications, and Proofs,” Technical Report, SRI International, Menlo Park, CA (June 1975).

[biblio01entry774] 774. J. Newman, The World of Mathematics: A Small Library of the Literature of Mathematics from A'h-mosé the Scribe to Albert Einstein, Simon and Schuster, New York, NY (<year>1956</year>).

[biblio01entry775] 775. J. Newman and S. Wander, “The Knowledge Path to Mission Success: Overview of the NASA PBMA-KMS,” Proceedings of the 2002 Annual Reliability and Maintainability Symposium, pp. 601–606 (Jan. 2002).

[biblio01entry776] 776. J. Nieh and O. Leonard, “Examining VMware,” Dr. Dobb's Journal 25 (8), pp. 70–76 (Aug. 2000).

[biblio01entry777] 777. E. Nikolaropoulos, “Testing Safety-Critical Software,” Hewlett-Packard Journal 48 (3), pp. 89–94 (June 1997).

[biblio01entry778] 778. L. Nizer, The Jury Returns, Doubleday, Garden City, NY (<year>1966</year>).

[biblio01entry779] 779. S. Northcutt, Computer Security Incident Handling: Step by Step, Version 1.5, The SANS Institute, Bethesda, MD (May 1998).

[biblio01entry780] 780. S. Northcutt, Network Intrusion Detection: An Analyst's Handbook, 2nd Edition, New Riders Publishing, Indianapolis, IN (<year>2000</year>).

[biblio01entry781] 781. L. Notargiacomo, B. Blaustein, and C. McCollum, “Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management,” Journal of Computer Security 3 (2, 3), pp. 207–230 (1994/1995).

[biblio01entry782] 782. M. Nyanchama and S. Osborn, “Role-Based Security, Object Oriented Databases and Separation of Duty,” SIGMOD Record 22 (4), pp. 45–51 (Dec. 1993).

[biblio01entry783] 783. C. Oakes, “DVD Hackers Hit with Lawsuit,” Wired News (Dec. 28, 1999); available at http://www.wired.com/news/business/0,1367,33303,00.html.

[biblio01entry784] 784. D. O'Brien, “Recognizing and Recovering from Rootkit Attacks,” SysAdmin 5 (11), pp. 8–20 (Nov. 1996).

[biblio01entry785] 785. R. O'Brien and C. Rogers, “Developing Applications on LOCK,” Proceedings of the 14th National Computer Security Conference, pp. 147–156 (Oct. 1991).

[biblio01entry786] 786. T. Okamoto and K. Ohta, “Universal Electronic Cash,” Advances in Cryptology—Proceedings of CRYPTO '91, pp. 324–337 (Aug. 1992).

[biblio01entry787] 787. R. Oppliger, “Security at the Internet Layer,” IEEE Computer 31 (9), pp. 43–47 (Sep. 1998).

[biblio01entry788] 788. E. Organick, The MULTICS System: An Examination of Its Structure, The MIT Press, Cambridge, MA (<year>1972</year>).

[biblio01entry789] 789. E. Organick, Computer System Organization: The B5700/6700 Series, Academic Press, New York, NY (<year>1973</year>).

[biblio01entry790] 790. H. Orman, The OAKLEY Key Determination Protocol, RFC 2412 (Nov. 1998).

[biblio01entry791] 791. D. Otway and O. Rees, “Efficient and Timely Mutual Authentication,” Operating Systems Review 21 (1), pp. 8–10 (Jan. 1987).

[biblio01entry792] 792. S. Owre, J. Rushby, and N. Shankar, “PVS: A Prototype Verification System,” Proceedings of the 11th International Conference on Automated Deduction, pp. 748–752 (June 1992).

[biblio01entry793] 793. J. Page, “An Assured Pipeline Integrity Scheme for Virus Protection,” Proceedings of the 12th National Computer Security Conference, pp. 369–377 (Oct. 1989).

[biblio01entry794] 794. R. Pandey and B. Hashii, “Providing Fine-Grained Access Control for Java Programs,” Proceedings of the 13th European Conference on Object-Oriented Programming, pp. 449–473 (June 1999).

[biblio01entry795] 795. J. Park, B. Montrose, and J. Froscher, “Tools for Information Security Assurance Arguments,” Proceedings of the DARPA Information Survivability Conference and Exposition II, pp. 287–296 (June 2001).

[biblio01entry796] 796. J. Park and R. Sandhu, “Smart Certificates: Extending X.509 for Secure Attribute Services on the Web,” Proceedings of the 22nd National Information Systems Security Conference, pp. 337–348 (Oct. 1999).

[biblio01entry797] 797. S. Park and K. Miller, “Random Number Generators: Good Ones Are Hard to Find,” Communications of the ACM 31 (10), pp. 1192–1201 (Oct. 1988).

[biblio01entry798] 798. D. Parker, “Cease and DeCSS: DVD's Encryption Code Cracked,” eMedia Industry News (Nov. 4, 1999); available at http://www.emediapro.net/news99/news111.html.

[biblio01entry799] 799. D. Parker, Crime by Computer, Macmillan Publishing Co., New York, NY (<year>1978</year>).

[biblio01entry800] 800. R. Perlman, “An Overview of PKI Trust Models,” IEEE Network 13 (6), pp. 38–43 (Nov. 1999).

[biblio01entry801] 801. B. Perlmutter and J. Zarkower, Virtual Private Networking, Prentice-Hall, Upper Saddle River, NJ (<year>2000</year>).

[biblio01entry802] 802. G. Pernul, “Canonical Security Modeling for Federated Databases,” Proceedings of the IFIP WG2.6 Database Semantics Conference, pp. 207–222 (Nov. 1992).

[biblio01entry803] 803. J. Perry and J. Carney, “Human Face Recognition Using a Multilayer Perceptron,” International Conference on Neural Networks 2, p. 413 (1990); cited in “Biometrics for Automated Identity Verification” [726].

[biblio01entry804] 804. I. Peterson, Fatal Defects: Chasing Killer Computer Bugs, Vintage Books, New York, NY 10022 (<year>1996</year>).

[biblio01entry805] 805. J. Peterson and A. Silberschatz, Operating Systems Concepts (6th Edition), John Wiley and Sons, New York, NY (<year>2002</year>).

[biblio01entry806] 806. C. Pfleeger, “Comparison of Trusted Systems Evaluation Criteria,” Proceedings of the 5th Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security, pp. 135–143 (June 1990).

[biblio01entry807] 807. S. Pfleeger, Software Engineering: The Production of Quality Software, 2nd Edition, Macmillan Publishing Co., New York, NY (<year>1991</year>).

[biblio01entry808] 808. J. Picciotto, “The Design of an Effective Auditing Subsystem,” Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp. 13–22 (<year>1987</year>).

[biblio01entry809] 809. W. Polk, “Approximating Clark-Wilson 'Access Triples' with Basic UNIX Controls,” Proceedings of the 4th USENIX UNIX Security Symposium, pp. 145–154 (Oct. 1993).

[biblio01entry810] 810. G. Popek and R. Goldberg, “Formal Requirements for Virtualizable Third Generation Architectures,” Communications of the ACM 17 (7), pp. 412–421 (July 1974).

[biblio01entry811] 811. G. Popek and B. Walker, The LOCUS Distributed System Architecture, The MIT Press, Cambridge, MA (<year>1985</year>).

[biblio01entry812] 812. P. Porras and R. Kemmerer, “Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels,” Proceedings of the 1991 IEEE Symposium on Security and Privacy, pp. 36–51 (May 1991).

[biblio01entry813] 813. POSIX, Standard for Information Technology Portable Operating System Interface (POSIX) Part I: System Application Program Interface (API), Report 1003.1e (Apr. 1994).

[biblio01entry814] 814. J. Postel, Simple Mail Transfer Protocol, RFC 821 (Aug. 1982).

[biblio01entry815] 815. J. Postel and J. Reynolds, File Transfer Protocol, RFC 959 (Oct. 1985).

[biblio01entry816] 816. E. Powanda and J. Genovese, “Configuring a Trusted System Using the TNI,” Proceedings of the 4th Aerospace Computer Security Applications Conference, pp. 256–261 (Dec. 1988).

[biblio01entry817] 817. M. Pozzo and T. Gray, “A Model for the Containment of Computer Viruses,” Proceedings of the AIAA/ASIS/DODCI 2nd Aerospace Computer Security Conference, pp. 11–18 (Dec. 1986).

[biblio01entry818] 818. M. Pozzo and T. Gray, “An Approach to Containing Computer Viruses,” Computers and Security 6 (4), pp. 321–331 (Aug. 1987).

[biblio01entry819] 819. D. Price, “Pentium FDIV Flaw—Lessons Learned,” IEEE Micro 15 (2), pp. 86–88 (Apr. 1995).

[biblio01entry820] 820. N. Proctor, “The Restricted Access Processor: An Example of Formal Verification,” Proceedings of the 1985 IEEE Symposium on Security and Privacy, pp. 49–53 (Apr. 1985).

[biblio01entry821] 821. P. Proctor, The Practical Intrusion Detection Handbook, Prentice-Hall, Upper Saddle River, NJ (<year>2001</year>).

[biblio01entry822] 822. T. Ptacek and T. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Technical Report, Secure Networks, Inc., Calgary, Alberta, Canada (Jan. 1998).

[biblio01entry823] 823. N. Puketza, M. Chung, R. Olsson, and B. Mukherjee, “A Software Platform for Testing Intrusion Detection Systems,” IEEE Software 14 (5), pp. 43–51 (Sep. 1997).

[biblio01entry824] 824. L. Quarantiello, Cyber Crime: How to Protect Yourself from Computer Criminals, Tiare Publications, Lake George, WI (<year>1996</year>).

[biblio01entry825] 825. M. Rabin, “Probabilistic Algorithms for Primality Testing,” Journal of Number Theory 12 (1), pp. 128–138 (Feb. 1980).

[biblio01entry826] 826. S. Rajunas, N. Hardy, A. Bomberger, W. Frantz, and C. Landau, “Security in KeyKOS,” Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 78–85 (Apr. 1986).

[biblio01entry827] 827. B. Ramsey,, Jr., “Practical Steps Toward Providing a Cost-Effective Security Architecture Based on the Common Criteria,” Proceedings of the 21st National Information Systems Security Conference, pp. 30–41 (Oct. 1998).

[biblio01entry828] 828. The RAND Corporation, A Million Random Digits with 100,000 Normal Deviates, Free Press Publishers, Glencoe, IL (<year>1955</year>).

[biblio01entry829] 829. M. Ranum and F. Avolio, “A Toolkit and Methods for Internet Firewalls,” Proceedings of the Summer 1994 USENIX Conference, pp. 37–44 (June 1994).

[biblio01entry830] 830. M. Ranum, K. Landfield, M. Stolarchuk, M. Sienkiewicz, A. Lambeth, and E. Wall, “Implementing a Generalized Tool for Network Monitoring,” Proceedings of the 11th Systems Administration Conference (LISA 1997), pp. 26–31 (Dec. 1997).

[biblio01entry831] 831. K. Rao, “Security Audit for Embedded Avionics Systems,” Proceedings of the 5th Annual Computer Security Applications Conference, pp. 78–84 (Dec. 1989).

[biblio01entry832] 832. J. Ray and W. Ray, Mac OS X Unleashed, SAMS Publishing, Indianapolis, IN (<year>2001</year>).

[biblio01entry833] 833. D. Redell and R. Fabry, “Selective Revocation and Capabilities,” Proceedings of the International Workshop on Protection in Operating Systems, pp. 197–209 (Aug. 1974).

[biblio01entry834] 834. J. Reeds, “Cracking a Random Number Generator,” Cryptologia 1 (1), pp. 20–26 (Jan. 1977); cited in Applied Cryptography [888].

[biblio01entry835] 835. B. Reid, “Reflections on Some Recent Widespread Computer Break-Ins,” Communications of the ACM 30 (2), pp. 103–105 (Feb. 1987).

[biblio01entry836] 836. R. Reitman, “A Mechanism for Information Control in Parallel Programs,” Proceedings of the 7th Symposium on Operating Systems Principles, pp. 55–62 (Dec. 1979).

[biblio01entry837] 837. Y. Rekhter, B. Moscowitz, D. Karrenberg, G. de Groot, and E. Lear, Address Allocation for Private Internets, RFC 1918 (Feb. 1996).

[biblio01entry838] 838. T. Riechmann and F. Hauck, “Meta Objects for Access Control: Extending Capability-Based Security,” Proceedings of the 1997 New Security Paradigms Workshop, pp. 17–22 (Sep. 1997).

[biblio01entry839] 839. D. Ritchie, “Joy of Reproduction,” net.lang.c (Nov. 4, 1982).

[biblio01entry840] 840. D. Ritchie, “On the Security of UNIX,” UNIX System Manager's Manual, pp. SM17: 1–3 (<year>1979</year>).

[biblio01entry841] 841. R. Rivest, The MD4 Message Digest Algorithm, RFC 1320 (Apr. 1992).

[biblio01entry842] 842. R. Rivest, The MD5 Message Digest Algorithm, RFC 1321 (Apr. 1992).

[biblio01entry843] 843. R. Rivest, M. Hellman, J. Anderson, and J. Lyons, “Responses to NIST's Proposal,” Communications of the ACM 35 (7), pp. 41–54 (July 1992).

[biblio01entry844] 844. R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM 21 (2), pp. 120–126 (Feb. 1978).

[biblio01entry845] 845. J. Rochlis and M. Eichin, “The Internet Worm, with Microscope and Tweezers: the Worm from MIT's Perspective,” Communications of the ACM 32 (6), pp. 689–698 (June 1989).

[biblio01entry846] 846. G. Rodney, “Assuring Safety and Mission Success for Space Station Freedom,” Proceedings of the 1990 International Symposium on Reliability and Maintainability, pp. 7–12 (June 1990).

[biblio01entry847] 847. E. Rodríguez and J. Piquer, “The Persistent Hacker: An Intruder Attacks a New Internet Host,” Proceedings of the 4th USENIX UNIX Security Symposium, pp. 131–138 (Oct. 1993).

[biblio01entry848] 848. A. Roscoe, “Modelling and Verifying Key-Exchange Protocols Using CSP and FDR,” Proceedings of the 8th IEEE Computer Security Foundations Workshop, pp. 98–107 (June 1995).

[biblio01entry849] 849. A. Roscoe, J. Woodcock, and L. Wulf, “Non-Interference Through Determinism,” Journal of Computer Security 4 (1), pp. 27–53 (1996).

[biblio01entry850] 850. D. Rosenthal and F. Fung, “A Test for Non-Disclosure in Security Level Transitions,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 1–10 (May 1999).

[biblio01entry851] 851. W. Royce, “Managing the Development of Large Software Systems,” 1970 WESTCON Technical Papers 14, p. 8 (Aug. 1970).

[biblio01entry852] 852. M. Rubia, J. Cruellas, and M. Medina, “The DEDICA Project: The Solution to the Interoperability Problems Between the X.509 and EDIFACT Public Key Infrastructures,” Proceedings of Secure Networking—CQRE [Secure] '99 International Exhibition and Congress, pp. 242–250 (Nov. 1999).

[biblio01entry853] 853. L. Romano, A. Mazzeo, and N. Mazzocca, “SECURE: A Simulation Tool for PKI Design,” Proceedings of Secure Networking—CQRE [Secure] '99 International Exhibition and Congress, pp. 17–29 (Nov. 1999).

[biblio01entry854] 854. A. Rubin, “Independent One-Time Passwords,” Computing Systems 9 (1), pp. 15–27 (Winter 1996).

[biblio01entry855] 855. A. Rubin and M. Ranum, Web Security Sourcebook, John Wiley and Sons, New York, NY (<year>1997</year>).

[biblio01entry856] 856. C. Rubin, “UNIX System V with B2 Security,” Proceedings of the 13th National Computer Security Conference, pp. 1–9 (Oct. 1990).

[biblio01entry857] 857. R. Rueppel, “Stream Ciphers,” in Contemporary Cryptology: The Science of Information Integrity [927], pp. 65–134.

[biblio01entry858] 858. J. Rushby, “Noninterference, Transitivity, and Channel-Control Security Policies,” Technical Report CSL-92-02, Computer Science Laboratory, SRI International, Menlo Park, CA (Dec. 1992).

[biblio01entry859] 859. C. Rutstein, Windows NT Security: A Practical Guide to Securing Windows NT Servers and Workstations, McGraw-Hill, New York, NY (<year>1997</year>).

[biblio01entry860] 860. D. Safford, D. Schales, and D. Hess, “The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment,” Proceedings of the 4th USENIX UNIX Security Symposium, pp. 91–118 (Oct. 1993).

[biblio01entry861] 861. M. St. Johns, Identification Protocol, RFC 1413 (Feb. 1993).

[biblio01entry862] 862. J. Sajaniemi, “Modeling Spreadsheet Audit: A Rigorous Approach to Automatic Visualization,” Journal of Visual Languages and Computing 11 (1), pp. 49–82 (Feb. 2000).

[biblio01entry863] 863. R. Saltman, “Accuracy, Integrity and Security in Computerized Vote-Tallying,” Communications of the ACM 31 (10), pp. 1184–1191 (Oct. 1988).

[biblio01entry864] 864. J. Saltzer, “Protection and the Control of Information Sharing in Multics,” Communications of the ACM 17 (7), pp. 388–402 (July 1974).

[biblio01entry865] 865. J. Saltzer and M. Schroeder, “The Protection of Information in Computer Systems,” Proceedings of the IEEE 63 (9), pp. 1278–1308 (Sep. 1975).

[biblio01entry866] 866. J. Saltzer, On the Naming and Binding of Network Destinations, RFC 1498 (Aug. 1993).

[biblio01entry867] 867. A. Samal and P. Iyengar, “Automatic Recognition and Analysis of Human Faces and Facial Expressions: A Survey,” Pattern Recognition 25, pp. 65–77 (1992); cited in “Biometrics for Automatic Identity Verification” [726].

[biblio01entry868] 868. V. Samar, “Unified Login with Pluggable Authentication Modules (PAM),” Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 1–10 (Mar. 1996).

[biblio01entry869] 869. R. Sandhu, “Analysis of Acyclic Attenuating Systems for the SSR Protection Model,” Proceedings of the 1985 IEEE Symposium on Security and Privacy, pp. 197–206 (Apr. 1985).

[biblio01entry870] 870. R. Sandhu, “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes,” Journal of the ACM 35 (2), pp. 404–432 (Apr. 1988).

[biblio01entry871] 871. R. Sandhu, “The Demand Operation in the Schematic Protection Model,” Information Processing Letters 32 (4), pp. 213–219 (Apr. 1989).

[biblio01entry872] 872. R. Sandhu, “Expressive Power of the Schematic Protection Model,” Journal of Computer Security 1 (1), pp. 59–98 (1992).

[biblio01entry873] 873. R. Sandhu, “Transformation of Access Rights,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 259–268 (May 1989).

[biblio01entry874] 874. R. Sandhu, “Non-Monotonic Transformation of Access Rights,” Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy, pp. 148–161 (Apr. 1992).

[biblio01entry875] 875. R. Sandhu, “The Typed Access Matrix Model,” Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp. 122–136 (Apr. 1992).

[biblio01entry876] 876. R. Sandhu and G.-J. Ahn, “Decentralized Group Hierarchies in UNIX: An Experiment and Lessons Learned,” Proceedings of the 21st National Information Systems Security Conference, pp. 486–502 (Oct. 1998).

[biblio01entry877] 877. R. Sandhu and S. Ganta, “On Testing for the Absence of Rights in Access Control Models,” Proceedings of the Computer Security Foundations Workshop IV, pp. 109–118 (June 1993).

[biblio01entry878] 878. R. Sandhu and S. Ganta, “On the Minimality of Testing for Rights in Transformation Models,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 230–241 (Apr. 1994).

[biblio01entry879] 879. P. Sands, “Building an FTP Guard,” Proceedings of the 21st National Information Systems Security Conference, pp. 432–442 (Oct. 1998).

[biblio01entry880] 880. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, “Practical Network Support for IP Traceback,” Computer Communication Review 30 (4) pp. 295–306 (Aug. 2000).

[biblio01entry881] 881. O. Saydjari, J. Beckman, and J. Leaman, “Locking Computers Securely,” Proceedings of the 10th National Computer Security Conference, pp. 129–141 (Sep. 1987).

[biblio01entry882] 882. O. Saydjari, J. Beckman, and J. Leaman, “LOCK Trek: Navigating Uncharted Space,” Proceedings of the 1989 Symposium on Security and Privacy, pp. 167–175 (May 1989).

[biblio01entry883] 883. M. Schaefer, B. Gold, R. Linde, and J. Scheid, “Program Confinement in KVM/370,” Proceedings of the 1977 ACM Annual Conference, pp. 404–410 (Oct. 1977).

[biblio01entry884] 884. P. Schafer, “Is Centralized System Administration the Answer?” Proceedings of the 6th Systems Administration Conference (LISA 1992), pp. 55–61 (Oct. 1992).

[biblio01entry885] 885. R. Shell, T. Tao, and M. Heckman, “Designing the GEMSOS Security Kernel for Security and Performance,” Proceedings of the 8th National Computer Security Conference, pp. 108–119 (Oct. 1985).

[biblio01entry886] 886. K. Scheurer, “The Clipper Chip: Cryptography, Technology and the Constitution—the Government's Answer to Encryption 'Chips' Away at Constitutional Rights,” Rutgers Computer and Technology Law Journal 21 (1), pp. 263–292 (1995).

[biblio01entry887] 887. D. Schnackenberg, K. Djahandari, and D. Sterne, “Infrastructure for Intrusion Detection and Response,” Proceedings of the DARPA Information Survivability Conference and Exposition 2, pp. 3–11 (Jan. 2000).

[biblio01entry888] 888. B. Schneier, Applied Cryptography, 2nd Edition, John Wiley and Sons, New York, NY (<year>1996</year>).

[biblio01entry889] 889. J. Schoch and J. Hupp, “The 'Worm' Programs—Early Experiences with a Distributed Computation,” Communications of the ACM 25 (3), pp. 172–180 (Mar. 1982).

[biblio01entry890] 890. T. Schoriak, “SSL/TLS Protocol Enablement for Key Recovery,” Computers and Security 19 (1), pp. 100–104 (Jan./Feb. 2000).

[biblio01entry891] 891. K. Schroeder and J. Ledger, Life and Death on the Internet, Supple Publishing, Menosha, WI (<year>1998</year>).

[biblio01entry892] 892. C. Schuba, “Addressing Weaknesses in the Domain Name System Protocol,” Master's thesis, Department of Computer Sciences, Purdue University, West Lafayette, IN (Aug. 1993).

[biblio01entry893] 893. C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, and D. Zamboni, “Analysis of a Denial of Service Attack on TCP,” Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 208–223 (May 1997).

[biblio01entry894] 894. C. Schuba and E. Spafford, “A Reference Model for Firewall Technology,” Proceedings of the 13th Annual Computer Security Applications Conference, pp. 133–145 (Dec. 1997).

[biblio01entry895] 895. R. Scott, “Wide Open Encryption Design Offers Flexible Implementations,” Cryptologia 9 (1), pp. 75–90 (Jan. 1985).

[biblio01entry896] 896. C. Scott, P. Wolfe, and M. Erwin, Virtual Private Networks, O'Reilly & Associates, Sebastopol, CA (<year>1998</year>).

[biblio01entry897] 897. J. Seberry and J. Pieprzyk, Cryptography: An Introduction to Computer Security, Prentice-Hall, Englewood Cliffs, NJ (<year>1989</year>).

[biblio01entry898] 898. SSE-CMM Support Organization, “Secure Software Engineering Capability Maturity Model Web Page,” http://www.sse-cmm.org (2001).

[biblio01entry899] 899. K. Seiden and J. Melanson, “The Auditing Facility for a VMM Security Kernel,” Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 262–277 (<year>1990</year>).

[biblio01entry900] 900. D. Seeley, “Password Cracking: A Game of Wits,” Communications of the ACM 32 (6), pp. 700–703 (June 1989).

[biblio01entry901] 901. D. Seeley, “A Tour of the Worm,” Proceedings of the 1989 Winter USENIX Conference, pp. 287–304 (Jan. 1989).

[biblio01entry902] 902. R. Sekar, T. Bowen, and M. Segal, “On Preventing Intrusions by Process Behavior Monitoring,” Proceedings of the Workshop on Intrusion Detection and Network Monitoring, pp. 29–40 (Apr. 1999).

[biblio01entry903] 903. G. Serrao, “Rating Network Components,” Proceedings of the 18th National Information Systems Security Conference, pp. 344–355 (Oct. 1995).

[biblio01entry904] 904. SET Secure Electronic Transaction LLC, SET Secure Electronic Transaction Specification, Book 1: Business Description, Version 1.0 (May 1997).

[biblio01entry905] 905. SET Secure Electronic Transaction LLC, SET Secure Electronic Transaction Specification, Book 2: Programmers' Guide, Version 1.0 (May 1997).

[biblio01entry906] 906. SET Secure Electronic Transaction LLC, SET Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, Version 1.0 (May 1997).

[biblio01entry907] 907. A. Shamir, “How to Share a Secret,” Communication of the ACM 22, pp. 612–613 (1979).

[biblio01entry908] 908. C. E. Shannon, “A Mathematical Theory of Communication,” Bell Systems Technical Journal 27, pp. 379–423, 623–656 (Oct. 1948).

[biblio01entry909] 909. C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell Systems Technical Journal 28, pp. 656–715 (Oct. 1949).

[biblio01entry910] 910. J. Shapiro and N. Hardy, “EROS: A Principle-Driven Operating System from the Ground Up,” IEEE Software 19 (1), pp. 26–33 (Jan./Feb. 2002).

[biblio01entry911] 911. J. Shapiro, J. Smith, and D. Farber, “EROS: A Fast Capability System,” Proceedings of the 17th ACM Symposium on Operating Systems Principles, pp. 170–185 (Dec. 1999).

[biblio01entry912] 912. J. Shapiro and S. Weber, “Verifying the EROS Confinement Mechanism,” Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 166–176 (May 2000).

[biblio01entry913] 913. S.-P. Shieh and V. Gligor, “Detecting Illicit Leakage of Information in Operating Systems,” Journal of Computer Security 4 (2, 3), pp. 123–148 (Dec. 1996).

[biblio01entry914] 914. T. Shimomura and J. Markoff, Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw—By the Man Who Did It, Hyperion Books, New York, NY (<year>1996</year>).

[biblio01entry915] 915. A. Shimizu and S. Miyaguchi, “Fast Data Encipherment Algorithm FEAL,” Advances in Cryptology—Proceedings of EUROCRYPT '87, pp. 267–278 (<year>1987</year>).

[biblio01entry916] 916. R. Shirey, Security Architecture for Internet Protocols: A Guide for Protocol Designs and Standards, Internet Draft: draft-irtf-psrg-secarch-sect1-00.txt (Nov. 1994).

[biblio01entry917] 917. B. Shneiderman, Designing the User Interface: Strategies for Effective Human-Computer-Interaction, 3rd Edition, Addison Wesley Longman, Reading, MA (<year>1998</year>).

[biblio01entry918] 918. J. Shoch, “Inter-Network Naming, Addressing, and Routing,” Proceedings of COMPCON '78, pp. 72–79 (<year>1978</year>).

[biblio01entry919] 919. R. Shore, “IGOR: The Intelligence Guard for ONI Replication,” Proceedings of the 19th National Computer Security Conference, pp. 607–619 (Oct. 1996).

[biblio01entry920] 920. W. Sibert, “Auditing in a Distributed System: Secure SunOS Audit Trails,” Proceedings of the 11th National Computer Security Conference, pp. 81–91 (Oct. 1988).

[biblio01entry921] 921. D. Sidhu and M. Gasser, “A Multilevel Secure Local Area Network,” Proceedings of the 1982 IEEE Symposium on Privacy and Security, pp. 137–143 (Apr. 1982).

[biblio01entry922] 922. Silicon Graphics, Inc., sendmail 8.9.3 for IRIX 6.5.7, SGI Security Advisory 20000302-01-P3865 (Mar. 2000).

[biblio01entry923] 923. G. Simmons, “Forward Search as a Cryptanalytic Tool Against a Public Key Privacy Channel,” Proceedings of the 1982 IEEE Symposium on Security and Privacy, pp. 117–128 (Apr. 1982).

[biblio01entry924] 924. G. Simmons, “How to (Really) Share a Secret,” Advances in Cryptology—Proceedings of CRYPTO '88, pp. 390–448 (Aug. 1988).

[biblio01entry925] 925. G. Simmons, “Prepositioned Secret Sharing Schemes and/or Shared Control Schemes,” Advances in Cryptology—Proceedings of EUROCRYPT '89, pp. 436–467 (Apr. 1989).

[biblio01entry926] 926. G. Simmons, “Geometric Shared Secret and/or Shared Control Schemes,” Advances in Cryptology—Proceedings of CRYPTO '90, pp. 216–241 (<year>1990</year>).

[biblio01entry927] 927. G. Simmons, Contemporary Cryptology: The Science of Information Integrity, IEEE Press, Piscataway, NJ (<year>1992</year>).

[biblio01entry928] 928. R. Simon and M. Zurko, “Separation of Duty in Role-Based Environments,” Proceedings of the Computer Security Foundations Workshop, MITRE Technical Report M88-37, MITRE Corporation, Bedford, MA, pp. 183–194 (June 1997).

[biblio01entry929] 929. A. Sinkov, Elementary Cryptanalysis: A Mathematical Approach, Random House, New York, NY (<year>1968</year>).

[biblio01entry930] 930. B. Skingle, S. Valentine, M. Grisoni, A. McLachlan, and J. Fenn, “Trailer—an Inspection and Audit Tool for System-Usage Logs,” Proceedings of the 2nd European Conference, pp. 151–161 (June 1988).

[biblio01entry931] 931. M. Slatalla and J. Quittner, Masters of Deception: The Gang That Ruled Cyberspace, Harperperennial Library, New York, NY (<year>1996</year>).

[biblio01entry932] 932. M. Sloman, “Policy Driven Management for Distributed Systems,” Journal of Network and Systems Management 2 (4), pp. 333–360 (Dec. 1994).

[biblio01entry933] 933. S. Smaha, “Haystack: An Intrusion Detection System,” Proceedings of the 4th Aerospace Computer Security Applications Conference, pp. 37–44 (Dec. 1988).

[biblio01entry934] 934. C. Small, “Misfit: A Tool for Constructing Safe Extensible C++ Systems,” Proceedings of the 3rd USENIX Conference on Object-Oriented Technologies, pp. 38–48 (June 1997).

[biblio01entry935] 935. G. Smith and D. Volpano, “Secure Information Flow in a Multi-Threaded Imperative Language,” Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 355–364 (Jan. 1998).

[biblio01entry936] 936. K. Smith and M. Winslett, “Entity Modelling in the MLS Relational Model,” Proceedings of the 18th International Conference Very Large Data Bases, pp. 199–210 (Aug. 1992).

[biblio01entry937] 937. R. Smith, “Constructing a High Assurance Mail Guard,” Proceedings of the 17th National Computer Security Conference, pp. 247–253 (Oct. 1994).

[biblio01entry938] 938. R. Smith, “Cost Profile of a Highly Assured, Secure Operating System,” ACM Transactions on Information and Systems Security 4 (1), pp. 72–101 (Feb. 2001).

[biblio01entry939] 939. T. Smith, “User Definable Domains as a Mechanism for Implementing the Least Privilege Principle,” Proceedings of the 9th National Computer Security Conference, pp. 143–148 (Sep. 1986).

[biblio01entry940] 940. S. Snapp, J. Brentano, G. Dias, T. Goan, L. Heberlein, C. Ho, K. Levitt, B. Mukherjee, S. Smaha, T. Grance, D. Teal, and D. Mansur, “DIDS (Distributed Intrusion Detection System): Motivation, Architecture, and an Early Prototype,” Proceedings of the 14th National Computer Security Conference, pp. 167–176 (Oct. 1991).

[biblio01entry941] 941. B. Snow, “The Future Is Not Assured—But It Should Be,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 240–241 (May 1999).

[biblio01entry942] 942. L. Snyder, “On the Synthesis and Analysis of Protection Systems,” Proceedings of the Sixth Symposium on Operating Systems Principles, pp. 141–150 (Nov. 1977).

[biblio01entry943] 943. L. Snyder, “Formal Models of Capability-Based Protection Systems,” IEEE Transactions on Computers 30 (3), pp. 172–181 (Mar. 1981).

[biblio01entry944] 944. L. Snyder, “Theft and Conspiracy in the Take-Grant Protection Model,” Journal of Computer and System Science 23 (3), pp. 333–347 (Dec. 1981).

[biblio01entry945] 945. M. Sobirey, S. Fischer-Hübner, and K. Rannenberg, “Pseudonymous Audit for Privacy Enhanced Intrusion Detection,” Information Security in Research and Business—Proceedings of the IFIP TC11 13th International Conference on Information Security, pp. 151–163 (May 1997).

[biblio01entry946] 946. S. von Solms and D. Naccache, “On Blind Signatures and Perfect Crimes,” Computers and Security 11 (6), pp. 581–583 (Oct. 1992).

[biblio01entry947] 947. D. Solomon and M. Russinovich, Inside Microsoft Windows 2000, 3rd Edition, Microsoft Press, Redmond, WA (<year>2000</year>).

[biblio01entry948] 948. A. Somayaji and S. Forrest, “Automated Response Using System-Call Delays,” Proceedings of the 9th USENIX Security Symposium, pp. 185–197 (Aug. 2000).

[biblio01entry949] 949. A. Somayaji, S. Hofmeyr, and S. Forrest, “Principles of a Computer Immune System,” Proceedings of the 1997 New Security Paradigms Workshop, pp. 75–82 (Sep. 1997).

[biblio01entry950] 950. I. Sommerville, Software Engineering, 6th Edition, Addison-Wesley, Boston, MA (<year>2001</year>).

[biblio01entry951] 951. S. Son, C. Chaney, and N. Thomlinson, “Partial Security Policies to Support Timeliness in Secure Real-Time Databases,” Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 136–147 (May 1998).

[biblio01entry952] 952. E. Spafford, “The Internet Worm Program: An Analysis,” Computer Communications Review 19 (1), pp. 17–57 (Jan. 1989).

[biblio01entry953] 953. E. Spafford, “Crisis and Aftermath,” Communications of the ACM 32 (6), pp. 678–687 (June 1989).

[biblio01entry954] 954. E. Spafford, “Observing Reusable Password Choices,” Proceedings of the 3rd UNIX Security Symposium, pp. 299–312 (Sep. 1992).

[biblio01entry955] 955. E. Spafford, “OPUS: Preventing Weak Password Choices,” Computers and Security 11 (3), pp. 273–278 (June 1992).

[biblio01entry956] 956. E. Spafford, K. Heaphy, and D. Ferbrache, Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats, ADAPSO, Arlington, VA (<year>1989</year>).

[biblio01entry957] 957. E. Spafford and S. Weeber, “Software Forensics: Can We Track Code to Its Authors?” Proceedings of the 15th National Information Systems Security Conference, pp. 641–650 (Oct. 1992).

[biblio01entry958] 958. E. Spafford and D. Zamboni, “Intrusion Detection Using Autonomous Agents,” Computer Networks 34 (4), pp. 547–570 (Oct. 2000).

[biblio01entry959] 959. P. Srisuresh and K. Egevang, Traditional IP Network Address Translator (Traditional NAT), RFC 3022 (Jan. 2001).

[biblio01entry960] 960. W. Stallings, Network Security Essentials: Applications and Standards, Prentice-Hall, Upper Saddle River, NJ (<year>2000</year>).

[biblio01entry961] 961. R. Stallman, “The Right to Read,” Communications of the ACM 40 (2), pp. 85–87 (Dec. 1997).

[biblio01entry962] 962. R. Stallman and R. Pesch, “Debugging with GDB: The GNU Source-Level Debugger,” www.Iuniverse.com, New York, NY (Dec. 2000).

[biblio01entry963] 963. S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, “GrIDS—A Graph-Based Intrusion Detection System for Large Networks,” Proceedings of the 19th National Information Systems Security Conference, pp. 361–370 (Oct. 1996).

[biblio01entry964] 964. S. Staniford-Chen and L. Heberlein, “Holding Intruders Accountable on the Internet,” Proceedings of the 1995 IEEE Symposium on Security and Privacy, pp. 39–49 (May 1995).

[biblio01entry965] 965. A. Stavely, Toward Zero-Defect Programming, Addison-Wesley, Reading, MA (<year>1998</year>).

[biblio01entry966] 966. L. Stein, Web Security: A Step-by-Step Reference Guide, Addison-Wesley Publishing Co., Reading, MA (<year>1998</year>).

[biblio01entry967] 967. J. Steiner, C. Neuman, and J. Schiller, “Kerberos: An Authentication Service for Open Network Systems,” Proceedings of the 1988 Winter USENIX Conference, pp. 191–202 (Feb. 1988).

[biblio01entry968] 968. B. Sterling, The Hacker Crackdown: Law and Disorder on the Electronic Frontier, Bantam Books, New York, NY (<year>1993</year>).

[biblio01entry969] 969. H. Stern, M. Eisler, and R. Labiaga, Managing NFS and NIS, 2nd Edition, O'Reilly and Associates, Sebastopol, CA (<year>2001</year>).

[biblio01entry970] 970. D. Sterne, “On the Buzzword 'Security Policy',” Proceedings of the 1991 IEEE Symposium on Security and Privacy, pp. 219–230 (May 1991).

[biblio01entry971] 971. F. Stevenson, “Cryptanalysis of Contents Scrambling System” (Nov. 8, 1999); available at http://www.lemuria.org/DeCSS/crypto.gq.nu/.

[biblio01entry972] 972. H. Stiegler, “A Structure for Access Control Lists,” Software—Practice and Experience 9 (10), pp. 813–819 (Oct. 1979).

[biblio01entry973] 973. C. Stoll, “Stalking the Wily Hacker,” Communications of the ACM 31 (5), pp. 484–497 (May 1988).

[biblio01entry974] 974. C. Stoll, “An Epidemiology of Viruses and Network Worms,” Proceedings of the 12th National Computer Security Conference, pp. 369–377 (Oct. 1989).

[biblio01entry975] 975. C. Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Pocket Books, New York, NY (<year>1995</year>).

[biblio01entry976] 976. J. Straw, “The Draft Federal Criteria and the ITSEC: Progress Towards Alignment,” Proceedings of the 16th National Computer Security Conference, pp. 311–323 (Sep. 1993).

[biblio01entry977] 977. E. Strother, “Denial of Service Protection—The Nozzle,” Proceedings of the 16th Annual Computer Security Applications Conference, pp. 32–41 (Dec. 2000).

[biblio01entry978] 978. J. Strunk, G. Goodson, M. Scheinholtz, C. Soules, and G. Ganger, “Self-Securing Storage: Protecting Data in Compromised Systems,” Proceedings of the 4th Symposium on Operating Systems Design and Implementation, pp. 165–179 (Oct. 2000).

[biblio01entry979] 979. P. Su and M. Bishop, “How to Encrypt /usr/dict/words in About a Second,” Technical Report PCS-TR92-182, Department of Mathematics and Computer Science, Dartmouth College, Hanover, NH (Jan. 1992).

[biblio01entry980] 980. J. Sugerman, G. Venkitachalam, and B.-H. Lim, “Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor,” Proceedings of the 2001 USENIX Annual Technical Conference, pp. 1–14 (June 2001).

[biblio01entry981] 981. Sun Microsystems, Inc., NFS: Network File System Protocol Specification, RFC 1094 (Mar. 1989).

[biblio01entry982] 982. Sun Microsystems, Inc., Installing, Administering, and Using the Basic Security Module, Sun Microsystems, Inc., Mountain View, CA (April 1992).

[biblio01entry983] 983. Sun Microsystems, Inc., Version 8.8.8 Sendmail for SunOS™ 5.6 and 5.5.1, Security Bulletin #00187 (June 1999).

[biblio01entry984] 984. D. Sutherland, “A Model of Information,” Proceedings of the 9th National Computer Security Conference, pp. 175–183 (Sep. 1986).

[biblio01entry985] 985. Systems Security Engineering Capability Maturity Model Project, Systems Security Engineering Capability Maturity Model, Version 2.0 (Apr. 1999).

[biblio01entry986] 986. P. Syverson, “Limitations on Design Principles for Public Key Protocols,” Proceedings of the 1996 Symposium on Privacy and Security, pp. 62–72 (May 1996).

[biblio01entry987] 987. T. Takada and H. Koike, “Tudumi: Log Information Visualization System for Intrusion Detection,” Technical Report UEC-IS-TR-2000-08, Graduate School of Information Systems, University of Electro-Communications, Chofu, Tokyo, Japan (Sep. 2000).

[biblio01entry988] 988. T. Takada and H. Koike, “MieLog: Visual Log Information Browsing System With their Characteristics,” Transactions of the Information Processing Society of Japan, 41 (12), pp. 3265–3275 (Dec. 2000).

[biblio01entry989] 989. A. Tanenbaum, Modern Operating Systems, Prentice-Hall, Englewood Cliffs, NJ (<year>1992</year>).

[biblio01entry990] 990. A. Tanenbaum, Computer Networks, 3rd Edition, Prentice-Hall, Upper Saddle River, NJ (<year>1996</year>).

[biblio01entry991] 991. J. Tardo and K. Alagappan, “SPX: Global Authentication Using Public Key Certificates,” Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pp. 232–244 (May 1991).

[biblio01entry992] 992. T. Taylor, “Comparison Paper Between the Bell and LaPadula Model and the SRI Model,” Proceedings of the 1984 Symposium on Security and Privacy, pp. 195–202 (Apr. 1984).

[biblio01entry993] 993. H. Teng, K. Chen, and S. Lu, “Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns,” Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 278–284 (May 1990).

[biblio01entry994] 994. C. Testa, B. Wilner, and V. Gligor, “Trusted RUBIX Architecture and Policy Model Interpretation,” Proceedings of the 8th Annual Computer Security Applications Conference, pp. 97–110 (Nov./Dec. 1992).

[biblio01entry995] 995. K. Thompson, “Reflections on Trusting Trust,” Communications of the ACM 27 (8), pp. 761–763 (Aug. 1984).

[biblio01entry996] 996. D. Thomsen, “Sidewinder: Combining Type Enforcement and UNIX,” Proceedings of the 11th Annual Computer Security Applications Conference, pp. 14–20 (Dec. 1995).

[biblio01entry997] 997. M. Tompa and H. Woll, “How to Share a Secret with Cheaters,” Journal of Cryptology 1 (2), pp. 133–138 (1988).

[biblio01entry998] 998. W. Trapp and L. Washington, Introduction to Cryptography with Coding Theory, Prentice-Hall, Upper Saddle River, NJ (<year>2002</year>).

[biblio01entry999] 999. J. Trostle, “Modelling a Fuzzy Time System,” Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 82–89 (May 1993).

[biblio01entry1000] 1000. Trusted Computing Platform Alliance, Trusted Computing Platform Alliance (TCPA) Main Specification, Version 1.1a (Dec. 2001).

[biblio01entry1001] 1001. Trusted Information Systems, A Proposed Interpretation of the TCSEC for Virtual Machine Monitor Architectures, Trusted Information Systems, Glenwood, MD (May 1990).

[biblio01entry1002] 1002. C.-R. Tsai, V. Gligor, and C. Chandersekaran, “A Formal Method for the Identification of Covert Storage Channels in Source Code,” Proceedings of the 1987 Symposium on Security and Privacy, pp. 108–121 (Apr. 1987).

[biblio01entry1003] 1003. C.-R. Tsai and V. Gligor, “A Bandwidth Computation Model for Covert Storage Channels and Its Applications,” Proceedings of the 1988 Symposium on Security and Privacy, pp. 74–86 (Apr. 1988).

[biblio01entry1004] 1004. J. Tsai, A. Liu, E. Juan, and A. Sahay, “Knowledge-Based Software Architectures: Acquisition, Specification, and Verification,” IEEE Transactions on Knowledge and Data Engineering 11 (1), pp. 187–201 (Jan./Feb. 1999).

[biblio01entry1005] 1005. W. Tuchman, “Hellman Presents No Shortcut Solutions to DES,” IEEE Spectrum 16 (7), pp. 40–41 (July 1979).

[biblio01entry1006] 1006. W. L. Tuchman and C. Meyer, “Efficacy of the Data Encryption Standard in Data Processing,” Proceedings of Compcon '78, pp. 340–347 (Sep. 1978).

[biblio01entry1007] 1007. K.Turner (ed.), Using Formal Description Techniques: An Introduction to Estelle, LOTOS, and SDL, John Wiley and Sons, Chichester, UK (<year>1993</year>).

[biblio01entry1008] 1008. P. Tyner, iAPX 432 General Data Processor Architecture Reference Manual, Intel Corporation, Aloha, OR (<year>1981</year>).

[biblio01entry1009] 1009. H. Vaccaro and G. Liepins, “Detection of Anomalous Computer Session Activity,” Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 280–289 (May 1989).

[biblio01entry1010] 1010. K. van Wyk and R. Forno, Incident Response, O'Reilly and Associates, Inc., Sebastopol, CA 95472 (Aug. 2001).

[biblio01entry1011] 1011. V. Varadharajan, “Security Enhanced Mobile Agents,” Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 200–209 (Nov. 2000).

[biblio01entry1012] 1012. W. Venema, “TCP Wrapper: Network Monitoring, Access Control, and Booby Traps,” Proceedings of the 3rd USENIX UNIX Security Symposium, pp. 85–92 (Sep. 1992).

[biblio01entry1013] 1013. B. Venkatraman and R. Newman-Wolfe, “Capacity Estimation and Auditability of Network Covert Channels,” Proceedings of the 1995 Symposium on Security and Privacy, pp. 186–198 (May 1995).

[biblio01entry1014] 1014. J. Viega and G. McGraw, Building Secure Software: How to Avoid Security Problems the Right Way, Addison-Wesley, Boston, MA (<year>2002</year>).

[biblio01entry1015] 1015. D. Vincenzetti, S. Taino, and F. Bolognesi, “STEL: Secure TELnet,” Proceedings of the 5th USENIX UNIX Security Symposium, pp. 75–83 (June 1995).

[biblio01entry1016] 1016. Virgil, The Aeneid (translated by R. Fitzgerald), Vintage Books, New York, NY (<year>1983</year>).

[biblio01entry1017] 1017. S. Visram, W. Artner, and P. Marsden, “Safety Case for the NERC Air Traffic Control System,” Proceedings of the 15th International Conference on Computer Safety, Reliability and Security, pp. 345–362 (Oct. 1996).

[biblio01entry1018] 1018. P. Vixie, “DNS and BIND Security Issues,” Proceedings of the 5th USENIX UNIX Security Symposium, pp. 209–216 (June 1995).

[biblio01entry1019] 1019. J. Voas and A. Ghosh, “Software Fault Injection for Survivability,” Proceedings of the DARPA Information Survivability Conference and Exposition, pp. 338–346 (Jan. 2000).

[biblio01entry1020] 1020. J. Voas, A. Ghosh, G. McGraw, P. Charron, and K. Miller, “Defining an Adaptive Software Security Metric from a Dynamic Software Failure Tolerance Measure,” Proceedings of the 11th Annual Conference on Computer Assurance, pp. 250–263 (June 1996).

[biblio01entry1021] 1021. J. Voas, A. Ghosh, F. Charron, and L. Kassab, “Reducing Uncertainty About Common-Mode Failures,” Proceedings of the 8th International Symposium on Software Reliability Engineering, pp. 308–319 (Nov. 1997).

[biblio01entry1022] 1022. C. Vogt, “PUMA: A Capability-Based Architecture to Support Security and Fault Tolerance,” Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information, pp. 217–228 (May 1990).

[biblio01entry1023] 1023. D. Volpano, C. Irvine, and G. Smith, “A Sound Type System for Secure Flow Analysis,” Journal of Computer Security 4 (2, 3), pp. 167–187 (1996).

[biblio01entry1024] 1024. V. Voydock and S. Kent, “Security Mechanisms in High-Level Network Protocols,” Computing Surveys 15 (2), pp. 135–171 (June 1983).

[biblio01entry1025] 1025. J. Wack and L. Carnahan, Computer Viruses and Related Threats: A Management Guide, NIST Special Publication 500–166, National Institute of Standards and Technology, Washington, DC (Aug. 1989).

[biblio01entry1026] 1026. D. Wagner, J. Foster, E. Brewer, and A. Aiken, “A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities,” Proceedings of the 2000 Symposium on Network and Distributed System Security, pp. 1–15 (Feb. 2000).

[biblio01entry1027] 1027. D. Wagner and B. Schneier, “Analysis of the SSL 3.0 Protocol,” Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 29–40 (Nov. 1996).

[biblio01entry1028] 1028. R. Wahbe, S. Lucco, T. Anderson, and S. Graham, “Efficient Software-Based Fault Isolation,” Proceedings of the 14th Symposium on Operating Systems Principles, pp. 202–216 (Dec. 1993).

[biblio01entry1029] 1029. M. Wahl, S. Kille, and T. Howes, Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names, RFC 2253 (Dec. 1997).

[biblio01entry1030] 1030. M. Waidner and B. Pfitzmann, “The Dining Cryptographers in the Disco: Unconditional Sender and Recipient Untraceability with Computationally Secure Serviceability,” Advances in Cryptology—Proceedings of EUROCRYPT '89, pp. 690 (Apr. 1989).

[biblio01entry1031] 1031. K. Walker, L. Badger, M. Petkac, D. Sterne, K. Oostendorp, and D. Sherman, “Confining Root Programs with Domain and Type Enforcement (DTE),” Proceedings of the 6th USENIX Security Symposium, pp. 21–36 (<year>1996</year>).

[biblio01entry1032] 1032. S. Walker, S. Lipner, C. Ellison, and D. Balenson, “Commercial Key Recovery,” Communications of the ACM 39 (3), pp. 41–47 (Mar. 1996).

[biblio01entry1033] 1033. L. Wall, T. Christensen, and R. Schwartz, Programming Perl, 2nd Edition, O'Reilly and Associates, Sebastopol, CA (Sep. 1996).

[biblio01entry1034] 1034. S. Warren and L. Brandeis, “The Right to Privacy,” Harvard Law Review 4, pp. 193ff. (1890).

[biblio01entry1035] 1035. C. Wee, “LAFS: A Logging and Auditing File System,” Proceedings of the 11th Annual Computer Security Applications Conference, pp. 231–240 (Dec. 1995).

[biblio01entry1036] 1036. M. Weiser, “Program Slicing,” IEEE Transactions on Software Engineering, 10 (4), pp. 352–357 (July 1984).

[biblio01entry1037] 1037. C. Weissman, “Security Controls in the ADEPT-50 Time-Sharing System,” Proceedings of the 1969 Fall Joint Computer Conference, pp. 119–133 (Nov. 1969).

[biblio01entry1038] 1038. C. Weismann, “Security Penetration Testing Guideline,” Chapter 10, Handbook for the Computer Security Certification of Trusted Systems, TM 5540:082A, Naval Research Laboratory, Washington, DC (Jan. 1995).

[biblio01entry1039] 1039. C. Weismann, “Penetration Testing,” in Information Security:An Integrated Collection of Essays [6], pp. 269–296.

[biblio01entry1040] 1040. D. Wheeler, “Secure Programming for Linux and UNIX HOWTO”; available at http://www.dwheeler.com/secure-programs.

[biblio01entry1041] 1041. T. Whiteside, Computer Capers: Tales of Electronic Thievery, Embezzlement, and Fraud, Crowell Publishers, New York, NY (<year>1978</year>).

[biblio01entry1042] 1042. A. Whitten and J. Tygar, “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,” Proceedings of the 8th USENIX Security Symposium (Aug. 1999).

[biblio01entry1043] 1043. D. Wichers, D. Cook, R. Olsson, J. Corssley, P. Kerchen, K. Levitt, and R. Lo, “PACLs: An Access Control List Approach to Anti-Viral Security,” Proceedings of the 13th National Computer Security Conference, pp. 340–349 (Oct. 1990).

[biblio01entry1044] 1044. D. Wiemer and M. Murray, “Wiemer-Murray Domain Security Policy Model for International Interoperability,” Proceedings of the 21st National Information Systems Security Conference, pp. 526–536 (Oct. 1998).

[biblio01entry1045] 1045. R. Wildes and J. Asmuth, “A System for Automatic Iris Recognition,” Pattern Recognition 27, pp. 121–128 (1994).

[biblio01entry1046] 1046. M. Wilkes, Time-Sharing Computing Systems, 3rd Edition, Elsevier McDonald Publishing Co., New York, NY (<year>1975</year>).

[biblio01entry1047] 1047. A. Wilkinson, D. Anderson, D. Chang, L. Hin, A. Mayo, I. Viney, R. Williams, and W. Wright, “A Penetration Analysis of a Burroughs Large System,” Operating Systems Review 15 (1), pp. 14–25 (Jan. 1981).

[biblio01entry1048] 1048. J. Williams and K. Ferraiolo, “P/sup 3/I–Protection Profile Process Improvement,” Proceedings of the 22nd National Information Systems Security Conference, pp. 175–188 (Oct. 1999).

[biblio01entry1049] 1049. W. Willis, D. Watts, and T. Strahan, Windows 2000 System Administration Handbook, Prentice-Hall, Upper Saddle River, NJ (<year>2000</year>).

[biblio01entry1050] 1050. S. Wilson, J. McDermid, P. Kirkham, C. Pygott, and D. Tombs, “Computer Based Support for Standards and Processes in Safety Critical Systems,” Proceedings of the16th International Conference on Computer Safety, Reliability and Security, pp. 197–209 (Sep. 1997).

[biblio01entry1051] 1051. J. Wing, “A Symbiotic Relationship Between Formal Methods and Security,” Proceedings of Computer Security, Dependability, and Assurance: From Needs to Solutions, pp. 26–38 (Nov. 1998).

[biblio01entry1052] 1052. I. Winkler, “The Non-Technical Threat to Computing Systems,” Computing Systems 9 (1), pp. 3–14 (Winter 1996).

[biblio01entry1053] 1053. H. Winkler-Parenty, “SYBASE: The Trusted Subject DBMS,” Proceedings of the 13th National Computer Security Conference, pp. 589–593 (Oct. 1990).

[biblio01entry1054] 1054. S. Wiseman, “A Secure Capability Computer System,” Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 86–94 (Apr. 1986).

[biblio01entry1055] 1055. S. Wiseman, “Preventing Viruses in Computer Systems,” Computers and Security 8 (5), pp. 427–432 (Aug. 1989).

[biblio01entry1056] 1056. T. Woo and S. Lam, “Authentication for Distributed Systems,” IEEE Computer 25 (1), pp. 39–52 (Jan. 1992).

[biblio01entry1057] 1057. C. Wood, “Principles of Secure Information Systems Design,” Computers and Security 9 (1), pp. 13–24 (Feb. 1990).

[biblio01entry1058] 1058. C. Wood, “Principles of Secure Information Systems Design with Groupware Examples,” Computers and Security 12 (7), pp. 663–678 (Nov. 1993).

[biblio01entry1059] 1059. C. Wood, Information Security Policies Made Easy: A Comprehensive Set of Information Security Policies, Version 4, Baseline Software, Sausalito, CA (<year>1994</year>).

[biblio01entry1060] 1060. P. Wood and S. Kochan, UNIX System Security, Hayden Books, Indianapolis, IN (<year>1985</year>).

[biblio01entry1061] 1061. J. Wray, “An Analysis of Covert Timing Channels,” Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pp. 2–6 (May 1991).

[biblio01entry1062] 1062. W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack, “HYDRA: The Kernel of a Multiprocessor System,” Communications of the ACM 17 (6), pp. 337–345 (June 1974).

[biblio01entry1063] 1063. I.-L. Yen and R. Paul, “Key Applications for High-Assurance Systems,” IEEE Computer 31 (4), pp. 35–46 (Apr. 1998).

[biblio01entry1064] 1064. T. Yetiser, “Polymorphic Viruses: Implementation, Detection, and Protection,” VDS Advanced Research Group, Baltimore, MD (Jan. 1993).

[biblio01entry1065] 1065. T. Ylönen, “SSH—Secure Login Connections over the Internet,” Proceedings of the 6th Annual USENIX Security Symposium, pp. 37–42 (June 1996).

[biblio01entry1066] 1066. C. Young, “Taxonomy of Computer Virus Defense Mechanisms,” Proceedings of the 10th National Computer Security Conference, pp. 220–225 (Sep. 1987).

[biblio01entry1067] 1067. J. Yuill, F. Wu, J. Settle, F. Gong, R. Forno, M. Huang, and J. Asbery, “Intrusion-Detection for Incident-Response, Using a Military Battlefield-Intelligence Process,” Computer Networks 34 (4), pp. 671–697 (Oct. 2000).

[biblio01entry1068] 1068. A. Yulie, D. Cohen, and P. Halinan, “Feature Extraction Using a Multilayer Perceptron,” Computer Vision and Pattern Recognition, pp. 104–109 (<year>1989</year>).

[biblio01entry1069] 1069. A. Zakinthinos and E. Lee, “The Composability of Non-Interference,” Proceedings of the 8th IEEE Computer Security Foundations Workshop, pp. 2–8 (June 1995).

[biblio01entry1070] 1070. P. Zave and M. Jackson, “Four Dark Corners of Requirements Engineering,” ACM Transactions on Software Engineering and Methodology 6 (1), pp. 1–30 (Jan. 1997).

[biblio01entry1071] 1071. Y. Zheng, J. Pieprzyk, and J. Seberry, “HAVAL—A One-Way Hashing Algorithm with Variable Length of Output,” Advances in Cryptology—Proceedings of AUSCRYPT '92, pp. 83–104 (Dec. 1992).

[biblio01entry1072] 1072. D. Zimmerman, The Finger User Information Protocol, RFC 1288 (Dec. 1991).

[biblio01entry1073] 1073. P. Zimmermann, PGP Source Code and Internals, MIT Press, Boston, MA (<year>1995</year>).

[biblio01entry1074] 1074. M. Zurko and R. Simon, “User-Centered Security,” Proceedings of the 1996 New Security Paradigms Workshop, pp. 27–33 (Sep. 1996).

[biblio01entry1075] 1075. E. Zwicky, S. Cooper, and D. Chapman, Building Internet Firewalls, 2nd Edition, O'Reilly and Associates, Sebastopol, CA (<year>2000</year>).

[biblio01entry1076] 1076. E. Zwicky, S. Simmons, and R. Dalton, “Policy as a System Administration Tool,” Proceedings of the 4th Systems Administration Conference (LISA 1990), pp. 115–124 (Oct. 1990).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.216.44.143