-
1
-
-
0003731539
-
-
John Wiley & Sons, New York
-
A.D. Rubin, D. Geer, and M.J. Ranum, Web Security Sourcebook, John Wiley & Sons, New York, 1997.
-
(1997)
Web Security Sourcebook
-
-
Rubin, A.D.1
Geer, D.2
Ranum, M.J.3
-
2
-
-
84944878354
-
-
CRC Press, Boca Raton, Fla.
-
A. Menezes, P. van Oorschot, and S. Vanstone, Hand-book of Applied Cryptography, CRC Press, Boca Raton, Fla., 1997.
-
(1997)
Hand-book of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
3
-
-
0003969633
-
-
National Computer Security Center, DoD 5200.28-STD, Dec.
-
US Dept. of Defense, "Trusted Computer System Evaluation Criteria," National Computer Security Center, DoD 5200.28-STD, Dec. 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
6
-
-
84976834054
-
Authentication in Distributed Systems: Theory and Practice
-
Nov.
-
B. Lampson et al., "Authentication in Distributed Systems: Theory and Practice," ACM Trans. Computer Systems, Nov. 1992, pp. 265-310.
-
(1992)
ACM Trans. Computer Systems
, pp. 265-310
-
-
Lampson, B.1
-
7
-
-
0001636850
-
Kerberos: An Authentication Service for Open Network Systems
-
Usenix Assoc., Berkeley, Calif
-
J.G.Steiner, C. Neuman, and J.I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Proc. Winter 1988 General Conf., Usenix Assoc., Berkeley, Calif, 1988, pp. 191-202.
-
(1988)
Proc. Winter 1988 General Conf.
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
8
-
-
0013193905
-
The COPS Security Checker System
-
Usenix Assoc., Berkeley, Calif.
-
D. Farmer and E.H. Spafford, "The COPS Security Checker System," Proc. Summer 1990 General Conf., Usenix Assoc., Berkeley, Calif., 1990, pp. 165-170; ftp://info.cert.ort/pub/tools/cops/.
-
(1990)
Proc. Summer 1990 General Conf.
, pp. 165-170
-
-
Farmer, D.1
Spafford, E.H.2
-
9
-
-
0343737827
-
The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment
-
Usenix Assoc., Berkeley, Calif
-
D.R Safford, D.L Srhalry and DJC Hess. "The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment." Proc. Fourth Security Symp., Usenix Assoc., Berkeley, Calif, 1993, pp. 91-118; ftp-//net.tamu.edu/pub/securiry/TAMU/.
-
(1993)
Proc. Fourth Security Symp.
, pp. 91-118
-
-
Safford, D.R.1
Srhalry, D.L.2
Hess, D.J.C.3
-
10
-
-
0042958768
-
The Design and Implementation of Tripwire: A File System Integrity Checker
-
Purdue University Coast Laboratory, West Lafayette, Ind, Nov.
-
G.H. Kim and E.H. Spafford. "The Design and Implementation of Tripwire: A File System Integrity Checker," Tech. Report CSD-TR-93-071. Purdue University Coast Laboratory, West Lafayette, Ind, Nov. 1993; ftp://info. cert.org/pub/tools/tripwire/.
-
(1993)
Tech. Report CSD-TR-93-071
-
-
Kim, G.H.1
Spafford, E.H.2
-
11
-
-
84887507059
-
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
-
Usenix Assoc., Berkeley, Calif.
-
L. Gong et al., "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2" Proc. USENIX Symp. Internet Technologies and Systems, Usenix Assoc., Berkeley, Calif., 1997, pp. 103-112.
-
(1997)
Proc. USENIX Symp. Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
-
12
-
-
0031542975
-
Extensible Security Architectures for Java
-
ACM Press, New York
-
D.S. Wallach, D. Blafanz, D. Dean, and E.W. Felten, "Extensible Security Architectures for Java," Proc. 16th ACM Symp. Operating Systems Principles, ACM Press, New York. 1997.
-
(1997)
Proc. 16th ACM Symp. Operating Systems Principles
-
-
Wallach, D.S.1
Blafanz, D.2
Dean, D.3
Felten, E.W.4
-
13
-
-
85084097858
-
Safe Kernel Extensions Without Run-Time Checkin
-
Unix Assoc., Berkeley, Calif.
-
G.C. Necula and P. Lee, "Safe Kernel Extensions Without Run-Time Checkin," Proc. Second Symp. Operating Systems Design and Implementation, Unix Assoc., Berkeley, Calif., 1996, pp. 229-243.
-
(1996)
Proc. Second Symp. Operating Systems Design and Implementation
, pp. 229-243
-
-
Necula, G.C.1
Lee, P.2
-
14
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Feb.
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, Feb. 1981, pp. 84-88.
-
(1981)
Comm. ACM
, pp. 84-88
-
-
Chaum, D.1
-
16
-
-
85031542311
-
Mixing E-mail with Babel
-
IEEE CS Press, Los Alamitos, Calif.
-
C, Gulcu and G. Tsudik. "Mixing E-mail with Babel," Proc. 1996 Internet Society Symp. Network and Distributed System Security, IEEE CS Press, Los Alamitos, Calif., 1996, pp. 2-16.
-
(1996)
Proc. 1996 Internet Society Symp. Network and Distributed System Security
, pp. 2-16
-
-
Gulcu, C.1
Tsudik, G.2
-
17
-
-
0030676973
-
Anonymous Connections and Onion Routing
-
IEEE CS Press, Los Alamitos, Calif.
-
P.F. Syverson, D.M. Goldschlag, and M.G. Reed, "Anonymous Connections and Onion Routing," Proc. 1997 IEEE Symp. Security and Privacy, IEEE CS Press, Los Alamitos, Calif., 1997, pp. 44-54.
-
(1997)
Proc. 1997 IEEE Symp. Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
18
-
-
0003317098
-
How to Make Personalized Web Browsing Simple. Secure, and Anonymous
-
May see also
-
E. Gabber et al., "How to Make Personalized Web Browsing Simple. Secure, and Anonymous," tech. report. May 1997; see also http://www.lpwa.com.
-
(1997)
Tech. Report
-
-
Gabber, E.1
|