Attention, cette bibliographie n'est plus mise à jour depuis 1998.
Nous la laissons en ligne car elle reste consultée régulièrement.
@Manual{green89,
title = "{IT} Security Evaluation Criteria, Bundesanzeiger",
organization = "German Information Security Agency (GISA)",
year = "1989",
}
@Article{Aal.91,
author = "T. Araki and T. Morizumi and H. Nagase and T. Takenaka
and K. Yamashita",
title = "Security level assignment by graph analysis",
journal = "IEICE Transactions",
volume = "E74",
number = "8",
pages = "2166--2175",
month = aug,
year = "1991",
}
@InProceedings{AB90,
author = "I. F. Akyildiz and G. S. Benson",
title = "A Security Reclassifier for a Local Area Network",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "85--96",
year = "1990",
}
@InProceedings{ABJ93,
author = "V. Atluri and E. Bertino and S. Jajodia",
title = "Achieving Stricter Correctness Requirements in
Multilevel Secure Databases",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "135--149",
year = "1993",
}
@TechReport{ABKL90,
author = "M. Abadi and M. Burrows and C. Kaufman and B.
Lampson",
title = "Authentication and Delegation with Smart-cards",
institution = "DIGITAL, Systems Research Center",
number = "67",
month = oct,
year = "1990",
}
@TechReport{AFN90,
author = "AFNOR",
title = "Pour une approche m\'{e}thodique de la
s\'{e}curit\'{e} des syst\`{e}mes d'information ({LES}
{METHODES} {MARION} {ET} {MELISA})",
institution = "CNTI/CN27/GE1",
number = "4",
month = "novembre",
year = "1990",
}
@Article{AGS83,
author = "S. R. Ames and M. Gasser and R. R. Schell",
title = "Security Kernel Design and Implementation : An
Introduction",
journal = "Computer",
volume = "16",
number = "7",
month = jul,
year = "1983",
}
@Article{AJ87,
author = "M. D. Abrams and A. B. Jeng",
title = "Network Security Protocol Reference Model and the
Trusted Computer System Evaluation Criteria",
journal = "IEEE Network Magazine",
pages = "24--33",
month = apr,
year = "1987",
}
@InProceedings{AJJ92,
author = "P. Ammann and F. Jaeckle and S. Jajodia",
title = "A Two Snapshot Algorithm for Concurrency Control in
Multi- Level Secure Databases",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "204--215",
year = "1992",
}
@Article{AL91,
author = "J. Alves-Foss and K. Levitt",
title = "The Verification of Secure Distributed Systems",
journal = "IEEE, COMPCON",
year = "1991",
}
@InProceedings{AL92,
author = "Bruno d' Ausbourg and Jean-Henri Llareus",
title = "{M2}{S} : {A} Machine for Multilevel Security",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "373--392",
year = "1992",
}
@TechReport{Amb91,
author = "O. Ambrois",
title = "Aspects of security, integrity and privacy in the
telecommunication network",
institution = "CSELT",
volume = "XIX",
number = "2",
month = "avril",
year = "1991",
}
@Article{Ams88,
author = "CISA Ellen Amsel",
title = "Network Security and Access Controls",
journal = "Computers and Security",
volume = "7",
month = feb,
year = "1988",
}
@TechReport{And72,
author = "J. P. Anderson",
title = "Computer Security Technology Planning Study",
institution = "ESD-TR-73-51",
volume = "1",
month = oct,
year = "1972",
}
@TechReport{And80,
author = "J. P. Anderson",
title = "Computer Security Threat Monitoring and Surveillance",
institution = "James P. Anderson Company, Fort Washington,
Pennsylvania",
month = apr,
year = "1980",
}
@InProceedings{And85,
author = "J. P. Anderson",
title = "A Unification of Computer and Network Security and
Privacy Concepts",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
year = "1985",
}
@InProceedings{And92,
author = "Ross J. Anderson",
title = "{UEPS} - {A} Second Generation Electronic Wallet",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "411--418",
year = "1992",
}
@Article{AP87a,
author = "M. D. Abrams and H. J. Podell",
title = "Network Security Overview",
journal = "Computer and Networks Security",
year = "1987",
}
@Article{AP87b,
author = "M. D. Abrams and H. J. Podell",
title = "Society and policy issues",
journal = "Computer and Networks Security",
year = "1987",
}
@Article{AP87c,
author = "M. D. Abrams and H. J. Podell",
title = "Management Issues",
journal = "Computer and Networks Security",
year = "1987",
}
@Article{AP87d,
author = "M. D. Abrams and H. J. Podell",
title = "Formal Models",
journal = "Computer and Networks Security",
year = "1987",
}
@Article{AP87e,
author = "M. D. Abrams and H. J. Podell",
title = "Protocols",
journal = "Computer and Networks Security",
year = "1987",
}
@InProceedings{Bad91,
author = "Lee Badger",
title = "{Covert Channel Analysis Planning for Large Systems}",
pages = "120--136",
year = "1991",
booktitle = "{Proceedings of the 14th National Computer Security
Conference}",
address = "Washington, DC",
month = oct,
}
@Article{Bai82,
author = "S. C. Bailin",
title = "Distribution of Access Control Functions in a Local
Area Networks",
journal = "IEEE CH1811-9/82/0000/0118\$00.75",
year = "1982",
}
@InProceedings{Bai90,
author = "D. J. Bailey",
title = "Managing Computer Security : How Can Research Help ?",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "235--242",
year = "1990",
}
@InProceedings{Bak91,
author = "B. C. Baker",
title = "Les enjeux des bases de donn\'{e}es {SQL}
s\'{e}curis\'{e}es",
booktitle = "Convention {UNIX} 91",
year = "1991",
}
@TechReport{BAN89,
author = "M. Burrows and M. Abadi and R. Needham",
title = "A Logic of Authentication",
institution = "DIGITAL, Systems Research Center, N 39",
month = feb,
year = "1989",
keywords = "authentication logic",
}
@Article{BD87,
author = "S. Budkowski and P. Dembinski",
title = "An Introduction to Estelle : {A} Specification
language for Distributed Systems",
journal = "Computer Networks and ISDN systems",
volume = "3",
number = "3",
year = "1987",
}
@InProceedings{BD90,
author = "L. Blain and Y. Deswarte",
title = "An Intrusion-Tolerant Security Server for an Open
Distributed System",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "97--104",
year = "1990",
}
@InProceedings{Ben92,
author = "G. Benson",
title = "An Optimal Solution to the Secure Reader-Writer
Problem",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "251--259",
year = "1992",
}
@Article{Ber87,
author = "D. M. Berry",
title = "Towards a Formal Basis for the Formal Development
Method and the Ina Jo Specification Language",
journal = "IEEE transaction on software Engineering",
volume = "13",
number = "2",
month = feb,
year = "1987",
}
@InProceedings{BGS92,
author = "John A. Bull and Li Gong and Karen R. Sollins",
title = "Towards Security in an Open Systems Federation",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "3--20",
year = "1992",
}
@TechReport{Bib77,
author = "K. J. Biba",
title = "Integrity consideration for secure computer systems",
institution = "MITRE Corp., MTR-2997",
year = "1977",
}
@PhdThesis{Bie89,
author = "P. Bieber",
title = "Aspects epist\'{e}miques des protocoles
cryptographiques",
school = "Universit\'{e} Paul-Sabatier - TOULOUSE N d'ordre
531",
year = "1989",
}
@InProceedings{Bie90,
author = "P. Bieber",
title = "Epistemic Verification of Cryptographic Protocols",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "211--222",
year = "1990",
}
@InProceedings{Bis90,
author = "J. Biskup",
title = "A General Framework for Database Security",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "35--44",
year = "1990",
}
@InProceedings{BJMN93,
author = "B. T. Blaustein and S. Jajodia and C. D. McCollum and
L. Notargiacomo",
title = "A Model of Atomicity for Multilevel Transactions",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "120--134",
year = "1993",
}
@InProceedings{BK88,
author = "D. S. Bauer and M. E. Koblentz",
title = "{NIDX}, a Real-Time Intrusion Detection Expert
System",
booktitle = "Proceedings of the USENIX'88 Conference",
pages = "261--272",
month = jun,
year = "1988",
}
@Article{BKY85,
author = "W. E. Boebert and R. Y. Kain and W. D. Young",
title = "Secure Computing : The Secure {ADA} Target Aproach",
journal = "Scientific Honeyweller, Vol. 6, N 2",
month = jul,
year = "1985",
}
@TechReport{BLP73,
author = "D. E. Bell and L. J. La Padula",
title = "Security computer systems : mathematical foundations",
institution = "Hanscom AFB. Bedford. MA. Rep. FSD-TR-73-278.,
ESD/AFSC",
volume = "1",
year = "1973",
}
@TechReport{BLP74,
author = "D. E. Bell and L. J. LaPadula",
title = "Security Computer Systems: Mathematical foundations
and model",
institution = "MITRE Corp., Bedford, Mass.",
year = "1974",
}
@TechReport{BLP75,
author = "D. E. Bell and L. J. La Padula",
title = "Secure Computer Systems: Unified Exposition and
Multics Interpretation",
institution = "MTR-2997, MITRE Corp., Bedford, Mass.",
month = jul,
year = "1975",
}
@Article{BM90,
author = "S. M. Bellovin and M. Merritt",
title = "Limitations of the {K}erberos Authentication System",
journal = "Computer Communications Review",
month = "octobre",
year = "1990",
}
@InProceedings{BM92,
author = "S. M. Bellovin and M. Merritt",
title = "Encrypted Key Exchange : Password-Based Protocols
Secure Against Dictionary Attacks",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "72--84",
year = "1992",
}
@InProceedings{BN89,
author = "D. F. C. Brewer and M. J. Nash",
title = "The Chinese Wall Security Policy",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
year = "1989",
}
@Article{Boc90,
author = "G. V. Bochman",
title = "Protocol specification for {OSI}",
journal = "Computer networks and ISDN systems",
volume = "18",
pages = "167--184",
year = "1990",
}
@Article{Bok81a,
author = "S. H. Bokhari",
title = "On the Mapping Problem",
journal = "IEEE Transaction on Computers",
volume = "C-30",
number = "3",
year = "1981",
}
@Article{Bok81b,
author = "S. H. Bokhari",
title = "The Role of a Well Defined Auditing Process in the
Enforcement of Privacy Policy and Data Security",
journal = "IEEE",
year = "1981",
}
@InProceedings{Boy92,
author = "Colin Boyd",
title = "A Formal Framework for Authentication",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "273--292",
year = "1992",
}
@Article{BP92,
author = "J. B. Bowles and C. E. Pelaez",
title = "Data security-bad code",
journal = "IEEE Spectrum",
month = aug,
year = "1992",
keywords = "hacking",
}
@Article{Bra87,
author = "D. K. Branstad",
title = "Considerations for Security in the {OSI}
Architecture",
journal = "IEEE Network Magazine",
pages = "34--39",
month = apr,
year = "1987",
}
@InProceedings{Bro79,
author = "P. Browne",
title = "The Security Audit",
booktitle = "Checklist For Computer Security Center Self-Audits",
pages = "173--184",
year = "1979",
}
@Article{BS79,
author = "M. Bishop and L. Snyder",
title = "The Transfert of Information and Authority in a
Protection System",
journal = "ACM 0-89791-009-5/79/1200/0045",
year = "1979",
}
@Article{BS80,
author = "G. V. Bochmann and C. A. Sunshine",
title = "Formal Methods in Communication Protocol Design",
journal = "IEEE Transactions on Communications",
volume = "28",
number = "4",
month = apr,
year = "1980",
}
@InProceedings{Cal92,
author = "Christel Calas",
title = "{GD}o{M} : a Multilevel Document Manager",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "393--410",
year = "1992",
}
@InProceedings{Cal.90,
author = "P. Casey and A. Brouwer and D. Herson and J. F.
Pacault and F. Taal and U. Van Essen",
title = "Harmonised Criteria for the Security Evaluation of its
Systems and Products",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "243--",
year = "1990",
}
@Article{Car93,
author = "Ulf Carlsen",
title = "Using Logics to detect Implementation-Dependent
Flaws",
year = "1993",
keywords = "authentication logic",
}
@Misc{CCI88,
author = "CCITT",
title = "{X509}, The directory - Authentication framework",
month = nov,
year = "1987",
keywords = "authentication X509",
}
@InProceedings{CD92,
author = "O. Costich and J. McDermott",
title = "A Multilevel Transaction Problem for Multilevel Secure
Database Systems and Its Solution for the Replicated
Architecture",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "192--203",
year = "1992",
}
@Misc{Cen90,
author = "{Security Group} {CEN/CENELEC}",
title = "Taxonomie for security standardisation",
howpublished = "doc. de travail",
month = sep,
year = "1990",
}
@Article{CGHM81,
author = "M. H. Cheheyl and M. Gasser and G. A. Huff and J. K.
Millen",
title = "Verifying Security",
journal = "Computing Surveys",
volume = "13",
number = "3",
month = sep,
year = "1981",
}
@InProceedings{Cha86,
author = "B. G. Matley",
title = "An Analysis of the Differences between the computer
Security Practices in the Military and Private
Sectors",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "71--74",
year = "1986",
}
@Misc{CJ90,
author = "K. Cutler and F. Jones",
title = "{CISR} Commercial International Security
Requirements",
howpublished = "CISR DRAFT",
month = aug,
year = "1990",
}
@Article{CLT88,
author = "A. C. Capel and C. Lafierre and K. C. Toth",
title = "Protecting the security of {X}.25 Communications",
journal = "Data Communication",
month = nov,
year = "1988",
}
@Article{Col90,
author = "Robert Cole",
title = "A Model for Security Distributed Systems",
journal = "Computers and Security",
volume = "9",
month = jun,
year = "1990",
}
@Article{Coo71,
author = "S. A. Cook",
title = "The Complexity of Theorem Proving Procedures",
journal = "ACM Symposium on Theory of Computing",
year = "1971",
}
@TechReport{Cra91,
author = "R. E. Crandall",
title = "Fast Elliptic Encryption",
institution = "NeXT, Scientific Computation Group",
number = "91.04.07",
year = "1991",
}
@Misc{Cup90a,
author = "F. Cuppens",
title = "Une logique \'{e}pist\'{e}mique et d\'{e}ontique pour
raisonner sur la s\'{e}curit\'{e} des syst\`{e}mes
informatiques",
howpublished = "ONERA-CERT doc. interne",
month = "mars",
year = "1990",
}
@InProceedings{Cup90b,
author = "F. Cuppens",
title = "An Epistemic and deontic Logic for Reasoning about
Computer Security",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "135--146",
year = "1990",
}
@InProceedings{Cup93,
author = "F. Cuppens",
title = "A Logical Analysis of Authorized and Prohibited
Information Flows",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "100--109",
year = "1993",
}
@Article{CW87,
author = "D. D. Clark and D. R. Wilson",
title = "A Comparison of Commercial and Military Computer
Security Policies",
journal = "IEEE",
year = "1987",
}
@InProceedings{CY92,
author = "F. Cuppens and K. Yazdanian",
title = "A 'Natural' Decomposition of Multi-level Relations",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "273--285",
year = "1992",
}
@Article{Dav81,
author = "D. W. Davies",
title = "Ciphers and the Application of the Data Encryption
Standard",
journal = "Computer IEEE",
year = "1981",
}
@Article{Dav83,
author = "D. W. Davies",
title = "Applying the {RSA} Digital Signature to Electronic
Mail",
journal = "Computer",
month = feb,
year = "1983",
}
@TechReport{Dav85,
author = "W. L. Davis Jr",
title = "Synopsis of {U.S.} Department of Defense Evaluation
Criteria",
institution = "IBM",
number = "85212PUR0233",
month = jul,
year = "1985",
}
@InProceedings{DBS92,
author = "Herv\'{e} Debar and Monique Becker and Didier Siboni",
title = "A Neural Network Component for an Intrusion Detection
System",
booktitle = "Proceedings of the IEEE Symposium of Research in
Computer Security and Privacy",
pages = "240--250",
month = may,
year = "1992",
}
@Article{Deh89,
author = "Khosrow Dehnad",
title = "A Simple Way of Improving the Login Security",
journal = "Computers and Security",
volume = "8",
month = nov,
year = "1989",
}
@Article{Den76,
author = "Dorothy E. Denning",
title = "A Lattice Model of Secure Information Flow",
journal = "ACM",
volume = "19",
number = "5",
month = may,
year = "1976",
}
@Book{Den82,
author = "Dorothy E. Denning",
title = "Cryptography and Data Security",
publisher = "Addison-Wesley Publishing Company",
year = "1982",
}
@Article{Den87,
author = "D. E. Denning",
title = "An Intrusion-Detection Model",
journal = "IEEE transaction on Software Engineering",
pages = "222--232",
volume = "13",
number = "2",
year = "1987",
}
@InProceedings{Des92,
author = "Yvo Desmedt",
title = "Breaking the Traditional Computer Security Barriers",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "125--140",
year = "1992",
}
@InProceedings{DGV92,
author = "Joan Daemen and Ren\'{e} Govaerts and Joos
Vandewalle",
title = "A Hardware Design Model for Cryptographic Algorithms",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "419--434",
year = "1992",
}
@Article{DH76,
author = "W. Diffie and M. E. Hellam",
title = "New Directions in Cryptography",
journal = "IEEE Transactions on Information Theory",
volume = "IT-22",
number = "6",
month = nov,
year = "1976",
}
@Article{DH77,
author = "W. Diffie and M. E. Hellam",
title = "Exhaustive Cryptanalysis of the {NBS} {DES}",
journal = "Computer",
volume = "10",
number = "6",
month = jun,
year = "1977",
}
@InProceedings{DHN88,
author = "A. L. Donaldson and J. McHugh and K. A. Nyberg",
title = "Covert Channels in Trusted {LAN}'s",
booktitle = "Proceedings of the 11th National Computer Security
Conference",
year = "1988",
}
@TechReport{DKD92,
author = "Marc Dacier and Mohamed Kaâniche and Yves Deswarte",
title = "A Framework for Operational Security Assessment of
Computing Systems",
institution = "LAAS",
number = "92-434",
year = "1992",
}
@TechReport{DM??,
author = "E. Deberdt and S. Martin",
title = "{M}\'{e}thodologie '{MINERVE SECURITE}' demarche
d'\'{e}valuation de la s\'{e}curit\'{e} des logiciels",
institution = "IBM",
number = "LGE 08",
pages = "223",
year = "??",
}
@Article{DM83,
author = "R. DeMillo and M. Merritt",
title = "Protocol for Data Security",
journal = "Computer",
month = feb,
year = "1983",
}
@InProceedings{DM90,
author = "E. Deberdt and S. Martin",
title = "Methodology 'Minerve Security' Evaluation Process of
Software Security",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "223--234",
year = "1990",
}
@Proceedings{DNAC91,
institution = "DNAC",
title = "De nouvelles architecture pour les communications~:
les r\'{e}seaux informatiques, qualit\'{e} de service,
s\'{e}curit\'{e} et performances",
editor = "Eyrolles",
year = "1991",
}
@Misc{DOD85,
author = "{U.S. Defense Department}",
title = "Trusted Computer System Evaluation Criteria",
institution = "DoD",
number = "5200.28-STD",
year = "1985",
}
@Book{DP89,
author = "D. W. Davies and W. L. Price",
title = "Security for Computer Networks",
publisher = "John Willey and Sons Publications",
edition = "2nd",
year = "1989",
}
@InProceedings{DR91,
author = "Marc Dacier and Michel Rutsaert",
title = "Comment g\'{e}rer la transitivit\'{e} en
s\'{e}curit\'{e}",
booktitle = "Actes de la convention {UNIX}'91",
pages = "205--217",
year = "1991",
}
@InProceedings{Eal.92,
author = "J. Epstein and J. McHugh and R. Pascale and C. Martin
and D. Rothnie and H. Orman and A. Marmor-Squires and
M. Branstad and B. Danner",
title = "Evolution of a Trusted {B}3 Window System Prototype",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "226--239",
year = "1992",
}
@Misc{ECMA88,
author = "ECMA",
title = "Security In Open Systems: {A} Security Framework",
institution = "ECMA",
number = "TR/46",
year = "1988",
}
@TechReport{ECMA89,
author = "ECMA",
title = "Security In Open Systems : Data Elements and Service
Definitions",
institution = "ECMA",
number = "138",
note = "Standard",
year = "1989",
}
@Article{ET91,
author = "D. Estrin and G. Tsudik",
title = "Secure Control of Transit internetwork traffic",
journal = "Elsevier Science Publishers B.V. Ed.",
year = "1991",
}
@InProceedings{FS91,
author = "Dan Farmer and E. H. Spafford",
title = "The {COPS} Security Checker System",
booktitle = "Proceedings of the 14th National Computer Security
Conference",
pages = "372--385",
month = oct,
year = "1991",
}
@Misc{FB90,
author = "Dan Farmer and Robert Baldwin",
title = "Computer Oracle and Password System ({COPS})",
howpublished = "Newsgroup comp.sources.unix",
year = "1990",
}
@TechReport{Fei80,
author = "R. J. Feiertag",
title = "A technique for Proving Specification Are multilevel
Secure",
jinstitution = "Computer Science Lab SRI International. Menlo Park,
Cal.",
number = "CSL-109",
year = "1980",
}
@Article{Fen74,
author = "J. S. Fenton",
title = "Memoryless Subsystems",
journal = "The computer journal",
volume = "17",
number = "2",
year = "1974",
}
@Article{Fer90,
author = "R. Ferreira",
title = "The Practical Application of State of The Art Security
in Real Environments",
journal = "Lecture Notes in Computer Science",
volume = "453",
year = "1990",
}
@Article{Fer91,
author = "Josep Domingo-Ferrer",
title = "Algorithm-Sequenced Access Control",
journal = "Computers and Security",
volume = "10",
month = oct,
year = "1991",
}
@InProceedings{FLR77,
author = "R. J. Feiertag and K. N. Levitt and L. Robinson",
title = "Proving Multilevel Security of a System Design",
booktitle = "6th ACM symposium on operating system principles",
pages = "57--65",
month = nov,
year = "1977",
}
@InProceedings{FM93,
author = "T. Fine and S. E. Minear",
title = "Assuring Distributed Trusted Mach",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "206--218",
year = "1993",
}
@InProceedings{FN79,
author = "R. J. Feiertag and P. G. Neumann",
title = "The Foundation of a Provably Secure Operating System
({PSOS})",
booktitle = "NCC",
volume = "47",
editor = "AFIPS Press",
year = "1979",
}
@InProceedings{FR92,
author = "Jean-Charles Fabre and Brian Randell",
title = "An Object-Oriented View of Fragmented Data Processing
for Fault and Intrusion Tolerance in Distributed
Systems",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "193--208",
year = "1992",
}
@Article{Fra83,
author = "L. J. Fraim",
title = "Scomp: {A} Solution to the Multilevel Security
Problem",
journal = "Computer",
volume = "16",
number = "7",
month = jul,
year = "1983",
}
@InProceedings{FZ92,
author = "G. P. Ford and Jun Zhang",
title = "A structural graph matching approach to image
understanding",
booktitle = "SPIE - The International Society for Optical
Engineering",
volume = "1607",
pages = "559--69",
year = "1992",
}
@Book{Gas88,
author = "M. Gasser",
title = "Building a secure computer system",
publisher = "Van Hoostrand and Reinhold",
year = "1988",
}
@InProceedings{Gau91,
author = "G. Gaudin",
title = "Gestion de s\'{e}curit\'{e} en environnement
h\'{e}t\'{e}rog\`{e}ne",
booktitle = "De nouvelles architectures pour les communications~:
les r\'{e}seaux informatiques, qualit\'{e} de service,
s\'{e}curit\'{e} et performances",
year = "1991",
pages = "73--80",
month = "octobre",
}
@Book{GJ79,
author = "M. R. Garey and D. S. Johnson",
title = "Computers and Intractability : {A} Guide to the Theory
of {NP}-Completeness",
publisher = "W.H. Freeman and Company",
year = "1979",
}
@InProceedings{GL91,
author = "T. D. Garvey and T. F. Lunt",
title = "Model-based Intrusion Detection",
booktitle = "Proceedings of the 14th National Computer Security
Conference",
month = oct,
year = "1991",
}
@InProceedings{GLP92,
author = "V. D. Gligor and S.-W. Luan and J. N. Pato",
title = "On Inter-Realm Authentification in Large Distributed
Systems",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "2--17",
year = "1992",
}
@InProceedings{GM82,
author = "J. A. Goguen and J. Meseguer",
title = "Security Policies and Security Models",
booktitle = "IEEE Symp. Security and Privacy",
year = "1982",
}
@InProceedings{GM89,
author = "J. Glasgow and G. MacEwen",
title = "Obligation as the Basis of Integrity Specification",
booktitle = "Computer Security Foundations Workshop, Franconia,
N.H.",
month = jun,
year = "1989",
}
@Article{GMP92,
author = "J. Glasgow and G. MacEwen and P. Panangaden",
title = "A logic for Reasoning About Security",
journal = "ACM Transactions on Computer Systems",
volume = "10",
number = "3",
month = aug,
year = "1992",
keywords = "authentication logic",
}
@InProceedings{GP90,
author = "M. Girault and J. C. Pailles",
title = "An Identity-Based Scheme Providing Zero-Knowledge
Authentication and Authenticated Key Exchange",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "173--184",
year = "1990",
}
@InProceedings{GPP90,
author = "D. Graft and M. Pabrai and U. Pabrai",
title = "Methodology for Network Security Design",
booktitle = "IEEE Symp. Security and Privacy",
pages = "675--682",
year = "1990",
}
@InProceedings{Gra87,
author = "C. Gray Girling",
title = "Covert Channels in {LAN}'s",
booktitle = "IEEE Symp. Security and Privacy",
year = "1987",
}
@InProceedings{Gra93,
author = "{J. W.} {Gray III}",
title = "On Introducing Noise into the Bus-Contention Channel",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "90--99",
year = "1993",
}
@Book{Gri81,
author = "David Gries",
title = "The Science of Programming",
publisher = "Springer-Verlag, New York",
year = "1981",
}
@InProceedings{GS92,
author = "{J. W.} {Gray III} and P. F. Syverson",
title = "A Logical Approach to Multilevel Security of
Probabilistic Systems",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "164--176",
year = "1992",
}
@Article{Gus88,
author = "D. Gusfield",
title = "A Graph Theoric Approach to Statistical Data
Security",
journal = "SIAM J. Computer",
volume = "17",
number = "3",
year = "1988",
}
@InProceedings{Hal.93,
author = "J. D. Horton and R. Harland and E. Ashby and R. H.
Cooper and W. F. Hyslop and B. G. Nickerson and W. M.
Stewart and O. K. Ward",
title = "The Cascade Vulnerability Problem",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "110--119",
year = "1993",
}
@Article{HA??,
author = "Stephen E. Hansen and E. Todd Atkins",
title = "Centralized System Monitoring With Swatch",
journal = "Proceedings of the the USENIX Conference",
year = "??",
}
@InProceedings{HA92,
author = "H. Hosmer and M. D. Abrams",
title = "MultiPolicy Machine: {A} New Security Paradigm",
booktitle = "IEEE Simposium on Security and Privacy",
note = "Poster Session Abstract",
year = "1992",
}
@Article{Har89,
author = "C. L. Harrold",
title = "An Introduction to the {SMITE} Approach to Secure
Computing",
journal = "Computers and Security",
volume = "8",
month = oct,
year = "1989",
}
@Article{Has91,
author = "J. Hastwell",
title = "Measuring User Accountability in an Integrated Network
Environment",
year = "1991",
}
@Article{Her87,
author = "I. S. Herschberg",
title = "The Hackers' Comfort",
journal = "Computers and Security",
volume = "6",
number = "2",
pages = "133--138",
year = "1987",
keywords = "hacking",
}
@InProceedings{HG92,
author = "Jingsha He and Virgil D. Gligor",
title = "Formal Methods and Automated Tool for Timing-Channel
Identification in {TCB} Source Code",
booktitle = "proceedings of the European Symposium on Research in
Computer Security (ESORICS)",
pages = "57--76",
year = "1992",
}
@InProceedings{HH86,
author = "L. R. Halme and J. Van Horne",
title = "Automated Analysis of Computer System Audit Trails for
Security Purposes",
booktitle = "Computer Security Conference",
pages = "71--74",
year = "1986",
}
@InProceedings{HK91,
author = "I. Houston and S. King",
title = "{CICS} project report - Experiences and Results from
the Use of {Z} in {IBM}",
booktitle = "Formal Software Development Methods: International
Symposium of VDM Europe",
volume = "2-4",
editor = "Springer Verlag",
address = "Berlin",
year = "1991",
}
@InProceedings{HL92,
author = "Ralf C. Hauser and E. Stewart Lee",
title = "Verification and Modelling of Authentification
Protocols",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "141--154",
year = "1992",
}
@InProceedings{HLLS90,
author = "G. Hoffmann and S. Lechner and M. Leclerca and F.
Steiner",
title = "Authentification and Access Control in a Distributed
System",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "71--84",
year = "1990",
}
@InProceedings{HLMM92,
author = "Naji Habra and Baudouin Le Charlier and Abdelaziz
Mounji and Isabelle Mathieu",
title = "{ASAX} : Software Architecture and Rule- Based
Language for Universal Audit Trail Analysis",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "435--450",
year = "1992",
}
@InProceedings{HM90,
author = "E. S. Hocking and J. A. McDermid",
title = "Towards on Object-Oriented Development Environment for
Secure Applications",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "191--200",
year = "1990",
}
@InProceedings{Hos91a,
author = "H. H. Hosmer",
title = "Integrating Security Policies",
booktitle = "Proceedings of the Third RADC Workshop of Multilevel
Database Security, Castile, NY, MITRE MTP 385",
month = may,
year = "1991",
}
@InProceedings{Hos91b,
author = "H. H. Hosmer",
title = "Shared Sensitivity Labels",
booktitle = "Data Security IV, Status and Prospects, North Holand",
year = "1991",
}
@InProceedings{Hos91c,
author = "H. H. Hosmer",
title = "The Multipolicy Machine: {A} New Paradigm for
Multilevel Secure Systems",
booktitle = "National Institute of Standards and Technology
Workshop on Secure Labels",
month = jun,
year = "1991",
}
@InProceedings{Hos91d,
author = "H. H. Hosmer",
title = "A Multipolicy Model: {A} Working Paper",
booktitle = "Fourth RADC Multilevel Database Security Workshop",
month = apr,
year = "1991",
}
@InProceedings{Hos91e,
author = "H. H. Hosmer",
title = "Metapolicies {I}",
booktitle = "ACM SIGSAC Data Management Workshop, San Antonio, TX",
month = dec,
year = "1991",
}
@InProceedings{Hos92,
author = "H. H. Hosmer",
title = "Metapolicies {II}",
booktitle = "Proceedings of the 15th National Computer Security
Conference, Baltimore, MD",
month = oct,
year = "1992",
}
@Article{HRU76,
author = "M. A. Harrison and W. L. Ruzzo and J. D. Ullman",
title = "Protection in operating systems",
journal = "ACM",
volume = "19",
number = "8",
pages = "461--471",
month = aug,
year = "1976",
}
@Article{Hru88,
author = "J. Hruska",
title = "Data viruses, Trojan horses and logic bombs-how to
combat them?",
journal = "Computer Fraud and Security Bulletin",
volume = "10",
number = "6",
month = apr,
year = "1988",
keywords = "hacking",
}
@Misc{HS88,
author = "J. Henshall and S. Shaw",
title = "{O}{SI} Explained End to End Computer Communication
Standards",
editor = "U. K.: Ellis Horwood Limited Chichester",
year = "1988",
}
@InProceedings{Hu92,
author = "W. M. Hu",
title = "Lattice Scheduling and Covert Channels",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "53--61",
year = "1992",
}
@TechReport{IBM90a,
author = "IBM",
title = "{AIX} version 3.1 for {RISC} System/6000{TM} : General
Concepts and Procedures",
institution = "IBM : documentation technique",
year = "1990",
}
@TechReport{IBM91,
author = "IBM",
title = "Elements of {AIX} Security",
institution = "IBM : documentation technique",
number = "GG24-3622-01",
year = "1991",
}
@Misc{IEE89,
author = "{IEEE LAN Secutity Working Group}",
title = "Standard for Interoperable Local Area Network ({LAN})
Security ({SILS}), {IEEE} 802.10",
month = dec,
year = "1989",
}
@InProceedings{Ilg93,
author = "K. Ilgun",
title = "{USTAT} : {A} Real-Time Intrusion Detection System for
{UNIX}",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "16--29",
year = "1993",
}
@TechReport{ISO84,
author = "ISO",
title = "Information Processing Systems -- {OSI} Reference
Model, International Standards Organization",
institution = "ISO",
number = "7498",
month = oct,
year = "1984",
}
@TechReport{ISO89,
author = "ISO",
title = "Information Processing Systems -- {OSI} Reference
Model -- Part 2: Security Architecture, International
Standards Organization",
institution = "ISO",
number = "7498-2",
year = "1989",
}
@TechReport{ISO90,
author = "ISO",
title = "{MD4} - Message Digest Algorithm",
institution = "International Standards Organization",
number = "ISO/IEC JTC1/SC27/WG20.2 N193",
month = apr,
year = "1990",
}
@TechReport{Iso91a,
author = "ISO",
title = "Glossary of Information Technology Security
Definitions",
institution = "International Standards Organization Publication",
number = "ISO/IEC JTC1/SC27 N270",
year = "1991",
keyword = "glossary",
}
@TechReport{Iso91b,
author = "ISO",
title = "Telecommunications and Information Exchange Between
Systems - Transport Layer Security Protocol",
institution = "International Standards Organization Publication",
number = "ISO/IEC JTC1/SC6 N6779",
month = oct,
year = "1991",
}
@TechReport{Iso91c,
author = "ISO",
title = "Telecommunications and Information Exchange Between
Systems - Network Layer Security Protocol",
institution = "International Standards Organization Publication",
number = "ISO/IEC JTC1/SC6 N7053",
month = nov,
year = "1991",
}
@TechReport{Iso91d,
author = "ISO",
title = "Telecommunications and Information Exchange Between
Systems - Transport Layer Security Protocol -
Amendement 1: Security Association Establishment",
institution = "International Standards Organization",
number = "ISO/IEC JTC1/SC6 N6794",
month = dec,
year = "1991",
}
@TechReport{ITSEM92,
author = "{Commision of the} {European} {³ommunities}",
title = "Information Technology Security Evaluation Manual
({ITSEM})",
institution = "CEC",
year = "1992",
}
@InProceedings{JA92,
author = "S. Jajodia and V. Atluri",
title = "Alternative Correctness Criteria for Concurrent
Execution of Transactions",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "216--225",
year = "1992",
}
@InBook{Jac91,
author = "J. L. Jacob",
title = "Specifying security properties",
publisher = "??",
chapter = "??",
year = "1991",
}
@TechReport{Jal.93a,
author = "H. S. Javitz and A. Valdes and T. F. Lunt and A.
Tamaru and M. Tyson and J. Lowrance",
title = "Next Generation Intrusion Detection Expert System
({NIDES})",
institution = "SRI",
number = "A016-Rationales",
year = "1993",
}
@Article{Jan92,
author = "Janus Associates",
title = "Information Security Administration Model : {A}
Management Model to Help Identify the Best Practices of
the Administration Function within the Security Group",
journal = "Computer and Security",
volume = "11",
pages = "327--340",
year = "1992",
}
@InProceedings{JDS91,
author = "Kathleen A. Jackson and David H. Dubois and Cathy A.
Stalling",
title = "An Expert System Application for Network Intrusion
Detection",
booktitle = "Proceedings of the 14th National Computer Security
Conference",
year = "1991",
}
@InProceedings{JLS76,
author = "A. K. Jones and R. J. Lipton and L. Snyder",
title = "A Linear Time Algorithm for Deciding Security",
booktitle = "17th Annual Symp. on Foundations of Computer Science",
year = "1976",
}
@TechReport{JM90,
author = "P. Janson and R. Molva",
title = "Network Security",
institution = "IBM Zurich Research Laboratory",
month = may,
year = "1990",
}
@Misc{JM91,
author = "P. Janson and R. Molva",
title = "Security in Open Networks and Distributed Systems",
howpublished = "Elsevier Science Publishers",
year = "1991",
}
@Article{JMG88,
author = "C. Jard and J. F. Monin and R. Groz",
title = "Development of {V}\'{e}da, a Prototyping Tool for
Distributed Algorithms",
journal = "IEEE Transactions on software ingineering",
volume = "14",
number = "3",
month = mar,
year = "1988",
}
@TechReport{Jon??,
author = "R. W. Jones",
title = "A General Mechanism for Access Control: Its
Relationship to Secure Systems Concepts",
institution = "IBM",
number = "LGE 08",
pages = "45",
year = "??",
}
@InProceedings{Jon90,
author = "R. W. Jones",
title = "A General Mechanism for Access Control : Its
Relationship to Secure System Concepts",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "45--50",
year = "1990",
}
@InProceedings{JS92,
author = "Andrew J. I. Jones and Marek Sergot",
title = "Formal Specification of Security Requirements using
the Theory of Normative Positions",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "103--124",
year = "1992",
}
@TechReport{Kai??,
author = "J. Kaiser",
title = "An Object-Oriented Architecture to Support System
Reliability and Security",
institution = "IBM",
number = "LGE 08",
pages = "51",
year = "??",
}
@InProceedings{Kai90,
author = "J. Kaiser",
title = "An Object-Oriented Architecture to Support System
Reliability and Security",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "51--60",
year = "1990",
}
@Article{Kak83,
author = "S. C. Kak",
title = "Data Security in Computer Networks",
journal = "Computer IEEE",
pages = "8--10",
year = "1983",
}
@Article{Kak88,
author = "Viiveke Fak",
title = "Are we vulnerable to a virus attack? {A} report from
Sweden",
journal = "Computers and Security",
volume = "7",
month = apr,
year = "1988",
keywords = "hacking",
}
@InProceedings{Kal.92,
author = "Y. Klein and E. Roche and F. Taal and M. Van Dulm and
U. Van Essen and P. Wolf and J. Yates",
title = "The {IT} Security Evaluation Manuel ({ITSEM})",
booktitle = "Proceedings of the 15th NCSC Conference",
year = "1992",
}
@InProceedings{Kan80,
author = "A. Kandel",
title = "Fuzzy statistics and systems security",
booktitle = "Conference : Security Through Science and
Engineering",
month = sep,
year = "1980",
}
@InProceedings{Kar78,
author = "P. A. Karger",
title = "The Lattice Model in a Public Computing network",
booktitle = "ACM Annual Conference",
volume = "1",
year = "1978",
}
@Article{KBN88,
author = "B. C. Karp and L. K. Barker and L. D. Nelson",
title = "The Secure Data Network System",
journal = "ATT Technical Journal",
pages = "19--27",
month = may,
year = "1988",
}
@InProceedings{KC90,
author = "R. Kaplan and R. J. M. Clyde",
title = "Viruses, worms, and Trojan horses. {VI} The war
continues",
booktitle = "Digital Equipment Computer Users Society. Fall",
pages = "119--137",
year = "1990",
keywords = "hacking",
}
@InProceedings{Kel90,
author = "U. Kelter",
title = "Group-Oriented Discretionary Access Controls for
Distributed Structurally Object-Oriented Database
Systems",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "23--34",
year = "1990",
}
@InProceedings{Kel92,
author = "Udo Kelter",
title = "Type-Level Access Controls for Distributed
Structurally Object- Oriented Database Systems",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "21--40",
year = "1992",
}
@Article{Kem82a,
author = "R. A. Kemmerer",
title = "Formal Verification of an Operating System Kernel",
journal = "Communication of the ACM",
volume = "12",
number = "10",
pages = "576--581",
year = "1982",
}
@InProceedings{Kem82b,
author = "R. A. Kemmerer",
title = "A Practical Approach to Identifying Storage and Timing
Channels",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
year = "1982",
}
@InProceedings{Kes92,
author = "Volker Kessler",
title = "On the Chinese Wall Model",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "41--56",
year = "1992",
}
@Misc{Kie89,
author = "M. Kielsky",
title = "Security and Access Control Features of the {VAX/VMS}
Operating System",
howpublished = "??",
year = "1989",
}
@InProceedings{Kim91,
author = "J. Kimmins",
title = "Developing a Network Security Architecture : Concepts
and Issues",
booktitle = "Proceedings of the SECURICOM'91 Conference",
month = mar,
year = "1991",
}
@InProceedings{KK92,
author = "Iwen E. Kang and Thomas F. Keefe",
title = "On Transaction Processing for Multilevel Secure
Replicated Databases",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "329--348",
year = "1992",
}
@InProceedings{Klu89,
author = "H. M. Kluepfel",
title = "Foiling the wily hacker: more than analysis and
containment",
booktitle = "International Carnahan Conference on Security
Technology",
pages = "15--21",
year = "1989",
keywords = "hacking",
}
@Article{Klu91,
author = "H. M. Kluepfel",
title = "In search of the cuckoo's nest - an auditing framework
for evaluating the security of open networks",
journal = "EDP Auditor Journal",
volume = "3",
pages = "36--48",
year = "1991",
keywords = "hacking",
}
@InProceedings{Koh91,
author = "J. T. Kohl",
title = "The evolution of the {K}erberos Authentication
Service",
booktitle = "Acte de EurOpen 91",
pages = "295--313",
year = "1991",
}
@Article{KP91,
author = "R. A. Kemmerer and P. A. Porras",
title = "Covert Flow Trees: {A} Visual Approach to Analyzing
Covert Storage Channels",
journal = "IEEE Transaction on Software Engineering",
volume = "17",
number = "11",
month = nov,
year = "1991",
}
@Article{Kru89,
author = "Jan P. Kruys",
title = "Security of Open Systems",
journal = "Computers and Security",
volume = "8",
month = apr,
year = "1989",
}
@Article{Kru91,
author = "Jan P. Kruys",
title = "Progress in Secure Distributed Systems",
journal = "Computers and Security",
volume = "10",
month = aug,
year = "1991",
}
@TechReport{KSL??,
author = "A. Kehne and J. Sch{\"o}nw{\"a}lder and H.
Langend{\"o}rfer",
title = "Multiple Authentications with a Nonce-Based Protocol
Using Generalized Timestamps",
institution = "Institut f{\"u}r Betriebssysteme und Rechnerverbund,
TU Braunschweig, B{\"u}ltenweg 74/75, D-3300
Braunschweig",
year = "1991",
}
@InProceedings{Kun86,
author = "J. D. Kuhn",
title = "Research Toward Intrusion Detection Through Automated
Abstraction of Audit Data",
booktitle = "Computer Security Conference",
pages = "204--208",
year = "1986",
}
@Misc{KW91,
author = "J. O. Kephart and S. R. White",
title = "Directed-Graph Epidemiological Models of Computer
Viruses",
editor = "IEEE",
year = "1991",
}
@InProceedings{KW93,
author = "J. O. Kephart and S. R. White",
title = "Measuring and Modeling Computer Virus Prevalence",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "2--15",
year = "1993",
}
@Article{Lac74,
author = "R. D. Lackey",
title = "Penetration of computer systems an overview",
journal = "Honeywell Computer Journal",
year = "1974",
keywords = "hacking",
}
@TechReport{Lal.90a,
author = "T. F. Lunt and A. Tamaru and F. Gilham and R.
Jagannathan and C. Jalali and H. S. Javitz and A.
Valdes and P. G. Neumann",
title = "A real-Time Intrusion-Detection Expert System",
institution = "SRI International",
month = jun,
year = "1990",
}
@InProceedings{Lal.90b,
author = "T. F. Lunt and A. Tamaru and F. Gilham and R.
Jagannathan and P. G. Neumann and C. Jalali",
title = "{IDES}: {A} Progress Report",
booktitle = "Proceedings of the Computer Security Application
Conference",
pages = "273--285",
year = "1990",
}
@Article{Lal.90c,
author = "T. F. Lunt and D. Denning and R. Schell and M. Heckman
and W. Shockley",
title = "The SeaView Security Model",
journal = "IEEE Trans. on Soft. Engineering",
volume = "16",
number = "6",
month = jun,
year = "1990",
}
@TechReport{Lal.91,
author = "Lassire and Reboulet and Ruggiu and Velin and
Yazdanian",
title = "Glossaire encyclop\'{e}dique de la s\'{e}curit\'{e} et
qualit\'{e} des syst\`{e}mes d'information et
informatiques",
institution = "CT 'S\'{e}curit\'{e} et sûret\'{e} informatiques' de
l'AFCET",
month = "novembre",
year = "1991",
keyword = "glossary",
}
@Article{Lam73,
author = "B. W. Lampson",
title = "A Note on the Confinement Problem",
journal = "ACM",
volume = "16",
number = "10",
pages = "613--615",
month = oct,
year = "1973",
}
@Article{Lam74,
author = "B. W. Lampson",
title = "Protection",
journal = "ACM",
volume = "8",
number = "1",
pages = "18--24",
month = jan,
year = "1974",
}
@Article{Lan81,
author = "C. E. Landwerh",
title = "Formal Models for Computer Security",
journal = "Computer Surveys",
volume = "13",
pages = "247--275",
year = "1981",
}
@Article{LAN86,
author = "Y. Lapid and N. Ahituv and S. Neumann",
title = "Approaches to handling 'Trojan Horse' threats",
journal = "Computer and security",
volume = "5",
month = sep,
year = "1986",
keywords = "hacking",
}
@Article{LAN89,
author = "{European Institute for System Security} {EISS}",
title = "Local Area Network Security",
journal = "Lecture Notes in Computer Science",
volume = "396",
year = "1989",
}
@InProceedings{Lap90,
author = "L. La Padula",
title = "Formal Modeling in a Generalized Framework for Access
Control",
booktitle = "Computer Security Foundation Workshop III",
month = jun,
year = "1990",
}
@Article{Lat90,
author = "David L. Lathrop",
title = "Perestroika and its implications for Computer Security
in the {U.S.S.R.}",
journal = "Computers and Security",
volume = "9",
month = dec,
year = "1990",
}
@TechReport{LB91,
author = "Linda Lankewicz and Mark Benard",
title = "Real-Time Anomaly Detection Using a Nonparametric
Pattern Recognition Approach",
institution = "Tulane University, Department of Computer Science",
number = "TUTR 91-106",
year = "1991",
}
@InProceedings{LB92,
author = "Kwok-Yan Lam and Thomas Beth",
title = "Timely Authentication in Distributed Systems",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "293--306",
year = "1992",
}
@Article{Lee90,
author = "P. J. Lee",
title = "Secure User Access Control for Public Networks",
journal = "Lecture Notes in Computer Science",
volume = "453",
year = "1990",
}
@InProceedings{LG92,
author = "Kwok-Yan Lam and Dieter Gollmann",
title = "Freshness Assurance of Authentication Protocols",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "261--272",
year = "1992",
}
@InProceedings{LH90,
author = "T. F. Lunt and D. Hsieh",
title = "The SeaView Secure Database System : {A} Progress
Report",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "3--14",
year = "1990",
}
@Article{LHM84,
author = "C. E. Landwehr and C. L. Heitmeyer and J. McLean",
title = "A Security Model for Military Message System",
journal = "ACM Trans. Comput. Syst.",
volume = "2",
pages = "198--222",
year = "1984",
}
@Misc{Lin90,
author = "T. Y. Lin",
title = "Probalistic Measure on Aggregations",
editor = "IEEE",
year = "1990",
}
@InProceedings{LJ88,
author = "T. F. Lunt and R. Jagannathan",
title = "A Prototype Real-Time Intrusion-Detection Expert
System",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "59--66",
year = "1988",
}
@InProceedings{LK89,
author = "Z. L. Lichtman and J. F. Kimmins",
title = "An Audit Trail Reduction Paradigm Based on Trusted
Processes",
booktitle = "Proceedings of the 13th National Computer Security
Conference",
year = "1989",
}
@Article{Llo90,
author = "Ivor Lloyd",
title = "Software Evaluation in High Integrity Systems",
journal = "Computers and Security",
volume = "9",
month = aug,
year = "1990",
}
@Book{LLT87,
author = "J. M. Lamere and Y. Leroux and J. Tourly",
title = "La s\'{e}curit\'{e} des r\'{e}seaux : {M}\'{e}thodes
et techniques",
publisher = "DUNOD",
year = "1987",
}
@Article{LR92,
author = "D. Longley and S. Rigby",
title = "An Automatic Search for Security Flaws in Key
Management Schemes",
journal = "Computer and Security",
volume = "11",
number = "1",
pages = "75--89",
month = may,
year = "1992",
}
@Article{LS90,
author = "W. P. Lu and M. K. Sundareshan",
title = "A Model for Multilevel Security in Computer Networks",
journal = "IEEE trans. on software",
volume = "16",
number = "6",
month = jun,
year = "1990",
}
@InProceedings{LTBS90,
author = "E. S. Lee and B. Thomson and P. I. P. Boulton and M.
Stumm",
title = "An Architecture for a Trusted Network",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "105--116",
year = "1990",
}
@Article{Lun89,
author = "Teresa F. Lunt",
title = "Access Control Policies : Some unanswered Questions",
journal = "Computers and Security",
volume = "8",
month = feb,
year = "1989",
}
@Article{Lun93,
author = "Teresa F. Lunt",
title = "A Survey of Intrusion Detection techniques",
journal = "Computers and Security",
volume = "12",
year = "1993",
}
@Article{LV92,
author = "G. E. Liepins and H. S. Vaccaro",
title = "Intrusion Detection: Its Role and Validation",
journal = "Computers and Security",
volume = "11",
pages = "347--355",
year = "1992",
}
@InProceedings{Mal.90,
author = "N. McAuliffe and D. Wolcott and L. Schaefer and N.
Kelem and B. Hubbard and T. Haluey",
title = "Is your Computer Being Misused? {A} Survey of Current
Intrusion Detection System Technology",
booktitle = "Proceedings of the IEEE Computer Security Applications
Conference",
pages = "260--272",
year = "1990",
}
@InProceedings{Mat85,
author = "B. G. Matley",
title = "Computer Privacy in America: Conflicting Practices and
Policy Choises",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "219--223",
year = "1985",
}
@Article{Mcc90,
author = "D. MC. Cullough",
title = "A Hookup Theorem for Multilevel Security",
journal = "IEEE Trans. on Soft. Engineering",
volume = "16",
number = "6",
month = jun,
year = "1990",
}
@InProceedings{Mcl88,
author = "J. McLean",
title = "The Algebra of Security",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
month = apr,
year = "1988",
}
@InProceedings{Me93b,
author = "Ludovic M\'e",
title = "Security Audit Trail Analysis Using Genetic
Algorithms",
booktitle = "Proceedings of the 12th International Conference on
Computer Safety, Reliability and Security",
pages = "329--340",
month = oct,
year = "1993",
}
@InProceedings{Mea92,
author = "C. Meadows",
title = "Using Traces of Procedure Calls to Reason About
Composability",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "177--191",
year = "1992",
}
@Article{Men90,
author = "Belden Menkus",
title = "How an 'Audit Trail' Aids in Maintaining Information
Integrity...as Illustrated in Retailing",
journal = "Computers and Security",
volume = "9",
number = "2",
month = apr,
year = "1990",
}
@Article{Men91,
author = "B. Menkus",
title = "'Hackers': know the adversary",
journal = "Computers and Security",
volume = "10",
number = "5",
pages = "405--409",
month = aug,
year = "1991",
keywords = "hacking",
}
@Article{Mer79,
author = "P. M. Merlin",
title = "Specification and Validation of Protocols",
journal = "IEEE Transactions on Communications",
volume = "27",
number = "11",
month = nov,
year = "1979",
}
@Article{Mer90a,
author = "Lindsay C. J. Mercer",
title = "Tailor-made Auditing of Information Systems for the
Detection of Fraud",
journal = "Computers and Security",
volume = "9",
number = "1",
month = feb,
year = "1990",
}
@Article{Mer90b,
author = "Lindsay C. J. Mercer",
title = "Fraud Detection via Regression Analysis",
journal = "Computers and Security",
volume = "9",
number = "5",
month = jun,
year = "1990",
}
@Article{MF90,
author = "A. M. Myong and K. A. Forcht",
title = "The computer hacker: friend or foe?",
journal = "Journal of Computer Information Systems",
volume = "31",
number = "2",
pages = "47--49",
year = "1990",
keywords = "hacking",
}
@Book{MG87,
author = "C. Macchi and J. F. {Guilbert and 13 Co-auteurs}",
title = "{T}\'{e}l\'{e}informatique",
publisher = "DUNOD",
edition = "2",
year = "1987",
}
@TechReport{MIC90a,
author = "MICROSOFT",
title = "{L}{AN} Manager : guide de l'administrateur",
institution = "MICROSOFT",
note = "Documentation technique",
year = "1990",
}
@TechReport{MIC90b,
author = "MICROSOFT",
title = "{LAN} Manager : Manuel de reference de
l'administrateur",
institution = "MICROSOFT",
note = "Documentation technique",
year = "1990",
}
@InProceedings{Mic91,
author = "Z. Michalewicz",
title = "A step towards optimal topology of 'Communication
networks'",
booktitle = "SPIE - The International Society for Optical
Engineering",
volume = "1470",
pages = "112--22",
year = "1991",
}
@PhdThesis{Mic93,
author = "J. B. Michael",
title = "A Formal Process for Testing the Consistency of
Composed Security Policies",
school = "George Mason University",
month = aug,
year = "1993",
}
@Article{Mil89,
author = "J. K. Millen",
title = "Models of Multilevel Computer Security",
journal = "Advance in Computers",
volume = "29",
year = "1989",
}
@InProceedings{Mil92,
author = "J. K. Millen",
title = "A Resource Allocation Model for Denial of Service",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "137--147",
year = "1992",
}
@Article{ML91,
author = "M. Masmoudi and D. E. Lafaye de Micheaux",
title = "Les lignes priv\'{e}es virtuelles",
journal = "T.S.I.",
volume = "10",
number = "2",
year = "1991",
}
@InProceedings{ML92,
author = "J. K. Millen and T. F. Lunt",
title = "Security for Object-Oriented Database Systems",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "260--272",
year = "1992",
}
@Book{MM82,
author = "C. H. Meyer and S. M. Matyas",
title = "Cryptography: {A} Guide for the Design and
Implementation of Secure Systems",
publisher = "John Willey and Sons Publications",
year = "1982",
}
@InProceedings{MM92,
author = "U. S. Moskowitz and A. R. Miller",
title = "The Influence of Delay Upon an Idealized Channel's
Bandwidth",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "92--71",
year = "1992",
}
@TechReport{MNSS87,
author = "S. P. Miller and B. C. Neuman and J. I. Schiller and
J. H. Saltzer",
title = "{K}erberos Authentication and Authorization System",
institution = "MIT Proj. ATHENA, Technical Plan, Section E.2.1",
month = dec,
year = "1987",
}
@InProceedings{Mos87,
author = "L. E. Moser",
title = "Graph homomorphisms and the design of secure computer
systems",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "88--96",
year = "1997",
}
@Article{MS90,
author = "Robert A. McKosky and Sajjan G. Shiva",
title = "A File Integrity Checking System to Detect and Recover
from Program Modification Attacks in Multi-User
Computer Systems",
journal = "Computers and Security",
volume = "9",
number = "4",
month = may,
year = "1990",
}
@Misc{MJM93,
author = "J. D. Moffett and D. Jonscher and J. A. McDermid",
title = "The Policy Obstacle Course",
howpublished = "SCHEMA/York/93/1 version 1",
month = jul,
year = "1993",
}
@InProceedings{MS91,
author = "J. B. Michael and E. H. Sibley et al.",
title = "A Modeling Paradigm for Representing Intentions in
Information Systemes Policy.",
booktitle = "First Workshop on Information Technologies and
Systems",
year = "1991",
}
@InProceedings{MT93,
author = "R. Molva and G. Tsudik",
title = "Authentication Method with Impersonal Token Cards",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "56--65",
year = "1993",
}
@InProceedings{MTVZ92,
author = "Refik Molva and Gene Tsudik and Els Van Herreweghen
and Stefano Zatti",
title = "KryptoKnight Authentication and Key Distribution
System",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "155--174",
year = "1992",
}
@TechReport{NBS77,
author = "National {Bureau of} Standards",
title = "Data {E}ncryption {S}tandard",
institution = "NBS",
year = "1977",
}
@TechReport{NCSC87,
author = "{National Computer Security Center} {NCSC}",
title = "Trusted {N}etwork {I}nterpretation of the {TCSEC}",
institution = "NCSC",
number = "NCSC-TG-005",
month = jul,
year = "1987",
}
@TechReport{NCSC90,
author = "{National Computer Security Center} {NCSC}",
title = "Trusted {N}etwork {I}nterpretation environments
guideline",
institution = "NCSC",
number = "NCSC-TG-011, vers.1",
month = aug,
year = "1990",
}
@InProceedings{Nes78,
author = "P. G. Nessett",
title = "Computer Security Evaluation",
booktitle = "Proc. NCC",
volume = "47",
editor = "AFIPS Press",
year = "1978",
}
@Article{Nes87,
author = "D. M. Nessett",
title = "Factors Affecting Distributed System Security",
journal = "IEEE TOSE",
month = feb,
year = "1987",
}
@Article{NF89,
author = "Norme Fran\c{c}çaise",
title = "Interconnexion des syst\`{e}mes ouverts",
journal = "NF EN 27498 (ISO 7498-1)",
month = "ao\^{u}t",
year = "1989",
}
@TechReport{NF90,
author = "Norme Fran\c{c}çaise",
title = "Interconnexion des syst\`{e}mes ouverts : Architecture
de s\'{e}curit\'{e}",
institution = "ISO",
number = "NF ISO 7498-2",
month = "septembre",
year = "1990",
}
@Article{NOP87,
author = "D. B. Newman and J. K. Omura and R. L. Pickholtz",
title = "Public Key Management for Network Security",
journal = "IEEE Network Magazine",
volume = "1",
number = "2",
month = apr,
year = "1987",
}
@Article{NS78,
author = "R. M. Needham and M. D. Schroeder",
title = "Using encryption for authentication in large networks
of computers",
journal = "ACM",
volume = "21",
number = "12",
year = "1978",
}
@Article{OA90,
author = "Ingrid M. Olson and Marshall D. Abrams",
title = "Computer Access Control Policy Choices",
journal = "Computers and Security",
volume = "9",
month = dec,
year = "1990",
}
@InProceedings{Oha90,
author = "C. O'halloran",
title = "A Calculus of Information Flow",
booktitle = "Acte de ESORICS 90, Toulouse",
pages = "147--159",
month = oct,
year = "1990",
}
@Article{OT89,
author = "E. Okamoto and K. Tanaka",
title = "Identity-Based Information Security Management System
for Personal Computer Networks",
journal = "IEEE Journal on Selected Areas in Communications",
volume = "7",
number = "2",
month = feb,
year = "1989",
}
@TechReport{PA??,
author = "A. Pfitzmann and R. Assmann",
title = "Efficient Software Implementations of (Generalized)
{DES}",
institution = "Univ. KARLSRUHE",
year = "??",
}
@InProceedings{Pat90,
author = "J. Patarin",
title = "Pseudorandom Permutations based on the {D.E.S.}
Scheme",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "185--190",
year = "1990",
}
@InProceedings{PDJ93,
author = "F. Piessens and B. De Decker and P. Janson",
title = "Interconnecting Domains with Heterogeneous Key
Distribution",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "66--81",
year = "1993",
}
@TechReport{Pel90,
author = "Christian Pelissier",
title = "Guide de s\'{e}curit\'{e} pour les administrateurs de
syst\`{e}mes {UNIX}",
institution = "ONERA : Rapport interne",
year = "1990",
}
@Misc{Pel92,
author = "Christian Pelissier",
title = "Guide de s\'{e}curit\'{e} pour des syst\`{e}mes
{UNIX}",
howpublished = "Draft, 22 juillet, 1992",
month = "juillet",
year = "1992",
}
@InProceedings{Per92a,
author = "G{\"u}nther Pernul",
title = "Security Constraint Processing in Multilevel Secure
{AMAC} Schemata",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "349--372",
year = "1992",
}
@TechReport{Per92b,
author = "O. Perret",
title = "La s\'{e}curit\'{e} certifi\'{e}e sous {UNIX}, \`{a}
partir d'une exp\'{e}rience sur {S}un{OS MLS}",
institution = "ENSTA : Rapport interne",
year = "1991",
}
@Misc{PG??,
author = "J. C. Pailles and M. Girault",
title = "A Public Key Based Solution for Secured Data",
howpublished = "Communications",
year = "??",
}
@Article{PH90,
author = "R. Paans and I. S. Herschberg",
title = "Auditing the Change Management Process",
journal = "Computers and Security",
volume = "9",
number = "2",
month = apr,
year = "1990",
}
@Article{Pic87,
author = "J. Picciotto",
title = "The Design of an Effective Auditing Subsystem",
journal = "IEEE",
year = "1987",
}
@Article{Pre89,
author = "C. M. Preston",
title = "Artificial Intelligence Applied to Information System
Security",
journal = "Information Age (Guildford)",
volume = "11",
number = "411",
pages = "217--224",
year = "1989",
}
@Article{PS91,
author = "D. Pottas and S. H. von Solms",
title = "A Computerized Management Reporting Aid for a
Mainframe Security System",
journal = "Computers and Security",
volume = "10",
month = oct,
year = "1991",
}
@Book{PSRH85,
author = "G. Pujolle and D. Serret and D. Dromard and E.
Horlait",
title = "{R}\'{e}seaux et {T}\'{e}l\'{e}matique, Tomes 1 et 2",
publisher = "EYROLLES",
year = "1985",
}
@Article{PW88,
author = "L. G. Pierson and E. L. Witzke",
title = "A Security Methodology for Computer Networks",
journal = "ATT Technical Journal",
pages = "28--36",
month = may,
year = "1988",
}
@InProceedings{QSKLG93,
author = "X. Qian and M. Sticket and P. D. Karp and T. F. Lunt
and T. D. Garvey",
title = "Relational Database Systems",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "196--205",
year = "1993",
}
@Article{Ram90,
author = "Raju Ramaswamy",
title = "A key Management Algorithm for Secure Communication in
Open Systems Interconnection Architecture",
journal = "Computers and Security",
volume = "9",
month = feb,
year = "1990",
}
@InProceedings{Ran90,
author = "G. Randell",
title = "A Case Study in the Formal Rafinement of a Distributed
Secure System",
booktitle = "Acte de ESORICS 90, Toulouse",
pages = "201--208",
month = oct,
year = "1990",
}
@InProceedings{RBG92,
author = "M. Reiter and K. Birman and L. Gong",
title = "Integrating Security in a Group Oriented Distributed
System",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "18--32",
year = "1992",
}
@Article{RC77,
author = "R. C. Read and D. G. Corneil",
title = "The Graph Isomorphism Disease",
journal = "Journal of Graph Theory",
volume = "1",
year = "1977",
}
@Misc{Rey91,
author = "J. K. Reynolds",
title = "The helminthiasis of the Internet",
howpublished = "Elsevier Science Publishers B.V. Ed.",
year = "1991",
}
@InProceedings{RG93,
author = "M. Reiter and L. Gong",
title = "Preventing Denial and Forgery of Causal Relationships
in Distributed Systems",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "30--40",
year = "1993",
}
@Article{RMS89,
author = "Bruce L. Riddle and Murray S. Miron and Judith A.
Semo",
title = "Passwords in Use in a University Timesharing
Environment",
journal = "Computers and Security",
volume = "8",
month = nov,
year = "1989",
}
@Article{RMV94,
author = "Pierre Rolin and Ludovic M\'{e} and Jos\'{e} Vazquez",
title = "{S}\'{e}curit\'{e} des syst\`{e}mes informatiques",
journal = "R\'{e}seaux et Informatique Repartie",
year = "1994",
pages = "31--74",
}
@Book{Rol89,
author = "Pierre Rolin",
title = "{R}\'{e}seaux locaux : Normes et protocoles",
publisher = "HERMES",
edition = "2",
year = "1989",
}
@InProceedings{Rol91,
author = "Pierre Rolin",
title = "Architecture d'un r\'{e}seau de confiance",
booktitle = "CFIP 91",
year = "1991",
}
@Article{Rou85,
author = "C. C. Rous",
title = "What makes hackers tick? {A} computer owner's guide",
journal = "CIPS Review",
volume = "9",
number = "4",
pages = "14--15",
month = jul,
year = "1985",
keywords = "hacking",
}
@Article{RR83,
author = "J. Rushby and B. Randell",
title = "A Distributed Secure System",
journal = "Computer",
volume = "16",
number = "7",
pages = "5--67",
year = "1983",
}
@Article{RSA78a,
author = "R. L. Rivest and A. Shamir and L. Adleman",
title = "A Mothod for Obtaining Digital Signatures and
Public-key Cryptosystems",
journal = "ACM",
volume = "2",
number = "2",
month = feb,
year = "1978",
}
@TechReport{RSA78b,
author = "R. L. Rivest and A. Shamir and L. Adleman",
title = "Mental Poker",
institution = "MIT",
number = "TM-125",
month = nov,
year = "1978",
}
@InProceedings{RT92,
author = "P. Rolin and L. Toutain",
title = "Analyseur de s\'{e}curit\'{e} du r\'{e}seau",
booktitle = "Actes du congr\`{e}s De nouvelles architecture pour
les communications",
year = "1992",
}
@Article{Rus81,
author = "J. Rushby",
title = "Design and Verification of Secure Systems",
journal = "ACM",
volume = "15",
number = "5",
pages = "12--21",
month = dec,
year = "1981",
}
@InProceedings{Rus85,
author = "J. Rushby",
title = "Networks are Systems",
booktitle = "DOD Computer Security Workshop",
year = "1985",
}
@Article{Rus90,
author = "D. Russel",
title = "High-level Security Architecture and the {K}erberos
System",
journal = "Computer Networks and ISDN Systems",
volume = "19",
pages = "201--214",
year = "1990",
}
@Misc{Sam85,
author = "M. Samociuk",
title = "Hacking, or the Art of Armchair Espionage",
howpublished = "Computer Fraud and Security Bulletin (Amsterdam)
Supplement",
volume = "7",
number = "9",
year = "1985",
keywords = "hacking",
}
@Article{San88,
author = "R. S. Sandhu",
title = "The Schematic Protection Model: Its Definition and
Analysis for Acyclic Attenuating Schemes",
journal = "Association for Computing Machinery",
volume = "35",
number = "2",
month = apr,
year = "1988",
}
@InProceedings{San92,
author = "R. S. Sandhu",
title = "The Typed Access Matrix Model",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "122--136",
year = "1992",
}
@Article{Sat89,
author = "M. Satyanarayanan",
title = "Integrating Security in a Large Distributed System",
journal = "ACM TOCS",
volume = "7",
number = "3",
pages = "247--280",
month = aug,
year = "1989",
}
@Book{SB86,
author = "B. Sarikaya and G. Bochmann",
title = "Protocol Specification, Testing and Verification,
{VI}",
publisher = "NORTH-HOLLAND",
year = "1986",
}
@InProceedings{Sch85,
author = "D. D. Schnackenberg",
title = "Development of a Multilevel Secure Local Area
Network",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "97--104",
year = "1985",
}
@TechReport{Sch91,
author = "Herv\'{e} Schauer",
title = "La s\'{e}curit\'{e} sous {UNIX}",
institution = "CNES",
year = "1991",
}
@TechReport{Sch92,
author = "Herv\'{e} Schauer",
title = "La s\'{e}curit\'{e} des r\'{e}seaux {TCP}/{IP} sous
{UNIX}",
institution = "Herv\'{e} Schauer Consultant",
year = "1992",
}
@TechReport{Scs90a,
author = "{ Service Central de la S\'{e}curit\'{e} des
Syst\`{e}mes d'information } SCSSI",
title = "Crit\`{e}res d'\'{e}valuation de la s\'{e}curit\'{e}
des syst\`{e}mes informatiques ({ITSEC})",
institution = "SCSSI",
year = "1990",
}
@TechReport{Scs90b,
author = "{Service Central de la S\'{e}curit\'{e} des
Syst\`{e}mes d'information} {SCSSI}",
title = "Glossaire de la s\'{e}curit\'{e} des syst\`{e}mes
d'information",
institution = "SCSSI",
number = "CNTI/CN 27, N23",
month = "octobre",
year = "1990",
keyword = "glossary",
}
@Misc{Cec91,
author = "{ Commission of the European Communities }",
title = "Information Technology Security Evaluation Criteria
({ITSEC}), version 1.2",
month = jun,
year = "1991",
}
@TechReport{Scs92,
author = "{Service Central de la S\'{e}curit\'{e} des
Syst\`{e}mes d'information} {SCSSI}",
title = "{D}\'{e}veloppement de syst\`{e}mes d'information
s\'{e}curis\'{e}s ({DSIS})",
institution = "SCSSI",
month = "septembre",
year = "1992",
}
@TechReport{SD89,
author = "Bruno Struif and G. M. D Darmstadt",
title = "Concepts Applications Activities",
institution = "TELETRUST International Publication",
month = mar,
year = "1989",
}
@Misc{Sec91,
title = "Actes de {SECURICOM}'91",
howpublished = "SECURICOM",
year = "1991",
}
@Misc{SF89,
author = "J. E. Shimp and J. Filsinger",
title = "Implementation of a Capabilities Knowledge Base for
Data Integrity",
howpublished = "IEEE CH2674-5/89/0000-0283",
year = "1989",
}
@InProceedings{SG82,
author = "D. P. Sidhu and M. Gasser",
title = "A Multilevel Secure Local Area Network",
booktitle = "Proceedings of the IEEE Symposium on Security and
privacy",
year = "1982",
}
@InProceedings{SG90,
author = "S. W. Shieh and V. D. Gligor",
title = "Auditing the Use of Covert Storage Channels in Secure
Systems",
booktitle = "Proceedings of the IEEE Symposium on Research in
Security and Privacy, Oakland, CA",
month = may,
year = "1990",
}
@Article{SG91,
author = "S. W. Shieh and V. D. Gligor",
title = "A Pattern-Oriented Intrusion-Detection Model and its
Applications",
journal = "IEEE",
year = "1991",
}
@InProceedings{SG92,
author = "S. G. Stubblebine and V. D. Gligor",
title = "On Message Integrity in Cryptographic Protocols",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "85--104",
year = "1992",
}
@InProceedings{SG93,
author = "S. G. Stubblebine and V. D. Gligor",
title = "Protocol Design for Integrity Protection",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "41--55",
year = "1993",
}
@Article{Sha49,
author = "C. E. Shannon",
title = "Communication Theory of Secure Systems",
journal = "Bell System Technical Journal",
volume = "28",
year = "1949",
}
@Misc{Shi82,
author = "R. W. Shirey",
title = "Security in Local Area Networks",
howpublished = "IEEE CH1811-9/82/0000/0028\$00.75",
year = "1982",
}
@Misc{Shi89,
author = "R. W. Shirey",
title = "Security in Local Area Networks",
howpublished = "??",
year = "1989",
}
@Article{Sim89,
author = "G. J. Simmons",
title = "A Protocol to Provide Verifiable Proof of Identity and
Unforgeable transaction Receipts",
journal = "IEEE Journal on Selected Areas in Communications",
volume = "7",
number = "4",
month = may,
year = "1989",
}
@InProceedings{SJ92,
author = "Ravi S. Sandhu and Sushil Jajodia",
title = "Polyinstantiation for Cover Stories",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "307--328",
year = "1992",
}
@InProceedings{SK90,
author = "Z. Savic and M. Komocar",
title = "Security Kernel Design and Implementation in the {IBM}
{PC} Environment",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "61--70",
year = "1990",
}
@InProceedings{SM93,
author = "P. Syverson and C. Meadows",
title = "A Logical Language for Specifying Cryptographic
Protocol Requirements",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "165--177",
year = "1993",
}
@InProceedings{Sma88,
author = "S. E. Smaha",
title = "Haystack: An Intrusion Detection System",
booktitle = "Proceedings of the 4th Aerospace Computer Security
Application Conference",
pages = "37--44",
month = dec,
year = "1988",
}
@InProceedings{Sne92,
author = "E. Snekkenes",
title = "Roles in Cryptographic Protocols",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "105--121",
year = "1992",
}
@Article{Sny81,
author = "L. Snyder",
title = "Formal Models of Capability-Based Protection
Stystems",
journal = "IEEE trans. comput",
volume = "C30",
number = "3",
year = "1981",
}
@Book{Spi89,
author = "J. M. Spivey",
title = "The {Z} Notation : a reference Manual",
publisher = "C.A.R. Hoare Series Editor",
year = "1989",
}
@InProceedings{SS92,
author = "R. S. Sandhu and G. S. Suri",
title = "Non-Monotonic Transformation of Access Rights",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "148--163",
year = "1992",
}
@Misc{Ste??,
author = "Jacques Stern",
title = "La complexit\'{e} comme fondement de la cryptographie
moderne",
howpublished = "S\'{e}minaire : la cryptographie, fondements,
applications, perspectives",
year = "??",
}
@InProceedings{STH85,
author = "R. Schell and T. F. Tao and M. Heckman",
title = "Disingning the {GEMSOS} Security Kernel for Security
and Performance",
booktitle = "8th NCSC",
pages = "108--119",
year = "1985",
}
@Misc{Sto81,
author = "A. Stoughton",
title = "Acces Flow : {A} Protection Model Which Integrates
Access Control and Information Flow",
howpublished = "IEEE CH1629-5/81/0000/0009\$00.75",
year = "1981",
}
@Article{Sto88,
author = "C. Stoll",
title = "Stalking the wily hacker",
journal = "Communications of the ACM",
volume = "31",
number = "5",
pages = "484--97",
month = may,
year = "1988",
keywords = "hacking",
}
@TechReport{SUN90a,
author = "SUN Microsystems",
title = "{S}un{OS} {MLS} Programmer's Guide",
institution = "Sun : documentation technique",
month = jan,
year = "1990",
}
@TechReport{SUN90b,
author = "SUN Microsystems",
title = "{S}un{OS} {MLS} System administrator",
instituion = "SUN",
note = "Chapitre 17 : Auditing, Sun : documentation
technique",
month = jan,
year = "1990",
}
@InProceedings{Sut86,
author = "D. Sutherland",
title = "A Model of Information",
booktitle = "9th National Computer Security Conference.",
year = "1986",
}
@InProceedings{TA91,
author = "J. J. Tardo and K. Alagappan",
title = "{SPX} - Global Authentication Using Public-Key
Certificates",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
year = "1991",
}
@InProceedings{TCL90,
author = "H. S. Teng and K. Chen and S. C.-Y. Lu",
title = "Adaptive Real-Time Anomaly Detection using Inductively
Generated Sequential Patterns",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
month = may,
year = "1990",
}
@Article{TGC90,
author = "C. Tsai and V. D. Gligor and C. S. Chandersekaran",
title = "On the Identification of Covert Storage Channels in
Secure Systems",
journal = "IEEE Transactions on Software Engineering",
month = jun,
year = "1990",
}
@InProceedings{TH90,
author = "A. Tarah and C. Huitema",
title = "{CHIMAERA} : {A} Network Security Model",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "127--134",
year = "1990",
}
@InProceedings{TH92,
author = "Anas Tarah and Christian Huitema",
title = "Associating Metrics to Certification Paths",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "175--192",
year = "1992",
}
@Article{TI89,
author = "S. Tsujii and T. Itoh",
title = "An {ID}-Based Cryptosystem Based on the Discrete
Logarithm Problem",
journal = "IEEE Journal on Selected Areas in Communications",
volume = "7",
number = "4",
month = may,
year = "1989",
}
@InProceedings{TLBL90,
author = "B. Thomson and E. S. Lee and P. I. P. Boulton and D.
M. Lewis",
title = "Using Deducibility in Secure Network Modelling",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "117--124",
year = "1990",
}
@InProceedings{Tou92,
author = "Marie-Jeanne Toussaint",
title = "Separating the Specification and Implementation Phases
in Cryptology",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "77--102",
year = "1992",
}
@InProceedings{TR92,
author = "K. Tibourtine and P. Rolin",
title = "Distribution de cl\'{e}s pour s\'{e}curiser les
Communications des {RPC}",
booktitle = "Actes de la convention {UNIX} 92",
month = "mars",
year = "1992",
}
@Misc{Tribunix8-42-43,
title = "Tribunix, No 42 et 43",
howpublished = "AFUU",
year = "1992",
note = "contient article LM/VA sur audit AIX",
}
@InProceedings{Tro93,
author = "J. T. Trostle",
title = "Modelling a Fuzzy Time System",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "82--89",
year = "1993",
}
@InProceedings{TS90,
author = "Gene Tsudik and R. Summers",
title = "Aud{ES}: An Expert System for Security Auditing",
booktitle = "Proceedings of the AAAI Conference on Innovative
Application in Artificial Intelligence",
month = may,
year = "1990",
}
@TechReport{Tsu88,
author = "Gene Tsudik",
title = "An Expert System for Security Auditing",
institution = "IBM Los Angeles Scientific Software",
year = "1988",
}
@InProceedings{Tsu92,
author = "Gene Tsudik",
title = "Policy Enforcement in Stub Autonomous Domains",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "229--260",
year = "1992",
}
@InProceedings{TY90,
author = "LC. N. Tseung and K. C. Yu",
title = "Guaranteed, Reliable, Secure Broadcast Networks",
booktitle = "proceedings of the IEEE",
pages = "576--583",
year = "1990",
}
@Article{Var89,
author = "Vijay Varadharajan",
title = "Verification of Network Security Protocols",
journal = "Computers and Security",
volume = "8",
month = dec,
year = "1989",
}
@Article{Var90a,
author = "Vijay Varadharajan",
title = "Network Security Policy Models",
journal = "Lecture Notes in Computer Science",
volume = "453",
pages = "74--95",
year = "1990",
}
@Misc{Var90b,
author = "Vijay Varadharajan",
title = "Petri Net Based Modelling of Information Flow Security
Requirements",
howpublished = "IEEE Catalog Number 90TH0315-2",
year = "1990",
}
@InProceedings{Var90c,
author = "Vijay Varadharajan",
title = "A Petri Net Framework for Modelling Information Flow
Security Policies",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "125--126",
year = "1990",
}
@InProceedings{Vaz93,
author = "J. Vazquez-Gomez",
title = "Modelling Multidomain Security",
booktitle = "The New Security Paradigms Workshop II",
year = "1993",
}
@Article{VK83,
author = "V. L. Voydock and S. T. Kent",
title = "Security Mechanisms in High Level Network Protocols",
journal = "ACM Computing Surveys",
pages = "135--171",
month = jun,
year = "1983",
}
@Article{VK84,
author = "V. L. Voydock and S. T. Kent",
title = "Security Mechanisms in a Transport Layer Protocol",
journal = "Computer Networks",
volume = "8",
pages = "433--450",
year = "1984",
}
@Article{VK85,
author = "V. L. Voydock and S. T. Kent",
title = "Security in High Level Network Protocols",
journal = "IEEE Comm.",
pages = "12--24",
month = jul,
year = "1985",
}
@InProceedings{VL89,
author = "H. S. Vaccaro and G. E. Liepins",
title = "Detection of Anomalous Computer Session Activity",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
month = may,
year = "1989",
}
@InProceedings{Wal85,
author = "S. T. Walker",
title = "Network Security Overview",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "62--76",
year = "1985",
}
@TechReport{War70,
author = "W. H. Ware",
title = "Security Controls for Computer Systems",
booktitle = "Report on Defense Science Board Task Force on Compter
Security",
number = "R-609-1",
year = "1970",
}
@InProceedings{WB90,
author = "W. R. E. Weiss and A. Bauer",
title = "Analysis of Audit and protocol Data using Methods from
Artificial Intelligence",
booktitle = "Proceedings of the 13th National Computer Security
Conference",
month = oct,
year = "1990",
}
@Article{WC90,
author = "S. R. White and L. Comerford",
title = "{ABYSS}: An Architecture for Software Protection",
journal = "IEEE Trans. on Soft. Engineering",
volume = "16",
number = "6",
month = jun,
year = "1990",
}
@InProceedings{WD87,
author = "J. C. Williams and S G. W. Dinolt",
title = "A graph-theoretic formulation of multilevel secure
distributed systems: an overview",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "97--103",
year = "1987",
}
@InProceedings{Wei69,
author = "C. Weissman",
title = "Security controls in the {ADEPT} 50 time system",
booktitle = "AFIPS fall joint computer conference",
year = "1969",
}
@InProceedings{Wei92,
author = "C. Weissman",
title = "{BLACKER} : security for the {DDN}, Examples of {A1}
Security Engineering Trades",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "286--292",
year = "1992",
}
@Article{WFZ92,
author = "J. Wu and E. B. Fernandez and R. Zhang",
title = "Some Extensions to the Lattice Model for Computer
Security",
journal = "Computer and Security",
volume = "11",
year = "1992",
}
@InProceedings{WG92,
author = "Michael Wang and Andrzej Goscinski",
title = "The Development and Testing of the Identity-Based
Conference Key Distribution System for the {RHODOS}
Distributed System",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "209--228",
year = "1992",
}
@Article{Whi89,
author = "C. E. White",
title = "Viruses and worms: a campus under attack",
journal = "Computer and security",
volume = "8",
month = jun,
year = "1989",
keywords = "hacking",
}
@Article{Wing90,
author = "J. M. Wing",
title = "A Specifier's Introduction to Formal Methods",
journal = "IEEE Computer",
year = "1990",
}
@InProceedings{Win90,
author = "J. R. Winkler",
title = "A {UNIX} Prototype for Intrusion Detection and Anomaly
Detection in Secure Networks",
booktitle = "Proceedings of the 13th National Computer Security
Conference",
year = "1990",
}
@InProceedings{Win92,
author = "J. R. Winkler",
title = "Intrusion and Anomaly Detection; {ISOA} Update",
booktitle = "Proceedings of the 15th National Computer Security
Conference",
year = "1992",
}
@Article{Wit87,
author = "I. H. Witten",
title = "Computer (In)security : Infiltrating Open Systems",
journal = "Abacus",
address = "New York",
volume = "4",
number = "4",
pages = "7--25",
year = "1987",
keywords = "hacking",
}
@Article{WL92a,
author = "Y. C. Win and S. Lam",
title = "Authentication for Distributed Systems",
journal = "Computer",
month = jan,
year = "1992",
}
@InProceedings{WL92b,
author = "T. Y. C. Woo and S. S Lam",
title = "Authorization in Distributed Systems : {A} formal
Approach",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "33--51",
year = "1992",
}
@InProceedings{WL93,
author = "T. Y. C. Woo and S. S. Lam",
title = "A Semantic Model for Authentification Protocols",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "178--195",
year = "1993",
}
@Article{Wol89,
author = "M. Wolf",
title = "Covert Channels in {LAN} Protocols",
journal = "Lecture Notes in Computer Science, Local Area Network
Security",
volume = "396",
year = "1989",
}
@Article{Woo84,
author = "C. C. Wood",
title = "Countering Unauthorized Systems Accesses",
journal = "Journal of Systems Management",
month = apr,
year = "1984",
}
@TechReport{WQ??,
author = "D. de Waleffe and J. J. Quisquater",
title = "Better Login Protocols for Computer Networks",
institution = "IBM",
number = "LGE 08",
pages = "163",
year = "??",
}
@InProceedings{WQ90,
author = "D. de Waleffe and J. J. Quisquater",
title = "Better login protocol for computer networks",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "163--172",
year = "1990",
}
@Article{X90,
author = "{XXX article non sign\'{e} }",
title = "La s\'{e}curit\'{e} informatique et son livre orange",
journal = "G\'{e}nie Logiciel et Syst\`{e}mes Experts",
volume = "19",
month = "juin",
year = "1990",
}
@InProceedings{Yaz90,
author = "K. Yazdanian",
title = "Relational Database Granularity",
booktitle = "European Symposium on Research in Computer Security
(ESORICS)",
pages = "15--22",
year = "1990",
}
@Article{YG90,
author = "Ch. Yu and V. D. Gligor",
title = "A Specification and Verification Method for Preventing
Denial of Service",
journal = "IEEE Trans. on Soft. Engineering",
volume = "16",
number = "6",
month = jun,
year = "1990",
}
@InProceedings{YKB93,
author = "R. Yaholom and B. Klein and T. Beth",
title = "Trust Relationships in Secure Systems-{A} Distributed
Authentication Perspective",
booktitle = "Proceedings of the IEEE Symposium on Security and
Privacy",
pages = "150--164",
year = "1993",
}
@Article{You85,
author = "W. D. Young",
title = "Proving a Computer System Secure",
journal = "Scientific Honeyweller",
volume = "6",
number = "2",
month = jul,
year = "1985",
}
@Misc{Sal90,
author = "R. Salz",
title = "Computer Oracle Passwd System ({COPS})",
howpublished = "Newsgroup Article",
year = "1990",
}
@Article{AM92,
author = "Ludovic M\'e and Veronique Alanou",
title = "Une exp\'{e}rience d'audit de s\'{e}curit\'{e} sous
{AIX R}3.1",
journal = "TRIBUNIX",
page = "30-38",
volume = "8",
number = "43",
year = "1992",
}
@TechReport{MV91,
author = "Ludovic M\'e and Jos\'{e} Vazquez",
title = "La s\'{e}curit\'{e} des syst\`{e}mes informatiques :
\'{e}tude bibliographique",
institution = "SUP\'ELEC/LM",
number = "91-001",
year = "1991",
}
@PhdThesis{Deb93,
author = "Herv\'e Debar",
title = "Application des r\'eseaux de neurones \`a la
d\'etection d'intrusions sur les syst\`emes
informatiques",
school = "Universit\'e de Paris 6",
year = "1993",
}
@MastersThesis{Por92,
author = "Phillip Andrew Porras",
title = "A State Transition Analysis Tool For Intrusion
Detection",
school = "University of California, Santa Barbara",
year = "1992",
}
@InProceedings{SSHW88,
author = "M. M. Sebring and E. Shellhouse and M. E. Hanna and R.
A. Whitehurst",
title = "Expert System in Intrusion Detection: {A} Case Study",
booktitle = "Proceedings of the 11th National Computer Security
Conference",
pages = "74--81",
year = "1988",
}
@TechReport{MP94,
author = "Manel Medina and Enric Peig",
title = "Survey of Security Related Application Areas and
Objects",
institution = "Universitat Polit\`{e}cnica de Catalunya",
year = "1994",
}
@TechReport{JV94a,
author = "Harold S. Javitz and Alfonso Valdes",
title = "The {NIDES} Statistical Component Description and
Justification",
institution = "SRI",
number = "A010",
year = "1994",
}
@TechReport{JV94b,
author = "Debra Anderson and Teresa Lunt and Harold Javitz and
Ann Tamaru and Alfonso Valdes",
title = "Safeguard Final Report: Detecting Unusual program
Behavior Using the {NIDES} Statistical Component",
institution = "SRI",
year = "1994",
}
@TechReport{BB93,
author = "Jean-Pierre Ban\^{a}tre and Ciar\'{a}n Bryce",
title = "A Security Proof System for Netwoks of Communicating
Processes",
institution = "IRISA",
number = "744",
month = "juin",
year = "1993",
}
@Unpublished{HA93,
author = "Stephen E. Hansen and E. Todd Atkins",
title = "Centralized System Monitoring With Swatch",
note = "Stanford University",
year = "1993",
}
@Unpublished{Ben92b,
author = "Marc Benveniste",
title = "Mod\`{e}le formel de s\'{e}curit\'{e}",
note = "Document AQL",
month = "novembre",
year = "1993",
}
@Unpublished{Nee92,
author = "R. M. Needham",
title = "Reasoning about Cryptographic Protocols",
note = "Document distribu\'{e} lors de ESORICS'92",
year = "1992",
}
@InProceedings{Wie92,
author = "Michael J. Wiener",
title = "Efficient {DES} Key Search",
booktitle = "Crypto'92",
year = "1992",
}
@Proceedings{NSPW92,
institution = "ACM SIGSAC",
title = "New Security Paradigms Workshop",
editor = "IEEE Computer Society Press",
year = "1992",
}
@Proceedings{NSPW93,
institution = "ACM SIGSAC",
title = "New Security Paradigms Workshop",
editor = "IEEE Computer Society Press",
year = "1993",
}
@TechReport{CGLP92,
author = "B. Courtois and M. C. Gaudel and J. C. Laprie and D.
Powell",
title = "{S}\^{u}ret\'{e} de fonctionnement informatique",
institution = "LAAS",
number = "92.382",
month = "d\'{e}cembre",
year = "1992",
}
@PhdThesis{Me94,
author = "Ludovic M\'{e}",
title = "Audit de s\'{e}curit\'{e} par algorithmes
g\'{e}n\'{e}tiques",
school = "Universit\'{e} de Rennes 1 - Num\'{e}ro d'ordre 1069",
year = "1994",
}
@InProceedings{Lun90,
author = "Teresa Lunt",
title = "{IDES}: An intelligent System for Detecting
Intruders",
booktitle = "Computer Security, Threats and Countermeasures",
month = nov,
year = "1990",
}
@TechReport{Fal.90,
author = "Kevin L. Fox and Ronda R. Henning and Jonathan H. Reed
and Richard P. Simonian",
title = "A Neural Network Approach Towards Intrusion
Detection",
institution = "Harris Corporation",
year = "1990",
}
@Article{GS92b,
author = "C. R Gent and C. P Sheppard",
title = "Predicting Time Series by a Fully Connected Neural
Network Trained by Back Propagation",
journal = "Computing and Control Engineering Journal",
month = may,
year = "1992",
}
@Article{MS95,
author = "David M'Raihi and Bruce Schneider",
title = "Taxonomie des algorithmes cryptographiques",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "11--34",
year = "1995",
}
@Article{Cat95,
author = "Andr\'{e} Cattieuw",
title = "Notion de preuve sans transfert de connaissance",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "35--42",
year = "1995",
}
@Article{Lep95,
author = "Marie-Noelle Lepareux",
title = "Introduction aux protocoles z\'{e}ro-connaissance",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "43--52",
year = "1995",
}
@Article{Har95,
author = "Thierry Harl\'{e}",
title = "Pas de syst\`{e}me cryptographique sans gestion de
cl\'{e}s",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "53--60",
year = "1995",
}
@Article{Rou95,
author = "Yves Le Roux",
title = "{L}'affaire Clipper, les d\'{e}bats sur le chiffrement
aux Etats-Unis",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "61--66",
year = "1995",
}
@Article{GUQ95,
author = "Louis Guillou and Michel Ugon and Jean-Jacques
Quisquater",
title = "La carte \`{a} puce, un usage public de la
cryptologie",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "67--88",
year = "1995",
}
@Article{GT95,
author = "Jean-Pierre Georges and Roland Thies",
title = "Les services d'authentification et de s\'{e}curit\'{e}
dans le {GSM}",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "89--102",
year = "1995",
}
@Article{Buf95,
author = "Thierry Buffenoir",
title = "Fonctions de s\'{e}curit\'{e} pour la
t\'{e}l\'{e}copie",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "103--110",
year = "1995",
}
@Article{Heb95a,
author = "Patrick H\'{e}brard",
title = "{X509}, un cadre g\'{e}n\'{e}ral d'authentification",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "111--124",
year = "1995",
keywords = "authentication X509",
}
@Article{Fra95a,
author = "Henri Francesconi",
title = "{L}'\'{e}coute des signaux parasites",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "125--128",
year = "1995",
}
@Article{Fra95b,
author = "Henri Francesconi",
title = "La r\'{e}glementation fran\c{c}aise sur la
cryptologie",
journal = "Syst\`{e}mes et s\'{e}curit\'{e}",
pages = "129--136",
year = "1995",
}
@InProceedings{Heb95b,
author = "Patrick H\'{e}brard",
title = "{S}\'{e}curit\'{e} dans les couches basses de
l'{OSI}",
pages = "111--129",
year = "1995",
booktitle = "Colloque Francophone sur l'Ing\'{e}nierie des
Protocoles",
address = "Rennes, France",
month = may,
}
@InProceedings{BG95,
author = "Christophe Bidan and Sylvain Gombault",
title = "La s\'{e}curit\'{e} inter-domaine \`{a} l'aide des
analyseurs de s\'{e}curit\'{e}",
pages = "131--142",
year = "1995",
booktitle = "Colloque Francophone sur l'Ing\'{e}nierie des
Protocoles",
address = "Rennes, France",
month = may,
}
@TechReport{JV94,
author = "Abdelaziz Mounji and Baudouin Le Charlier and Denis
Zampunieris and Naji Habra",
title = "Distributed Audit trail Analysis",
institution = "Facult\'{e} Universitaire Notre-Dame de la Paix",
number = "RP-94-007",
year = "1994",
}
@Misc{SGDN90,
author = "{Secr\'{e}tariat G\'{e}n\'{e}ral de la D\'{e}fense
Nationale}",
title = "Protection des informations sensibles ne relevant pas
du secret de d\'{e}fense",
howpublished = "document commun SGDN/DISSI/SCSSI Num\'{e}ro 600",
month = "janvier",
year = "1990",
}
@Misc{SCSSI94,
author = "{Service Central de la S\'{e}curit\'{e} des
Syst\`{e}mes Informatiques}",
title = "La menace et les attaques informatiques",
howpublished = "document commun DISSI/SCSSI Num\'{e}ro 650",
month = "mars",
year = "1994",
}
@InProceedings{Kah95,
author = "Jos\'{e} Kahan",
title = "A Capability-Based Authorization Model for the {WWW}",
year = "1995",
booktitle = "WWW'95 Conference",
address = "Darmstadt, Germany",
month = avril,
}
@InProceedings{Kah94,
author = "Jos\'{e} Kahan",
title = "Un nouveau mod\'{e}le d'autorisation pour les
syst\`{e}mes de consultation d'information
multim\'{e}dia r\'{e}partie",
year = "1995",
booktitle = "Colloque AFCET : o\`{u}, quand, comment prot\'{e}ger
vos logiciels et documents \'{e}lectroniques",
address = "Paris, France",
year = "1994",
month = "d\'{e}cembre",
}
@Article{DGKS94,
author = "Michel Denault and Dimitris Gritzalis and Dimitris
Karagiannis and Paul Spirakis",
title = "Intrusion Detection: Approach and Performance Issues
of the {SECURENET} System",
journal = "Computers and Security",
volume = "13",
pages = "495--508",
year = "1994",
}
@Misc{Mei93,
author = "Eric Meillan",
title = "Droit de la s\'{e}curit\'{e} des syst\`{e}mes
d'information",
howpublished = "cours fait \`{a} l'ENSTB",
year = "1993",
}
@Misc{FL92,
author = "Michael Fiey and Xavier Lacassin",
title = "Les algorithmes cryptographiques",
howpublished = "Annexe B, rapport de stage de fin d'\'{e}tude
Sup\'{e}lec, Bull Ing\'{e}nierie",
month = "juin",
year = "1992",
}
@Misc{charte,
title = "Charte d'utilisation des moyens informatiques",
}
@Misc{Ham95,
author = "Riadh Hamdi",
title = "{S}\'{e}curit\'{e} et Internet",
howpublished = "Rapport de stage de fin d'\'{e}tudes Sup\'{e}lec \`{a}
Transpac",
month = "juin",
year = "1995",
}
@Misc{Gai95,
author = "Nicolas Gaillotte",
title = "Audit de s\'{e}curit\'{e} sur un {SAS} internet",
howpublished = "Rapport de stage de fin d'\'{e}tudes ENSTB \`{a} IBM",
month = "juin",
year = "1995",
}
@TechReport{IBM94,
title = "Secured Network Gateway Version 1.2: Installation,
Configuration and Administration Guide",
organization = "IBM",
edition = "first",
year = "1994",
month = dec,
}
@InProceedings{SSH93,
author = "David R. Safford and Douglas Lee Schales and David K.
Hess",
title = "The {TAMU} Security Package: an Ongoing response to
the Internet Intruders in an Academic Environment",
booktitle = "Proceedings of the Fourth USENIX Security Symposium",
year = "1993",
}
@Misc{Muf92,
author = "Alec D. E. Muffett",
title = "Crack: {A} Sensible Password Checker for Unix",
howpublished = "from
ftp:corton.inria.fr/CERT/tools/crack/crack4.1.tar",
month = mar,
year = "1992",
}
@PhdThesis{Kum95,
author = "Sandeep Kumar",
title = "Classification and Detection of Computer Intrusions",
school = "Purdue University",
year = "1995",
month = aug,
}
@TechReport{KS94,
author = "Sandeep Kumar and Eugene H. Spafford",
title = "An Application of pattern Matching in Intrusion
Detection",
institution = "Purdue University",
year = "1994",
number = "CSD-TR-94-013",
month = jun,
}
@Masterthesis{Asl95,
author = "Taimur Aslam",
title = "A taxonomy of Security Faults in the Unix Operating
System",
school = "Purdue University",
year = "1995",
month = aug,
}
@TechReport{CB94,
author = "Mark Crosbie and Gene Spafford",
title = "Defending a Computer System using Autonomous Agents",
institution = "Purdue University",
year = "1994",
number = "95-022",
month = mar,
url = "http://www.cs.purdue.edu/homes/spaf/tech-reps/9522.ps",
}
@TechReport{CB95,
author = "Mark Crosbie and Gene Spafford",
title = "Active Defense of a Computer System using Autonomous
Agents",
institution = "Purdue University",
year = "1995",
number = "95-008",
month = feb,
url = "http://www.cs.purdue.edu/homes/spaf/tech-reps/9508.ps",
}
@TechReport{Fra94,
author = "Jeremy Frank",
title = "Artificial Intelligence and Intrusion Detection:
Current and Future Directions",
institution = "University of California at Davis",
year = "1994",
number = "NSA URP MDA904-93-C-4085",
month = jun,
}
@Misc{Spa94,
author = "Eugene Spafford",
title = "Computer Viruses as Artificial Life",
howpublished = "to appear in the Journal of Artificial Life",
year = "1994",
}
@Manual{Zim94,
title = "({PGP}) Pretty Good Privacy Encryption System: Users'
Guide",
author = "Philip Zimmermann",
year = "1994",
month = aug,
}
@Misc{Rou89,
author = "B. Roulin",
title = "Sp\'{e}cification de d\'{e}finition d'un {UNIX}
s\'{e}curis\'{e}",
howpublished = "document technique AQL",
month = "juin",
year = "1989",
}
@Article{MA96,
author = "Ludovic M\'{e} and V\'{e}ronique Alanou",
title = "{D}\'{e}tection d'intrusions dans un syst\`{e}me
informatique~: m\'{e}thodes et outils",
journal = "TSI",
volume = "15",
number = "4",
pages = "429--450",
year = "1996",
}
@Misc{Tal96,
author = "Fran\c{c}ois Tallet",
title = "Les firewalls",
howpublished = "M\'{e}moire MEARI",
year = "1996",
}
@Misc{Lig95,
author = "Eric Ligaon",
title = "Introduction \`{a} la s\'{e}curit\'{e} sous Solaris",
howpublished = "S\'{e}minaire s\'{e}curit\'{e} SUN",
year = "1995",
}
@Misc{BR96,
author = "Jean-Jacques Bascou and Jer\^{o}me Romeu",
title = "{D}\'{e}tection dynamique d'intrusions : une approche
par r\'{e}seau de neurones",
howpublished = "soumis pour publication \`{a} CFIP'96",
}
@Misc{RR96,
author = "Patrick Ragaru and Roberto Ramos",
title = "{S}\'{e}curisation d'architecture client-serveur",
howpublished = "rapport de projet \'{e}tudiant de l'ENSTB",
month = "f\'{e}vrier",
year = "1996",
keywords = "authentication kerberos DCE sesame",
}
@Misc{LR96,
author = "S\'{e}bastien Letard and Herv\'{e} racine",
title = "Mise en place d'un firewall {IP} sur un site
universitaire",
howpublished = "rapport de projet \'{e}tudiant de l'ENSTB",
month = "f\'{e}vrier",
year = "1996",
}
@Misc{Sun96,
author = "Sun",
title = "La s\'{e}curit\'{e} sur Internet",
howpublished = "Documents remis lors du s\'{e}minaire du 26 mars 1996
\`{a} Rennes",
month = "mars",
year = "1996",
}
@Misc{NM95,
author = "David Newmann and Brent Melson",
title = "Can Firewall Take the Heat ?",
howpublished = "Data Communication on the web",
month = nov,
year = "1995",
}
@Misc{Che91,
author = "Bill Cheswick",
title = "An Evening with Berferd In Which a Cracker is Lured,
Endured, and Studied",
howpublished = "ATT Bell Laboratories",
year = "1991",
}
@PhdThesis{Sam96,
author = "Didier Samfat",
title = "Architecture de s\'{e}curit\'{e} pour r\'{e}seaux
mobiles",
school = "Ecole Nationale des T\'{e}l\'{e}communications de
Paris",
year = "1996",
}
@Misc{Gui95,
author = "Louis Guillou",
title = "Comprehensive Approach of Zero-Knowledge Techniques",
howpublished = "ISO/IEC JTC 1/SC 27 N 1185",
month = oct,
year = "1995",
}
@Misc{Jou96,
author = "Manuella Jourdan",
title = "{ITSEC}/{ITSEM}",
howpublished = "M\'{e}moire M\'{e}ari 1995/96",
year = "1996",
}
@Misc{Me96a,
author = "Ludovic M\'{e}",
title = "Genetic Algorithms, a Biologically Inspired Approach
for Security Audit Trails Analysis",
howpublished = "Short paper, 1996 IEEE Symposium on Security and
Privacy",
month = may,
year = "1996",
}
@Article{MAA97,
author = "Ludovic M\'{e} and V\'{e}ronique Alanou and Jorg
Abraham",
title = "Utilisation de cartes de Kohonen pour d\'{e}tecter des
intrusions dans un syst\`{e}me informatique : une
pr\'{e}-\'{e}tude",
journal = "Valgo",
year = "1997",
}
@InProceedings{Me96b,
author = "Ludovic M\'{e}",
title = "{M}\'{e}thodes et outils de la d\'{e}tection
d'intrusions",
booktitle = "Actes du congr\`{e}s Intelligence Economique et
Comp\'{e}titive (IEC)",
year = "1996",
}
@TechReport{Bis95,
author = "Matt Bishop",
title = "A standard audit trail format",
institution = "Department of Computer Science, University of
California at Davis",
year = "1995",
}
@TechReport{CD94,
author = "George Coulouris and Jean Dallimore",
title = "A Security Model for Cooperative Work",
institution = "Queen Mary and Westfield College, Department of
Computer Science",
year = "1994",
number = "674",
month = oct,
}
@Misc{Abr95,
author = "Jorg Abraham",
title = "Etude de l'utilisation de r\'{e}seaux de neurones de
type carte de Kohonen pour la d\'{e}tection
d'intrusions dans un syst\`{e}me informatique",
howpublished = "Rappport de stage",
month = "mars",
year = "1995",
}
@InProceedings{Pro94,
author = "Paul Proctor",
title = "Audit Reduction and Misuse Detection in Heterogeneous
Environments: Framework and Application",
booktitle = "Proceedings of the 10th Annual Computer Security
Applications",
year = "1994",
month = dec,
}
@Misc{Hay96,
author = "Haystack Labs",
title = "Stalker Product Overview",
howpublished = "Document html~: \verb|http://www.haystack.com/prod/|",
year = "1996",
}
@Misc{Sai96,
author = "Science Applications International Corporation",
title = "{CMDS}: Product Description",
howpublished = "Document html~:
\verb|http://www.saic.com:80/it/cmds|",
year = "1996",
}
@Misc{Semper96,
author = "Semper European Project",
title = "Secure Electonic Marketplace for Europe",
howpublished = "Document html~: \verb|http://www.semper.org|",
year = "1996",
keywords = "commerce electronique",
}
@Misc{Jon95,
author = "Laurent Joncheray",
title = "A Simple Active Attack Against {TCP}",
month = apr,
year = "1995",
}
@Misc{CGZ96,
author = "Mireille Campana and Marc Girault and Gilles
Z\'{e}mor",
title = "Techniques de s\'{e}curit\'{e} appliqu\'{e}es au
courrier \'{e}lectronique et \`{a} Internet",
howpublished = "France T\'{e}l\'{e}com, Conseil scientifique,
M\'{e}mento technique No~7",
month = "juin",
year = "1996",
}
@Misc{IETF,
author = "IETF",
title = "Information Technology Security",
howpublished = "RFC1244",
}
@Article{Gui91,
author = "Daniel Guinier",
title = "Computer Virus Identification by Neural Networks",
journal = "ACM SIGSAC Review",
year = "1991",
volume = "9",
number = "4",
pages = "49--59",
}
@InProceedings{Chr96,
author = "Abdellatif Chraibi",
title = "{V}\'{e}rification des protocoles cryptographiques de
signature",
booktitle = "Actes du congr\`{e}s CFIP'96",
year = "1996",
}
@InProceedings{SRK96,
author = "Michael Sobirey and Birk Richter and Hartmut Konig",
title = "The Intrusion Detection System {AID}",
booktitle = "Proceeding of the Joint Working Conference IFIP TC-6
and TC-11: Communication and Multimedia Security",
year = "1996",
}
@Misc{Sun95,
author = "Sun Microsystems",
title = "The HotJava Browser~: a White Paper",
howpublished = "Document publi\'{e} par Sun",
year = "1995",
}
@TechReport{Cur90,
author = "David A. Curry",
title = "Improving the Security of Your Unix System",
institution = "SRI",
year = "1990",
number = "ITSTD-721-FR-90-21",
month = apr,
}
@Article{Rei95,
author = "Jim Reid",
title = "Open Systems Security: Traps and Pitfalls",
journal = "Computers & Security",
year = "1995",
number = "14",
pages = "496--517",
}
@TechReport{Gal87,
author = "Patrick R. Gallagher",
title = "A Guide to Understandinf Audit in Trusted Systems",
institution = "NCSC",
year = "1987",
number = "NCSC-TG-001",
month = jul,
}
@Misc{McM91,
author = "Rob McMillan",
title = "Site Security Policy Development",
howpublished = "Security Emergency Response Team, Australia",
year = "1991",
}
@Misc{Vou96,
author = "Fabien Vouillon",
title = "Etude des approches neuronales utilis\'{e}es en
d\'{e}tection d'intrusions",
howpublished = "M\'{e}moire M\'{e}ari, Sup\'{e}lec",
month = "mars",
year = "1996",
}
@Misc{HSPxx,
author = "David K. Hess and David R. Safford and Udo W. Pooch",
title = "A Unix Network Protocol Security Study: Network
Information Service",
howpublished = "?",
month = "?",
year = "?",
}
@Misc{Seexx,
author = "Donn Seeley",
title = "A Tour of the Worm",
howpublished = "?",
month = "?",
year = "?",
}
@Misc{Venxx,
author = "Wietse Venema",
title = "{TCP} Wrapper",
howpublished = "?",
month = "?",
year = "?",
}
@Article{Sch89,
author = "Herv\'{e} Schauer",
title = "La comptabilit\'{e} {UNIX} System {V}",
journal = "Tribunix",
year = "1989",
volume = "26",
}
@Misc{Bry88,
author = "Bill Bryant",
title = "Designing an Authentication System: a Dialogue in Four
Scenes",
howpublished = "draft, Athena Project",
month = feb,
year = "1988",
keywords = "authentication kerberos",
}
@Article{Hig90,
author = "H. J. Highland",
title = "Using and Breaking Encryption",
journal = "Computers and Security",
year = "1990",
volume = "9",
number = "8",
pages = "668--671",
keywords = "encryption emigma",
}
@InBook{Lan83,
author = "Bill Landreth",
title = "Histoire du piratage informatique",
chapter = "2",
pages = "27--35",
publisher = "\'{e}diteur non connu",
year = "1983",
}
@Misc{Dat91a,
author = "Datapro Research Group",
title = "Unix System Administration and Security",
howpublished = "Datapro report",
month = jan,
year = "1991",
}
@Misc{Dat91b,
author = "Datapro Research Group",
title = "Computer Crime Methods and Detection",
howpublished = "Datapro report",
month = feb,
year = "1991",
keywords = "hacking",
}
@Article{DMC92,
author = "R. Dixon and C. Marston and P. Collier",
title = "A Report on the Joint {CIMA} and {IIA} Computer Fraud
Survey",
journal = "Computers and Security",
year = "1992",
volume = "11",
pages = "307--313",
keywords = "hacking",
}
@Article{Hig89,
author = "H. J. Highland",
title = "A Macro Virus",
journal = "Computers and Security",
year = "1989",
volume = "8",
number = "3",
pages = "178--188",
}
@Misc{Rol92,
author = "Pierre Rolin",
title = "{S}\'{e}curit\'{e} des r\'{e}seaux",
howpublished = "unpublished draft",
month = "octobre",
year = "1992",
keywords = "authentication X509 kerberos chimerae",
}
@Article{GS91,
author = "Simson Garfinkel and Gene Spafford",
title = "Practical {UNIX} Security",
journal = "SunExpert",
year = "1991",
pages = "68--73",
}
@Proceedings{Franconia90,
institution = "IEEE",
title = "Proceedings of the Computer Security Foundations
Worshop {III}",
editor = "IEEE Computer Society Press",
year = "1990",
}
@Proceedings{oakland96,
institution = "IEEE",
title = "Proceedings of the 1996 {IEEE} Symposium on Security
and Privacy",
editor = "IEEE Computer Society Press",
year = "1996",
}
@PhdThesis{Alt92,
author = "Anas Altarah",
title = "Chimaera~: un mod\`{e}le pour la s\'{e}curit\'{e} des
syst\`{e}mes ouverts",
school = "Universit\'{e} de Nice Sophia-Antipolis",
year = "1992",
month = "d\'{e}cembre",
keywords = "authentication chimaera",
}
@Proceedings{NCSC16,
institution = "NIST-NCSC",
title = "Proceedings of the 16th National Computer Security
Conference",
editor = "?",
year = "1993",
}
@Proceedings{oakland94,
institution = "IEEE",
title = "Proceedings of the 1996 {IEEE} Symposium on Security
and Privacy",
editor = "IEEE Computer Society Press",
year = "1994",
}
@Proceedings{safecomp93,
institution = "EWICS",
title = "Proceedings of the 12th International Conference on
Computer Safety, Reliability and Security",
editor = "Springer-Verlag",
year = "1993",
}
@PhdThesis{Vaz94,
author = "Jos\'{e} V\'{a}zquez G\'{o}mez",
title = "Contribution \`{a} la mod\'{e}lisation de la
s\'{e}curit\'{e} multidomaine",
school = "Universit\'{e} de Rennes 1",
year = "1994",
}
@Misc{Mie92,
author = "St\'{e}phane Mi\`{e}ge",
title = "Codage et s\'{e}curit\'{e} des donn\'{e}es",
howpublished = "Polycopi\'{e} Sup\'{e}lec No 3943",
year = "1992",
}
@Misc{Cho90,
author = "Pascal Chour",
title = "Cartes \`{a} micro-circuit",
howpublished = "Polycopi\'{e} Sup\'{e}lec No 3813",
year = "1990",
}
@Misc{Ren94,
author = "Herv\'{e} renaud",
title = "Bases math\'{e}matiques du codage et de la
s\'{e}curit\'{e}",
howpublished = "Polycopi\'{e} Sup\'{e}lec No",
year = "1994",
}
@Proceedings{IEC96,
institution = "SCIP France and GBDA Europe and OSS Inc.",
title = "Intelligence \'{e}conomique et comp\'{e}titive",
editor = "sIECa",
year = "1996",
}
@InProceedings{Me96c,
author = "Ludovic M\'{e}",
title = "{M}\'{e}thodes et outils de la d\'{e}tection
d'intrusions",
booktitle = "Actes du congr\`{e}s Intelligence \'{e}conomique et
comp\'{e}titive",
year = "1996",
pages = "112--126",
month = "novembre",
}
@PhdThesis{Kar91,
author = "Arto T. Karila",
title = "Open Systems Security: An Architectural Framework",
school = "Helsinki University of Technology",
year = "1991",
}
@Misc{TSI15-4,
title = "Technique et science informatique, Vol.15, No 4",
howpublished = "Hermes",
year = "1996",
note = "Contient papier LM/VA sur la d\'{e}tection
d'intrusions",
}
@Misc{RIR4-1,
author = "No 1 {R\'{e}seaux et informatique r\'{e}partie, Vol.
4}",
howpublished = "Hermes",
year = "1994",
note = "Contient papier LM/JVG/PR sur les modeles",
}
@Misc{JCS1-1,
author = "No 1 {Journal of Computer Security, Vol. 1}",
howpublished = "IOS Press",
year = "1992",
}
@Misc{CetDS1-2,
title = "Computer and Data Security, Vol. 1, No 2",
howpublished = "Research Information Ltd",
}
@Misc{CetS9-1,
title = "Computers and Security",
howpublished = "Elsevier Advanced Technology",
month = feb,
year = "1990",
}
@Proceedings{,
institution = "CEN/CENELEC",
title = "Security Aspects in {OSI} Functional Standards",
editor = "?",
year = "1989",
}
@Misc{Dac89,
author = "Marc Dacier",
title = "La s\'{e}curit\'{e} logique en informatique~:
application aux r\'{e}seaux locaux",
howpublished = "M\'{e}moire pr\'{e}sent\'{e} en vue de l'obtention du
grade d'ing\'{e}nieur civil en informatique",
year = "1989",
}
@Article{Den96,
author = "Dorothy E. Denning",
title = "A Taxonomy for Key Escrow Encryption Systems",
journal = "Communication of the ACM",
year = "1996",
volume = "39",
number = "3",
month = mar,
keywords = "tiers de confiance key escrowing",
}
@TechReport{JMW96,
author = "d Chris Mitchell Nigel Jefferies a and Michael
Walker",
title = "Combining {TTP}-based key management with key escrow",
institution = "Information Security Group, Royal Holloway, University
of London",
year = "1996",
month = apr,
keywords = "tiers de confiance key escrowing",
}
@PhdThesis{Ko96,
author = "Calvin C. W. Ko",
title = "Execution Monitoring of Security-Critical Programs in
Distributed Systems: {A} Specification-based Approach",
school = "University of California at Davis",
year = "1996",
}
@Misc{Sob96a,
author = "Michael Sobirey",
title = "Michael Sobirey's Intrusion Detection Page",
howpublished = "http://www.informatik.tu-cottbus.de/~sobirey/ids.html",
year = "1996",
keywords = "intrusion detection",
}
@Misc{Sob96b,
author = "Michael Sobirey",
title = "The Intrusion Detection System {AID}",
howpublished = "http://www.informatik.tu-cottbus.de/~sobirey/aid-e.html",
year = "1996",
keywords = "intrusion detection",
}
@InProceedings{GM96,
author = "Richard A. Griffith and Mac E. McGregor",
title = "Designing and Operating a Multilevel Security Network
Using Standard Commercial Products",
booktitle = "Proceedings of the 19th National Information Systems
Security Conference",
year = "1996",
month = oct,
url = "from
http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/readers-guide/NISSC96-paperlist.html",
keywords = "Multilevel Security Network",
}
@TechReport{Ber93,
author = "Aviv Bergman",
title = "Intrusion Detection with Neural Networks",
institution = "SRI International",
year = "1993",
number = "A012",
month = feb,
}
@Misc{Hub96,
author = "Markus Hubner",
title = "{IP} Spoofing Demystified",
howpublished = "Web doc",
month = jun,
year = "1996",
url = "http://www.geocities.com/CapeCanaveral/3498/security.htm",
}
@InProceedings{ML97,
author = "Abdelaziz Mounji and Baudouin Le Charlier",
title = "Continuous Assesment of a Unix Configuration:
Integrating Intrusion Detection and Configuration
Analysis",
booktitle = "Proceedings of the IEEE ISOC'97 Symposium on Network
and Distributed Systems Security",
year = "1997",
url = "http://www.info.fundp.ac.be/~amo/publication.html",
keywords = "intrusion detection, ASAX",
}
@Misc{CC96,
title = "Common Criteria for {IT} Security Evaluation",
howpublished = "CD-ROM",
month = jan,
year = "1996",
}
@Article{Jef96,
author = "Terry L. Jeffress",
title = "The Auditcon Utility",
journal = "NetWare Connection",
year = "1996",
pages = "32--42",
month = dec,
}
@PhdThesis{Lau97,
author = "Maryline Laurent",
title = "Protection des communications sur les r\'{e}seaux
{ATM}",
school = "Universit\'{e} de Rennes 1",
year = "1997",
month = "juillet",
}
@Misc{AD97,
author = "Theodore K. Apostolopoulos and Victoria C. Daskalou",
title = "The Role of the Time Parameter in a Network Security
Management Model",
howpublished = "submitted to the IEEE Symposium on Computer
Communication",
year = "1997",
note = "reviewed by L.M\'{e}",
}
@Misc{EHA97,
author = "Mahmoud T. El-Hadidi and Nadia H. Hegazi and Heba K.
Aslan",
title = "Performance Analysis of the Kerberos Protocol in a
Distributed Environment",
howpublished = "submitted to the IEEE Symposium on Computer
Communication",
year = "1997",
note = "reviewed by L.M\'{e}",
}
@Misc{AMG97,
author = "M. Abdalla and M. Mahmoud and A. Goneid",
title = "Secured Communication System with Neural Network
Encoder",
howpublished = "submitted to the IEEE Symposium on Computer
Communication",
year = "1997",
note = "reviewed by L.M\'{e}",
}
@TechReport{Honeywell72,
author = "Honeywell",
title = "Multics",
institution = "Honeywell",
year = "1972",
}
@TechReport{Fal.96,
author = "Edward W. Felten and Dirk Balfanz and Drew Dean and
Dan S. Wallach",
title = "Web Spoofing: An Internet Con Game",
institution = "Princeton University",
year = "1996",
number = "540-96",
}
@Article{SH96,
author = "Michael Shoffner and Merlin Hughes",
title = "Java and Web-Executable Object Security",
journal = "Dr. Dobb's Journal",
year = "1996",
month = nov,
url = "http://www.ddj.com/ddj/1996/1996.11/shof.htm",
}
@InProceedings{DFH96,
author = "Patrick D'Haeseleer and Stephanie Forrest and Paul
Helman",
title = "An Immunological Approach to Change Detection:
Algorithms, Analysis and Implications",
booktitle = "Proceedings of the 1996 IEEE Symposium on Security and
Privacy",
year = "1996",
pages = "110--119",
month = may,
url = "http://www.cs.unm.edu/~forrest/ieee-sp-neg-select.ps.gz",
}
@InProceedings{FL96,
author = "Stephanie Forrest and Thomas Longstaff",
title = "A Sense of Self for Unix Processes",
booktitle = "Proceedings of the 1996 IEEE Symposium on Security and
Privacy",
year = "1996",
pages = "120--128",
month = may,
}
@Misc{FSA97,
author = "Stephanie Forrest and Anil Somayaji and David H.
Ackley",
title = "Building Diverse Computer Systems",
howpublished = "Submitted to the Sixth Workshop on Hot Topics in
Operating Systems",
year = "1997",
url = "http://www.cs.unm.edu/~forrest/hotos.ps",
}
@Misc{DF96,
author = "Dipankar Dasgupta and Stephanie Forrest",
title = "Novelty Detection in Time Series Data Using Ideas from
Immunology",
howpublished = "Web doc",
year = "1996",
url = "http://www.cs.unm.edu/~forrest/noveltydetection96.ps",
}
@Misc{FHS96,
author = "Stephanie Forrest",
title = "Computer Immunology",
howpublished = "Submitted to Communications of the ACM",
month = dec,
year = "1996",
url = "http://www.cs.unm.edu/~forrest/cacm.ps",
}
@Misc{Bob97,
author = "Gildas Bobon",
title = "Le march\'{e} de la s\'{e}curit\'{e}",
howpublished = "Mémoire M\'{e}ari",
month = "mars",
year = "1997",
}
@Misc{Ber97,
author = "Hughes Bertrand",
title = "Intrusion Detection System",
howpublished = "Mémoire M\'{e}ari",
month = "mars",
year = "1997",
}
@Misc{GD97,
author = "Adriana Gorunescu and Cosmin Dimitriu",
title = "Analyse d'audit",
howpublished = "Mémoire Miniprojet ENSTB",
month = "mars",
year = "1997",
keywords = "data mining",
}
@TechReport{GK95,
author = "Sokratis Katsikas and Dimitris Gritzalis",
title = "University Programmes on Information Security,
Dependability and Safety",
institution = "Erasmus",
year = "1995",
number = "ICP-94(95)-G-4016/11:IS-CD-3c",
month = jul,
}
@Article{Bel89,
author = "S. M. Bellovin",
title = "Security Problems in the {TCP}/{IP} Protocol Suite",
journal = "Computer Communication Review",
year = "1989",
volume = "19",
number = "2",
pages = "32--48",
month = apr,
}
@Misc{Far96,
author = "Dan Farmer",
title = "Shall We Dust Moscow",
howpublished = "Web doc",
month = dec,
year = "1996",
url = "http://www.trouble.org/survey/",
}
@Book{Ben96,
author = "Alain Bensoussan",
title = "Les {T}\'{e}l\'{e}coms et le droit",
publisher = "Hermes",
year = "1996",
}
@Proceedings{esorics96,
title = "Proceedings of the 1996 European Symposium on Research
in Computer Security",
year = "1996",
}
@Proceedings{oakland97,
institution = "IEEE",
title = "Proceedings of the 1997 {IEEE} Symposium on Security
and Privacy",
editor = "IEEE Computer Society Press",
year = "1997",
}
@Misc{RG95,
author = "Ron Rivest and Rosario Gennaro",
title = "Course on Network and Computer Security",
howpublished = "Web doc",
year = "1995",
url = "http://theory.lcs.mit.edu/~rosario/6.915/home.html",
}
@Misc{BWF96,
author = "M. Bishop and C. Wee and J. Frank",
title = "Goal Oriented Auditing and Logging",
howpublished = "Submitted to IEEE Transactions on Computing Systems",
year = "1996",
url = "http://seclab.cs.ucdavis.edu/papers.html",
}
@InProceedings{HS97,
author = "John Hale and Sujeet Shenoi",
title = "Catalytic Inference Analysis: Detecting Inference
Threats due to Knowledge Discovery",
booktitle = "Proceedings of the 1997 IEEE Symposium on Security and
Privacy",
year = "1997",
url = "http://euler.mcs.utulsa.edu/~hale/oakim.ps",
keywords = "intrusions detection",
}
@InProceedings{Aal.97,
author = "Paul Ammann and Sushil Jajodia and Catherine D.
McCollum and Barbara T. Blaustein",
title = "Surviving Information Warfare Attacks on Databases",
booktitle = "Proceedings of the 1997 IEEE Symposium on Security and
Privacy",
year = "1997",
url = "http://www.isse.gmu.edu/~csis/publications/oak97-iw.ps",
keywords = "intrusions detection",
}
@InProceedings{KRL97,
author = "Calvin Ko and Manfred Ruschitzka and Karl Levitt",
title = "Execution Monitoring of Security-Critical Programs in
a Distributed System: {A} Specification-based
Approach",
booktitle = "Proceedings of the 1997 IEEE Symposium on Security and
Privacy",
year = "1997",
keywords = "intrusions detection",
}
@InProceedings{LJ97,
author = "Ulf Lindqvist and Erland Jonsson",
title = "How to Systematically Classify Computer Security
Intrusions",
booktitle = "Proceedings of the 1997 IEEE Symposium on Security and
Privacy",
year = "1997",
url = "http://www.ce.chalmers.se/~ulf/pubs.html",
keywords = "intrusions detection",
}
@TechReport{Lin96,
author = "Ulf Lindqvist",
title = "Observations on the Nature of Computer Security
Intrusions",
institution = "Chalmers university of technology",
year = "1996",
number = "253L",
month = dec,
keywords = "intrusions detection",
}
@Misc{RS96,
author = "R. L. Rivest and A. Shamir",
title = "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps",
howpublished = "Web doc",
month = may,
year = "1996",
url = "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps",
keywords = "commerce electronique",
}
@InBook{Hag96,
author = "Jean Haguet",
title = "{L}'internet~: guide stratégique pour l'entreprise",
chapter = "15",
publisher = "Masson",
year = "1996",
url = "http://www.gctech.fr/librairie/documentation.html",
keywords = "commerce electronique",
}
@PhdThesis{Mou97,
author = "Abdelaziz Mounji",
title = "Rule-Based Distributed Intrusion Detection",
school = "Universit\'{e} de Namur",
year = "1997",
month = "Juillet 1997",
keywords = "detection d'intrusions",
}