Attention, cette bibliographie n'est plus mise à jour depuis 1998.
Nous la laissons en ligne car elle reste consultée régulièrement.
@Manual{green89, title = "{IT} Security Evaluation Criteria, Bundesanzeiger", organization = "German Information Security Agency (GISA)", year = "1989", } @Article{Aal.91, author = "T. Araki and T. Morizumi and H. Nagase and T. Takenaka and K. Yamashita", title = "Security level assignment by graph analysis", journal = "IEICE Transactions", volume = "E74", number = "8", pages = "2166--2175", month = aug, year = "1991", } @InProceedings{AB90, author = "I. F. Akyildiz and G. S. Benson", title = "A Security Reclassifier for a Local Area Network", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "85--96", year = "1990", } @InProceedings{ABJ93, author = "V. Atluri and E. Bertino and S. Jajodia", title = "Achieving Stricter Correctness Requirements in Multilevel Secure Databases", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "135--149", year = "1993", } @TechReport{ABKL90, author = "M. Abadi and M. Burrows and C. Kaufman and B. Lampson", title = "Authentication and Delegation with Smart-cards", institution = "DIGITAL, Systems Research Center", number = "67", month = oct, year = "1990", } @TechReport{AFN90, author = "AFNOR", title = "Pour une approche m\'{e}thodique de la s\'{e}curit\'{e} des syst\`{e}mes d'information ({LES} {METHODES} {MARION} {ET} {MELISA})", institution = "CNTI/CN27/GE1", number = "4", month = "novembre", year = "1990", } @Article{AGS83, author = "S. R. Ames and M. Gasser and R. R. Schell", title = "Security Kernel Design and Implementation : An Introduction", journal = "Computer", volume = "16", number = "7", month = jul, year = "1983", } @Article{AJ87, author = "M. D. Abrams and A. B. Jeng", title = "Network Security Protocol Reference Model and the Trusted Computer System Evaluation Criteria", journal = "IEEE Network Magazine", pages = "24--33", month = apr, year = "1987", } @InProceedings{AJJ92, author = "P. Ammann and F. Jaeckle and S. Jajodia", title = "A Two Snapshot Algorithm for Concurrency Control in Multi- Level Secure Databases", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "204--215", year = "1992", } @Article{AL91, author = "J. Alves-Foss and K. Levitt", title = "The Verification of Secure Distributed Systems", journal = "IEEE, COMPCON", year = "1991", } @InProceedings{AL92, author = "Bruno d' Ausbourg and Jean-Henri Llareus", title = "{M2}{S} : {A} Machine for Multilevel Security", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "373--392", year = "1992", } @TechReport{Amb91, author = "O. Ambrois", title = "Aspects of security, integrity and privacy in the telecommunication network", institution = "CSELT", volume = "XIX", number = "2", month = "avril", year = "1991", } @Article{Ams88, author = "CISA Ellen Amsel", title = "Network Security and Access Controls", journal = "Computers and Security", volume = "7", month = feb, year = "1988", } @TechReport{And72, author = "J. P. Anderson", title = "Computer Security Technology Planning Study", institution = "ESD-TR-73-51", volume = "1", month = oct, year = "1972", } @TechReport{And80, author = "J. P. Anderson", title = "Computer Security Threat Monitoring and Surveillance", institution = "James P. Anderson Company, Fort Washington, Pennsylvania", month = apr, year = "1980", } @InProceedings{And85, author = "J. P. Anderson", title = "A Unification of Computer and Network Security and Privacy Concepts", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", year = "1985", } @InProceedings{And92, author = "Ross J. Anderson", title = "{UEPS} - {A} Second Generation Electronic Wallet", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "411--418", year = "1992", } @Article{AP87a, author = "M. D. Abrams and H. J. Podell", title = "Network Security Overview", journal = "Computer and Networks Security", year = "1987", } @Article{AP87b, author = "M. D. Abrams and H. J. Podell", title = "Society and policy issues", journal = "Computer and Networks Security", year = "1987", } @Article{AP87c, author = "M. D. Abrams and H. J. Podell", title = "Management Issues", journal = "Computer and Networks Security", year = "1987", } @Article{AP87d, author = "M. D. Abrams and H. J. Podell", title = "Formal Models", journal = "Computer and Networks Security", year = "1987", } @Article{AP87e, author = "M. D. Abrams and H. J. Podell", title = "Protocols", journal = "Computer and Networks Security", year = "1987", } @InProceedings{Bad91, author = "Lee Badger", title = "{Covert Channel Analysis Planning for Large Systems}", pages = "120--136", year = "1991", booktitle = "{Proceedings of the 14th National Computer Security Conference}", address = "Washington, DC", month = oct, } @Article{Bai82, author = "S. C. Bailin", title = "Distribution of Access Control Functions in a Local Area Networks", journal = "IEEE CH1811-9/82/0000/0118\$00.75", year = "1982", } @InProceedings{Bai90, author = "D. J. Bailey", title = "Managing Computer Security : How Can Research Help ?", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "235--242", year = "1990", } @InProceedings{Bak91, author = "B. C. Baker", title = "Les enjeux des bases de donn\'{e}es {SQL} s\'{e}curis\'{e}es", booktitle = "Convention {UNIX} 91", year = "1991", } @TechReport{BAN89, author = "M. Burrows and M. Abadi and R. Needham", title = "A Logic of Authentication", institution = "DIGITAL, Systems Research Center, N 39", month = feb, year = "1989", keywords = "authentication logic", } @Article{BD87, author = "S. Budkowski and P. Dembinski", title = "An Introduction to Estelle : {A} Specification language for Distributed Systems", journal = "Computer Networks and ISDN systems", volume = "3", number = "3", year = "1987", } @InProceedings{BD90, author = "L. Blain and Y. Deswarte", title = "An Intrusion-Tolerant Security Server for an Open Distributed System", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "97--104", year = "1990", } @InProceedings{Ben92, author = "G. Benson", title = "An Optimal Solution to the Secure Reader-Writer Problem", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "251--259", year = "1992", } @Article{Ber87, author = "D. M. Berry", title = "Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language", journal = "IEEE transaction on software Engineering", volume = "13", number = "2", month = feb, year = "1987", } @InProceedings{BGS92, author = "John A. Bull and Li Gong and Karen R. Sollins", title = "Towards Security in an Open Systems Federation", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "3--20", year = "1992", } @TechReport{Bib77, author = "K. J. Biba", title = "Integrity consideration for secure computer systems", institution = "MITRE Corp., MTR-2997", year = "1977", } @PhdThesis{Bie89, author = "P. Bieber", title = "Aspects epist\'{e}miques des protocoles cryptographiques", school = "Universit\'{e} Paul-Sabatier - TOULOUSE N d'ordre 531", year = "1989", } @InProceedings{Bie90, author = "P. Bieber", title = "Epistemic Verification of Cryptographic Protocols", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "211--222", year = "1990", } @InProceedings{Bis90, author = "J. Biskup", title = "A General Framework for Database Security", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "35--44", year = "1990", } @InProceedings{BJMN93, author = "B. T. Blaustein and S. Jajodia and C. D. McCollum and L. Notargiacomo", title = "A Model of Atomicity for Multilevel Transactions", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "120--134", year = "1993", } @InProceedings{BK88, author = "D. S. Bauer and M. E. Koblentz", title = "{NIDX}, a Real-Time Intrusion Detection Expert System", booktitle = "Proceedings of the USENIX'88 Conference", pages = "261--272", month = jun, year = "1988", } @Article{BKY85, author = "W. E. Boebert and R. Y. Kain and W. D. Young", title = "Secure Computing : The Secure {ADA} Target Aproach", journal = "Scientific Honeyweller, Vol. 6, N 2", month = jul, year = "1985", } @TechReport{BLP73, author = "D. E. Bell and L. J. La Padula", title = "Security computer systems : mathematical foundations", institution = "Hanscom AFB. Bedford. MA. Rep. FSD-TR-73-278., ESD/AFSC", volume = "1", year = "1973", } @TechReport{BLP74, author = "D. E. Bell and L. J. LaPadula", title = "Security Computer Systems: Mathematical foundations and model", institution = "MITRE Corp., Bedford, Mass.", year = "1974", } @TechReport{BLP75, author = "D. E. Bell and L. J. La Padula", title = "Secure Computer Systems: Unified Exposition and Multics Interpretation", institution = "MTR-2997, MITRE Corp., Bedford, Mass.", month = jul, year = "1975", } @Article{BM90, author = "S. M. Bellovin and M. Merritt", title = "Limitations of the {K}erberos Authentication System", journal = "Computer Communications Review", month = "octobre", year = "1990", } @InProceedings{BM92, author = "S. M. Bellovin and M. Merritt", title = "Encrypted Key Exchange : Password-Based Protocols Secure Against Dictionary Attacks", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "72--84", year = "1992", } @InProceedings{BN89, author = "D. F. C. Brewer and M. J. Nash", title = "The Chinese Wall Security Policy", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", year = "1989", } @Article{Boc90, author = "G. V. Bochman", title = "Protocol specification for {OSI}", journal = "Computer networks and ISDN systems", volume = "18", pages = "167--184", year = "1990", } @Article{Bok81a, author = "S. H. Bokhari", title = "On the Mapping Problem", journal = "IEEE Transaction on Computers", volume = "C-30", number = "3", year = "1981", } @Article{Bok81b, author = "S. H. Bokhari", title = "The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security", journal = "IEEE", year = "1981", } @InProceedings{Boy92, author = "Colin Boyd", title = "A Formal Framework for Authentication", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "273--292", year = "1992", } @Article{BP92, author = "J. B. Bowles and C. E. Pelaez", title = "Data security-bad code", journal = "IEEE Spectrum", month = aug, year = "1992", keywords = "hacking", } @Article{Bra87, author = "D. K. Branstad", title = "Considerations for Security in the {OSI} Architecture", journal = "IEEE Network Magazine", pages = "34--39", month = apr, year = "1987", } @InProceedings{Bro79, author = "P. Browne", title = "The Security Audit", booktitle = "Checklist For Computer Security Center Self-Audits", pages = "173--184", year = "1979", } @Article{BS79, author = "M. Bishop and L. Snyder", title = "The Transfert of Information and Authority in a Protection System", journal = "ACM 0-89791-009-5/79/1200/0045", year = "1979", } @Article{BS80, author = "G. V. Bochmann and C. A. Sunshine", title = "Formal Methods in Communication Protocol Design", journal = "IEEE Transactions on Communications", volume = "28", number = "4", month = apr, year = "1980", } @InProceedings{Cal92, author = "Christel Calas", title = "{GD}o{M} : a Multilevel Document Manager", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "393--410", year = "1992", } @InProceedings{Cal.90, author = "P. Casey and A. Brouwer and D. Herson and J. F. Pacault and F. Taal and U. Van Essen", title = "Harmonised Criteria for the Security Evaluation of its Systems and Products", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "243--", year = "1990", } @Article{Car93, author = "Ulf Carlsen", title = "Using Logics to detect Implementation-Dependent Flaws", year = "1993", keywords = "authentication logic", } @Misc{CCI88, author = "CCITT", title = "{X509}, The directory - Authentication framework", month = nov, year = "1987", keywords = "authentication X509", } @InProceedings{CD92, author = "O. Costich and J. McDermott", title = "A Multilevel Transaction Problem for Multilevel Secure Database Systems and Its Solution for the Replicated Architecture", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "192--203", year = "1992", } @Misc{Cen90, author = "{Security Group} {CEN/CENELEC}", title = "Taxonomie for security standardisation", howpublished = "doc. de travail", month = sep, year = "1990", } @Article{CGHM81, author = "M. H. Cheheyl and M. Gasser and G. A. Huff and J. K. Millen", title = "Verifying Security", journal = "Computing Surveys", volume = "13", number = "3", month = sep, year = "1981", } @InProceedings{Cha86, author = "B. G. Matley", title = "An Analysis of the Differences between the computer Security Practices in the Military and Private Sectors", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "71--74", year = "1986", } @Misc{CJ90, author = "K. Cutler and F. Jones", title = "{CISR} Commercial International Security Requirements", howpublished = "CISR DRAFT", month = aug, year = "1990", } @Article{CLT88, author = "A. C. Capel and C. Lafierre and K. C. Toth", title = "Protecting the security of {X}.25 Communications", journal = "Data Communication", month = nov, year = "1988", } @Article{Col90, author = "Robert Cole", title = "A Model for Security Distributed Systems", journal = "Computers and Security", volume = "9", month = jun, year = "1990", } @Article{Coo71, author = "S. A. Cook", title = "The Complexity of Theorem Proving Procedures", journal = "ACM Symposium on Theory of Computing", year = "1971", } @TechReport{Cra91, author = "R. E. Crandall", title = "Fast Elliptic Encryption", institution = "NeXT, Scientific Computation Group", number = "91.04.07", year = "1991", } @Misc{Cup90a, author = "F. Cuppens", title = "Une logique \'{e}pist\'{e}mique et d\'{e}ontique pour raisonner sur la s\'{e}curit\'{e} des syst\`{e}mes informatiques", howpublished = "ONERA-CERT doc. interne", month = "mars", year = "1990", } @InProceedings{Cup90b, author = "F. Cuppens", title = "An Epistemic and deontic Logic for Reasoning about Computer Security", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "135--146", year = "1990", } @InProceedings{Cup93, author = "F. Cuppens", title = "A Logical Analysis of Authorized and Prohibited Information Flows", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "100--109", year = "1993", } @Article{CW87, author = "D. D. Clark and D. R. Wilson", title = "A Comparison of Commercial and Military Computer Security Policies", journal = "IEEE", year = "1987", } @InProceedings{CY92, author = "F. Cuppens and K. Yazdanian", title = "A 'Natural' Decomposition of Multi-level Relations", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "273--285", year = "1992", } @Article{Dav81, author = "D. W. Davies", title = "Ciphers and the Application of the Data Encryption Standard", journal = "Computer IEEE", year = "1981", } @Article{Dav83, author = "D. W. Davies", title = "Applying the {RSA} Digital Signature to Electronic Mail", journal = "Computer", month = feb, year = "1983", } @TechReport{Dav85, author = "W. L. Davis Jr", title = "Synopsis of {U.S.} Department of Defense Evaluation Criteria", institution = "IBM", number = "85212PUR0233", month = jul, year = "1985", } @InProceedings{DBS92, author = "Herv\'{e} Debar and Monique Becker and Didier Siboni", title = "A Neural Network Component for an Intrusion Detection System", booktitle = "Proceedings of the IEEE Symposium of Research in Computer Security and Privacy", pages = "240--250", month = may, year = "1992", } @Article{Deh89, author = "Khosrow Dehnad", title = "A Simple Way of Improving the Login Security", journal = "Computers and Security", volume = "8", month = nov, year = "1989", } @Article{Den76, author = "Dorothy E. Denning", title = "A Lattice Model of Secure Information Flow", journal = "ACM", volume = "19", number = "5", month = may, year = "1976", } @Book{Den82, author = "Dorothy E. Denning", title = "Cryptography and Data Security", publisher = "Addison-Wesley Publishing Company", year = "1982", } @Article{Den87, author = "D. E. Denning", title = "An Intrusion-Detection Model", journal = "IEEE transaction on Software Engineering", pages = "222--232", volume = "13", number = "2", year = "1987", } @InProceedings{Des92, author = "Yvo Desmedt", title = "Breaking the Traditional Computer Security Barriers", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "125--140", year = "1992", } @InProceedings{DGV92, author = "Joan Daemen and Ren\'{e} Govaerts and Joos Vandewalle", title = "A Hardware Design Model for Cryptographic Algorithms", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "419--434", year = "1992", } @Article{DH76, author = "W. Diffie and M. E. Hellam", title = "New Directions in Cryptography", journal = "IEEE Transactions on Information Theory", volume = "IT-22", number = "6", month = nov, year = "1976", } @Article{DH77, author = "W. Diffie and M. E. Hellam", title = "Exhaustive Cryptanalysis of the {NBS} {DES}", journal = "Computer", volume = "10", number = "6", month = jun, year = "1977", } @InProceedings{DHN88, author = "A. L. Donaldson and J. McHugh and K. A. Nyberg", title = "Covert Channels in Trusted {LAN}'s", booktitle = "Proceedings of the 11th National Computer Security Conference", year = "1988", } @TechReport{DKD92, author = "Marc Dacier and Mohamed Kaâniche and Yves Deswarte", title = "A Framework for Operational Security Assessment of Computing Systems", institution = "LAAS", number = "92-434", year = "1992", } @TechReport{DM??, author = "E. Deberdt and S. Martin", title = "{M}\'{e}thodologie '{MINERVE SECURITE}' demarche d'\'{e}valuation de la s\'{e}curit\'{e} des logiciels", institution = "IBM", number = "LGE 08", pages = "223", year = "??", } @Article{DM83, author = "R. DeMillo and M. Merritt", title = "Protocol for Data Security", journal = "Computer", month = feb, year = "1983", } @InProceedings{DM90, author = "E. Deberdt and S. Martin", title = "Methodology 'Minerve Security' Evaluation Process of Software Security", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "223--234", year = "1990", } @Proceedings{DNAC91, institution = "DNAC", title = "De nouvelles architecture pour les communications~: les r\'{e}seaux informatiques, qualit\'{e} de service, s\'{e}curit\'{e} et performances", editor = "Eyrolles", year = "1991", } @Misc{DOD85, author = "{U.S. Defense Department}", title = "Trusted Computer System Evaluation Criteria", institution = "DoD", number = "5200.28-STD", year = "1985", } @Book{DP89, author = "D. W. Davies and W. L. Price", title = "Security for Computer Networks", publisher = "John Willey and Sons Publications", edition = "2nd", year = "1989", } @InProceedings{DR91, author = "Marc Dacier and Michel Rutsaert", title = "Comment g\'{e}rer la transitivit\'{e} en s\'{e}curit\'{e}", booktitle = "Actes de la convention {UNIX}'91", pages = "205--217", year = "1991", } @InProceedings{Eal.92, author = "J. Epstein and J. McHugh and R. Pascale and C. Martin and D. Rothnie and H. Orman and A. Marmor-Squires and M. Branstad and B. Danner", title = "Evolution of a Trusted {B}3 Window System Prototype", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "226--239", year = "1992", } @Misc{ECMA88, author = "ECMA", title = "Security In Open Systems: {A} Security Framework", institution = "ECMA", number = "TR/46", year = "1988", } @TechReport{ECMA89, author = "ECMA", title = "Security In Open Systems : Data Elements and Service Definitions", institution = "ECMA", number = "138", note = "Standard", year = "1989", } @Article{ET91, author = "D. Estrin and G. Tsudik", title = "Secure Control of Transit internetwork traffic", journal = "Elsevier Science Publishers B.V. Ed.", year = "1991", } @InProceedings{FS91, author = "Dan Farmer and E. H. Spafford", title = "The {COPS} Security Checker System", booktitle = "Proceedings of the 14th National Computer Security Conference", pages = "372--385", month = oct, year = "1991", } @Misc{FB90, author = "Dan Farmer and Robert Baldwin", title = "Computer Oracle and Password System ({COPS})", howpublished = "Newsgroup comp.sources.unix", year = "1990", } @TechReport{Fei80, author = "R. J. Feiertag", title = "A technique for Proving Specification Are multilevel Secure", jinstitution = "Computer Science Lab SRI International. Menlo Park, Cal.", number = "CSL-109", year = "1980", } @Article{Fen74, author = "J. S. Fenton", title = "Memoryless Subsystems", journal = "The computer journal", volume = "17", number = "2", year = "1974", } @Article{Fer90, author = "R. Ferreira", title = "The Practical Application of State of The Art Security in Real Environments", journal = "Lecture Notes in Computer Science", volume = "453", year = "1990", } @Article{Fer91, author = "Josep Domingo-Ferrer", title = "Algorithm-Sequenced Access Control", journal = "Computers and Security", volume = "10", month = oct, year = "1991", } @InProceedings{FLR77, author = "R. J. Feiertag and K. N. Levitt and L. Robinson", title = "Proving Multilevel Security of a System Design", booktitle = "6th ACM symposium on operating system principles", pages = "57--65", month = nov, year = "1977", } @InProceedings{FM93, author = "T. Fine and S. E. Minear", title = "Assuring Distributed Trusted Mach", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "206--218", year = "1993", } @InProceedings{FN79, author = "R. J. Feiertag and P. G. Neumann", title = "The Foundation of a Provably Secure Operating System ({PSOS})", booktitle = "NCC", volume = "47", editor = "AFIPS Press", year = "1979", } @InProceedings{FR92, author = "Jean-Charles Fabre and Brian Randell", title = "An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "193--208", year = "1992", } @Article{Fra83, author = "L. J. Fraim", title = "Scomp: {A} Solution to the Multilevel Security Problem", journal = "Computer", volume = "16", number = "7", month = jul, year = "1983", } @InProceedings{FZ92, author = "G. P. Ford and Jun Zhang", title = "A structural graph matching approach to image understanding", booktitle = "SPIE - The International Society for Optical Engineering", volume = "1607", pages = "559--69", year = "1992", } @Book{Gas88, author = "M. Gasser", title = "Building a secure computer system", publisher = "Van Hoostrand and Reinhold", year = "1988", } @InProceedings{Gau91, author = "G. Gaudin", title = "Gestion de s\'{e}curit\'{e} en environnement h\'{e}t\'{e}rog\`{e}ne", booktitle = "De nouvelles architectures pour les communications~: les r\'{e}seaux informatiques, qualit\'{e} de service, s\'{e}curit\'{e} et performances", year = "1991", pages = "73--80", month = "octobre", } @Book{GJ79, author = "M. R. Garey and D. S. Johnson", title = "Computers and Intractability : {A} Guide to the Theory of {NP}-Completeness", publisher = "W.H. Freeman and Company", year = "1979", } @InProceedings{GL91, author = "T. D. Garvey and T. F. Lunt", title = "Model-based Intrusion Detection", booktitle = "Proceedings of the 14th National Computer Security Conference", month = oct, year = "1991", } @InProceedings{GLP92, author = "V. D. Gligor and S.-W. Luan and J. N. Pato", title = "On Inter-Realm Authentification in Large Distributed Systems", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "2--17", year = "1992", } @InProceedings{GM82, author = "J. A. Goguen and J. Meseguer", title = "Security Policies and Security Models", booktitle = "IEEE Symp. Security and Privacy", year = "1982", } @InProceedings{GM89, author = "J. Glasgow and G. MacEwen", title = "Obligation as the Basis of Integrity Specification", booktitle = "Computer Security Foundations Workshop, Franconia, N.H.", month = jun, year = "1989", } @Article{GMP92, author = "J. Glasgow and G. MacEwen and P. Panangaden", title = "A logic for Reasoning About Security", journal = "ACM Transactions on Computer Systems", volume = "10", number = "3", month = aug, year = "1992", keywords = "authentication logic", } @InProceedings{GP90, author = "M. Girault and J. C. Pailles", title = "An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "173--184", year = "1990", } @InProceedings{GPP90, author = "D. Graft and M. Pabrai and U. Pabrai", title = "Methodology for Network Security Design", booktitle = "IEEE Symp. Security and Privacy", pages = "675--682", year = "1990", } @InProceedings{Gra87, author = "C. Gray Girling", title = "Covert Channels in {LAN}'s", booktitle = "IEEE Symp. Security and Privacy", year = "1987", } @InProceedings{Gra93, author = "{J. W.} {Gray III}", title = "On Introducing Noise into the Bus-Contention Channel", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "90--99", year = "1993", } @Book{Gri81, author = "David Gries", title = "The Science of Programming", publisher = "Springer-Verlag, New York", year = "1981", } @InProceedings{GS92, author = "{J. W.} {Gray III} and P. F. Syverson", title = "A Logical Approach to Multilevel Security of Probabilistic Systems", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "164--176", year = "1992", } @Article{Gus88, author = "D. Gusfield", title = "A Graph Theoric Approach to Statistical Data Security", journal = "SIAM J. Computer", volume = "17", number = "3", year = "1988", } @InProceedings{Hal.93, author = "J. D. Horton and R. Harland and E. Ashby and R. H. Cooper and W. F. Hyslop and B. G. Nickerson and W. M. Stewart and O. K. Ward", title = "The Cascade Vulnerability Problem", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "110--119", year = "1993", } @Article{HA??, author = "Stephen E. Hansen and E. Todd Atkins", title = "Centralized System Monitoring With Swatch", journal = "Proceedings of the the USENIX Conference", year = "??", } @InProceedings{HA92, author = "H. Hosmer and M. D. Abrams", title = "MultiPolicy Machine: {A} New Security Paradigm", booktitle = "IEEE Simposium on Security and Privacy", note = "Poster Session Abstract", year = "1992", } @Article{Har89, author = "C. L. Harrold", title = "An Introduction to the {SMITE} Approach to Secure Computing", journal = "Computers and Security", volume = "8", month = oct, year = "1989", } @Article{Has91, author = "J. Hastwell", title = "Measuring User Accountability in an Integrated Network Environment", year = "1991", } @Article{Her87, author = "I. S. Herschberg", title = "The Hackers' Comfort", journal = "Computers and Security", volume = "6", number = "2", pages = "133--138", year = "1987", keywords = "hacking", } @InProceedings{HG92, author = "Jingsha He and Virgil D. Gligor", title = "Formal Methods and Automated Tool for Timing-Channel Identification in {TCB} Source Code", booktitle = "proceedings of the European Symposium on Research in Computer Security (ESORICS)", pages = "57--76", year = "1992", } @InProceedings{HH86, author = "L. R. Halme and J. Van Horne", title = "Automated Analysis of Computer System Audit Trails for Security Purposes", booktitle = "Computer Security Conference", pages = "71--74", year = "1986", } @InProceedings{HK91, author = "I. Houston and S. King", title = "{CICS} project report - Experiences and Results from the Use of {Z} in {IBM}", booktitle = "Formal Software Development Methods: International Symposium of VDM Europe", volume = "2-4", editor = "Springer Verlag", address = "Berlin", year = "1991", } @InProceedings{HL92, author = "Ralf C. Hauser and E. Stewart Lee", title = "Verification and Modelling of Authentification Protocols", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "141--154", year = "1992", } @InProceedings{HLLS90, author = "G. Hoffmann and S. Lechner and M. Leclerca and F. Steiner", title = "Authentification and Access Control in a Distributed System", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "71--84", year = "1990", } @InProceedings{HLMM92, author = "Naji Habra and Baudouin Le Charlier and Abdelaziz Mounji and Isabelle Mathieu", title = "{ASAX} : Software Architecture and Rule- Based Language for Universal Audit Trail Analysis", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "435--450", year = "1992", } @InProceedings{HM90, author = "E. S. Hocking and J. A. McDermid", title = "Towards on Object-Oriented Development Environment for Secure Applications", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "191--200", year = "1990", } @InProceedings{Hos91a, author = "H. H. Hosmer", title = "Integrating Security Policies", booktitle = "Proceedings of the Third RADC Workshop of Multilevel Database Security, Castile, NY, MITRE MTP 385", month = may, year = "1991", } @InProceedings{Hos91b, author = "H. H. Hosmer", title = "Shared Sensitivity Labels", booktitle = "Data Security IV, Status and Prospects, North Holand", year = "1991", } @InProceedings{Hos91c, author = "H. H. Hosmer", title = "The Multipolicy Machine: {A} New Paradigm for Multilevel Secure Systems", booktitle = "National Institute of Standards and Technology Workshop on Secure Labels", month = jun, year = "1991", } @InProceedings{Hos91d, author = "H. H. Hosmer", title = "A Multipolicy Model: {A} Working Paper", booktitle = "Fourth RADC Multilevel Database Security Workshop", month = apr, year = "1991", } @InProceedings{Hos91e, author = "H. H. Hosmer", title = "Metapolicies {I}", booktitle = "ACM SIGSAC Data Management Workshop, San Antonio, TX", month = dec, year = "1991", } @InProceedings{Hos92, author = "H. H. Hosmer", title = "Metapolicies {II}", booktitle = "Proceedings of the 15th National Computer Security Conference, Baltimore, MD", month = oct, year = "1992", } @Article{HRU76, author = "M. A. Harrison and W. L. Ruzzo and J. D. Ullman", title = "Protection in operating systems", journal = "ACM", volume = "19", number = "8", pages = "461--471", month = aug, year = "1976", } @Article{Hru88, author = "J. Hruska", title = "Data viruses, Trojan horses and logic bombs-how to combat them?", journal = "Computer Fraud and Security Bulletin", volume = "10", number = "6", month = apr, year = "1988", keywords = "hacking", } @Misc{HS88, author = "J. Henshall and S. Shaw", title = "{O}{SI} Explained End to End Computer Communication Standards", editor = "U. K.: Ellis Horwood Limited Chichester", year = "1988", } @InProceedings{Hu92, author = "W. M. Hu", title = "Lattice Scheduling and Covert Channels", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "53--61", year = "1992", } @TechReport{IBM90a, author = "IBM", title = "{AIX} version 3.1 for {RISC} System/6000{TM} : General Concepts and Procedures", institution = "IBM : documentation technique", year = "1990", } @TechReport{IBM91, author = "IBM", title = "Elements of {AIX} Security", institution = "IBM : documentation technique", number = "GG24-3622-01", year = "1991", } @Misc{IEE89, author = "{IEEE LAN Secutity Working Group}", title = "Standard for Interoperable Local Area Network ({LAN}) Security ({SILS}), {IEEE} 802.10", month = dec, year = "1989", } @InProceedings{Ilg93, author = "K. Ilgun", title = "{USTAT} : {A} Real-Time Intrusion Detection System for {UNIX}", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "16--29", year = "1993", } @TechReport{ISO84, author = "ISO", title = "Information Processing Systems -- {OSI} Reference Model, International Standards Organization", institution = "ISO", number = "7498", month = oct, year = "1984", } @TechReport{ISO89, author = "ISO", title = "Information Processing Systems -- {OSI} Reference Model -- Part 2: Security Architecture, International Standards Organization", institution = "ISO", number = "7498-2", year = "1989", } @TechReport{ISO90, author = "ISO", title = "{MD4} - Message Digest Algorithm", institution = "International Standards Organization", number = "ISO/IEC JTC1/SC27/WG20.2 N193", month = apr, year = "1990", } @TechReport{Iso91a, author = "ISO", title = "Glossary of Information Technology Security Definitions", institution = "International Standards Organization Publication", number = "ISO/IEC JTC1/SC27 N270", year = "1991", keyword = "glossary", } @TechReport{Iso91b, author = "ISO", title = "Telecommunications and Information Exchange Between Systems - Transport Layer Security Protocol", institution = "International Standards Organization Publication", number = "ISO/IEC JTC1/SC6 N6779", month = oct, year = "1991", } @TechReport{Iso91c, author = "ISO", title = "Telecommunications and Information Exchange Between Systems - Network Layer Security Protocol", institution = "International Standards Organization Publication", number = "ISO/IEC JTC1/SC6 N7053", month = nov, year = "1991", } @TechReport{Iso91d, author = "ISO", title = "Telecommunications and Information Exchange Between Systems - Transport Layer Security Protocol - Amendement 1: Security Association Establishment", institution = "International Standards Organization", number = "ISO/IEC JTC1/SC6 N6794", month = dec, year = "1991", } @TechReport{ITSEM92, author = "{Commision of the} {European} {³ommunities}", title = "Information Technology Security Evaluation Manual ({ITSEM})", institution = "CEC", year = "1992", } @InProceedings{JA92, author = "S. Jajodia and V. Atluri", title = "Alternative Correctness Criteria for Concurrent Execution of Transactions", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "216--225", year = "1992", } @InBook{Jac91, author = "J. L. Jacob", title = "Specifying security properties", publisher = "??", chapter = "??", year = "1991", } @TechReport{Jal.93a, author = "H. S. Javitz and A. Valdes and T. F. Lunt and A. Tamaru and M. Tyson and J. Lowrance", title = "Next Generation Intrusion Detection Expert System ({NIDES})", institution = "SRI", number = "A016-Rationales", year = "1993", } @Article{Jan92, author = "Janus Associates", title = "Information Security Administration Model : {A} Management Model to Help Identify the Best Practices of the Administration Function within the Security Group", journal = "Computer and Security", volume = "11", pages = "327--340", year = "1992", } @InProceedings{JDS91, author = "Kathleen A. Jackson and David H. Dubois and Cathy A. Stalling", title = "An Expert System Application for Network Intrusion Detection", booktitle = "Proceedings of the 14th National Computer Security Conference", year = "1991", } @InProceedings{JLS76, author = "A. K. Jones and R. J. Lipton and L. Snyder", title = "A Linear Time Algorithm for Deciding Security", booktitle = "17th Annual Symp. on Foundations of Computer Science", year = "1976", } @TechReport{JM90, author = "P. Janson and R. Molva", title = "Network Security", institution = "IBM Zurich Research Laboratory", month = may, year = "1990", } @Misc{JM91, author = "P. Janson and R. Molva", title = "Security in Open Networks and Distributed Systems", howpublished = "Elsevier Science Publishers", year = "1991", } @Article{JMG88, author = "C. Jard and J. F. Monin and R. Groz", title = "Development of {V}\'{e}da, a Prototyping Tool for Distributed Algorithms", journal = "IEEE Transactions on software ingineering", volume = "14", number = "3", month = mar, year = "1988", } @TechReport{Jon??, author = "R. W. Jones", title = "A General Mechanism for Access Control: Its Relationship to Secure Systems Concepts", institution = "IBM", number = "LGE 08", pages = "45", year = "??", } @InProceedings{Jon90, author = "R. W. Jones", title = "A General Mechanism for Access Control : Its Relationship to Secure System Concepts", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "45--50", year = "1990", } @InProceedings{JS92, author = "Andrew J. I. Jones and Marek Sergot", title = "Formal Specification of Security Requirements using the Theory of Normative Positions", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "103--124", year = "1992", } @TechReport{Kai??, author = "J. Kaiser", title = "An Object-Oriented Architecture to Support System Reliability and Security", institution = "IBM", number = "LGE 08", pages = "51", year = "??", } @InProceedings{Kai90, author = "J. Kaiser", title = "An Object-Oriented Architecture to Support System Reliability and Security", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "51--60", year = "1990", } @Article{Kak83, author = "S. C. Kak", title = "Data Security in Computer Networks", journal = "Computer IEEE", pages = "8--10", year = "1983", } @Article{Kak88, author = "Viiveke Fak", title = "Are we vulnerable to a virus attack? {A} report from Sweden", journal = "Computers and Security", volume = "7", month = apr, year = "1988", keywords = "hacking", } @InProceedings{Kal.92, author = "Y. Klein and E. Roche and F. Taal and M. Van Dulm and U. Van Essen and P. Wolf and J. Yates", title = "The {IT} Security Evaluation Manuel ({ITSEM})", booktitle = "Proceedings of the 15th NCSC Conference", year = "1992", } @InProceedings{Kan80, author = "A. Kandel", title = "Fuzzy statistics and systems security", booktitle = "Conference : Security Through Science and Engineering", month = sep, year = "1980", } @InProceedings{Kar78, author = "P. A. Karger", title = "The Lattice Model in a Public Computing network", booktitle = "ACM Annual Conference", volume = "1", year = "1978", } @Article{KBN88, author = "B. C. Karp and L. K. Barker and L. D. Nelson", title = "The Secure Data Network System", journal = "ATT Technical Journal", pages = "19--27", month = may, year = "1988", } @InProceedings{KC90, author = "R. Kaplan and R. J. M. Clyde", title = "Viruses, worms, and Trojan horses. {VI} The war continues", booktitle = "Digital Equipment Computer Users Society. Fall", pages = "119--137", year = "1990", keywords = "hacking", } @InProceedings{Kel90, author = "U. Kelter", title = "Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "23--34", year = "1990", } @InProceedings{Kel92, author = "Udo Kelter", title = "Type-Level Access Controls for Distributed Structurally Object- Oriented Database Systems", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "21--40", year = "1992", } @Article{Kem82a, author = "R. A. Kemmerer", title = "Formal Verification of an Operating System Kernel", journal = "Communication of the ACM", volume = "12", number = "10", pages = "576--581", year = "1982", } @InProceedings{Kem82b, author = "R. A. Kemmerer", title = "A Practical Approach to Identifying Storage and Timing Channels", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", year = "1982", } @InProceedings{Kes92, author = "Volker Kessler", title = "On the Chinese Wall Model", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "41--56", year = "1992", } @Misc{Kie89, author = "M. Kielsky", title = "Security and Access Control Features of the {VAX/VMS} Operating System", howpublished = "??", year = "1989", } @InProceedings{Kim91, author = "J. Kimmins", title = "Developing a Network Security Architecture : Concepts and Issues", booktitle = "Proceedings of the SECURICOM'91 Conference", month = mar, year = "1991", } @InProceedings{KK92, author = "Iwen E. Kang and Thomas F. Keefe", title = "On Transaction Processing for Multilevel Secure Replicated Databases", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "329--348", year = "1992", } @InProceedings{Klu89, author = "H. M. Kluepfel", title = "Foiling the wily hacker: more than analysis and containment", booktitle = "International Carnahan Conference on Security Technology", pages = "15--21", year = "1989", keywords = "hacking", } @Article{Klu91, author = "H. M. Kluepfel", title = "In search of the cuckoo's nest - an auditing framework for evaluating the security of open networks", journal = "EDP Auditor Journal", volume = "3", pages = "36--48", year = "1991", keywords = "hacking", } @InProceedings{Koh91, author = "J. T. Kohl", title = "The evolution of the {K}erberos Authentication Service", booktitle = "Acte de EurOpen 91", pages = "295--313", year = "1991", } @Article{KP91, author = "R. A. Kemmerer and P. A. Porras", title = "Covert Flow Trees: {A} Visual Approach to Analyzing Covert Storage Channels", journal = "IEEE Transaction on Software Engineering", volume = "17", number = "11", month = nov, year = "1991", } @Article{Kru89, author = "Jan P. Kruys", title = "Security of Open Systems", journal = "Computers and Security", volume = "8", month = apr, year = "1989", } @Article{Kru91, author = "Jan P. Kruys", title = "Progress in Secure Distributed Systems", journal = "Computers and Security", volume = "10", month = aug, year = "1991", } @TechReport{KSL??, author = "A. Kehne and J. Sch{\"o}nw{\"a}lder and H. Langend{\"o}rfer", title = "Multiple Authentications with a Nonce-Based Protocol Using Generalized Timestamps", institution = "Institut f{\"u}r Betriebssysteme und Rechnerverbund, TU Braunschweig, B{\"u}ltenweg 74/75, D-3300 Braunschweig", year = "1991", } @InProceedings{Kun86, author = "J. D. Kuhn", title = "Research Toward Intrusion Detection Through Automated Abstraction of Audit Data", booktitle = "Computer Security Conference", pages = "204--208", year = "1986", } @Misc{KW91, author = "J. O. Kephart and S. R. White", title = "Directed-Graph Epidemiological Models of Computer Viruses", editor = "IEEE", year = "1991", } @InProceedings{KW93, author = "J. O. Kephart and S. R. White", title = "Measuring and Modeling Computer Virus Prevalence", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "2--15", year = "1993", } @Article{Lac74, author = "R. D. Lackey", title = "Penetration of computer systems an overview", journal = "Honeywell Computer Journal", year = "1974", keywords = "hacking", } @TechReport{Lal.90a, author = "T. F. Lunt and A. Tamaru and F. Gilham and R. Jagannathan and C. Jalali and H. S. Javitz and A. Valdes and P. G. Neumann", title = "A real-Time Intrusion-Detection Expert System", institution = "SRI International", month = jun, year = "1990", } @InProceedings{Lal.90b, author = "T. F. Lunt and A. Tamaru and F. Gilham and R. Jagannathan and P. G. Neumann and C. Jalali", title = "{IDES}: {A} Progress Report", booktitle = "Proceedings of the Computer Security Application Conference", pages = "273--285", year = "1990", } @Article{Lal.90c, author = "T. F. Lunt and D. Denning and R. Schell and M. Heckman and W. Shockley", title = "The SeaView Security Model", journal = "IEEE Trans. on Soft. Engineering", volume = "16", number = "6", month = jun, year = "1990", } @TechReport{Lal.91, author = "Lassire and Reboulet and Ruggiu and Velin and Yazdanian", title = "Glossaire encyclop\'{e}dique de la s\'{e}curit\'{e} et qualit\'{e} des syst\`{e}mes d'information et informatiques", institution = "CT 'S\'{e}curit\'{e} et sûret\'{e} informatiques' de l'AFCET", month = "novembre", year = "1991", keyword = "glossary", } @Article{Lam73, author = "B. W. Lampson", title = "A Note on the Confinement Problem", journal = "ACM", volume = "16", number = "10", pages = "613--615", month = oct, year = "1973", } @Article{Lam74, author = "B. W. Lampson", title = "Protection", journal = "ACM", volume = "8", number = "1", pages = "18--24", month = jan, year = "1974", } @Article{Lan81, author = "C. E. Landwerh", title = "Formal Models for Computer Security", journal = "Computer Surveys", volume = "13", pages = "247--275", year = "1981", } @Article{LAN86, author = "Y. Lapid and N. Ahituv and S. Neumann", title = "Approaches to handling 'Trojan Horse' threats", journal = "Computer and security", volume = "5", month = sep, year = "1986", keywords = "hacking", } @Article{LAN89, author = "{European Institute for System Security} {EISS}", title = "Local Area Network Security", journal = "Lecture Notes in Computer Science", volume = "396", year = "1989", } @InProceedings{Lap90, author = "L. La Padula", title = "Formal Modeling in a Generalized Framework for Access Control", booktitle = "Computer Security Foundation Workshop III", month = jun, year = "1990", } @Article{Lat90, author = "David L. Lathrop", title = "Perestroika and its implications for Computer Security in the {U.S.S.R.}", journal = "Computers and Security", volume = "9", month = dec, year = "1990", } @TechReport{LB91, author = "Linda Lankewicz and Mark Benard", title = "Real-Time Anomaly Detection Using a Nonparametric Pattern Recognition Approach", institution = "Tulane University, Department of Computer Science", number = "TUTR 91-106", year = "1991", } @InProceedings{LB92, author = "Kwok-Yan Lam and Thomas Beth", title = "Timely Authentication in Distributed Systems", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "293--306", year = "1992", } @Article{Lee90, author = "P. J. Lee", title = "Secure User Access Control for Public Networks", journal = "Lecture Notes in Computer Science", volume = "453", year = "1990", } @InProceedings{LG92, author = "Kwok-Yan Lam and Dieter Gollmann", title = "Freshness Assurance of Authentication Protocols", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "261--272", year = "1992", } @InProceedings{LH90, author = "T. F. Lunt and D. Hsieh", title = "The SeaView Secure Database System : {A} Progress Report", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "3--14", year = "1990", } @Article{LHM84, author = "C. E. Landwehr and C. L. Heitmeyer and J. McLean", title = "A Security Model for Military Message System", journal = "ACM Trans. Comput. Syst.", volume = "2", pages = "198--222", year = "1984", } @Misc{Lin90, author = "T. Y. Lin", title = "Probalistic Measure on Aggregations", editor = "IEEE", year = "1990", } @InProceedings{LJ88, author = "T. F. Lunt and R. Jagannathan", title = "A Prototype Real-Time Intrusion-Detection Expert System", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "59--66", year = "1988", } @InProceedings{LK89, author = "Z. L. Lichtman and J. F. Kimmins", title = "An Audit Trail Reduction Paradigm Based on Trusted Processes", booktitle = "Proceedings of the 13th National Computer Security Conference", year = "1989", } @Article{Llo90, author = "Ivor Lloyd", title = "Software Evaluation in High Integrity Systems", journal = "Computers and Security", volume = "9", month = aug, year = "1990", } @Book{LLT87, author = "J. M. Lamere and Y. Leroux and J. Tourly", title = "La s\'{e}curit\'{e} des r\'{e}seaux : {M}\'{e}thodes et techniques", publisher = "DUNOD", year = "1987", } @Article{LR92, author = "D. Longley and S. Rigby", title = "An Automatic Search for Security Flaws in Key Management Schemes", journal = "Computer and Security", volume = "11", number = "1", pages = "75--89", month = may, year = "1992", } @Article{LS90, author = "W. P. Lu and M. K. Sundareshan", title = "A Model for Multilevel Security in Computer Networks", journal = "IEEE trans. on software", volume = "16", number = "6", month = jun, year = "1990", } @InProceedings{LTBS90, author = "E. S. Lee and B. Thomson and P. I. P. Boulton and M. Stumm", title = "An Architecture for a Trusted Network", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "105--116", year = "1990", } @Article{Lun89, author = "Teresa F. Lunt", title = "Access Control Policies : Some unanswered Questions", journal = "Computers and Security", volume = "8", month = feb, year = "1989", } @Article{Lun93, author = "Teresa F. Lunt", title = "A Survey of Intrusion Detection techniques", journal = "Computers and Security", volume = "12", year = "1993", } @Article{LV92, author = "G. E. Liepins and H. S. Vaccaro", title = "Intrusion Detection: Its Role and Validation", journal = "Computers and Security", volume = "11", pages = "347--355", year = "1992", } @InProceedings{Mal.90, author = "N. McAuliffe and D. Wolcott and L. Schaefer and N. Kelem and B. Hubbard and T. Haluey", title = "Is your Computer Being Misused? {A} Survey of Current Intrusion Detection System Technology", booktitle = "Proceedings of the IEEE Computer Security Applications Conference", pages = "260--272", year = "1990", } @InProceedings{Mat85, author = "B. G. Matley", title = "Computer Privacy in America: Conflicting Practices and Policy Choises", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "219--223", year = "1985", } @Article{Mcc90, author = "D. MC. Cullough", title = "A Hookup Theorem for Multilevel Security", journal = "IEEE Trans. on Soft. Engineering", volume = "16", number = "6", month = jun, year = "1990", } @InProceedings{Mcl88, author = "J. McLean", title = "The Algebra of Security", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", month = apr, year = "1988", } @InProceedings{Me93b, author = "Ludovic M\'e", title = "Security Audit Trail Analysis Using Genetic Algorithms", booktitle = "Proceedings of the 12th International Conference on Computer Safety, Reliability and Security", pages = "329--340", month = oct, year = "1993", } @InProceedings{Mea92, author = "C. Meadows", title = "Using Traces of Procedure Calls to Reason About Composability", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "177--191", year = "1992", } @Article{Men90, author = "Belden Menkus", title = "How an 'Audit Trail' Aids in Maintaining Information Integrity...as Illustrated in Retailing", journal = "Computers and Security", volume = "9", number = "2", month = apr, year = "1990", } @Article{Men91, author = "B. Menkus", title = "'Hackers': know the adversary", journal = "Computers and Security", volume = "10", number = "5", pages = "405--409", month = aug, year = "1991", keywords = "hacking", } @Article{Mer79, author = "P. M. Merlin", title = "Specification and Validation of Protocols", journal = "IEEE Transactions on Communications", volume = "27", number = "11", month = nov, year = "1979", } @Article{Mer90a, author = "Lindsay C. J. Mercer", title = "Tailor-made Auditing of Information Systems for the Detection of Fraud", journal = "Computers and Security", volume = "9", number = "1", month = feb, year = "1990", } @Article{Mer90b, author = "Lindsay C. J. Mercer", title = "Fraud Detection via Regression Analysis", journal = "Computers and Security", volume = "9", number = "5", month = jun, year = "1990", } @Article{MF90, author = "A. M. Myong and K. A. Forcht", title = "The computer hacker: friend or foe?", journal = "Journal of Computer Information Systems", volume = "31", number = "2", pages = "47--49", year = "1990", keywords = "hacking", } @Book{MG87, author = "C. Macchi and J. F. {Guilbert and 13 Co-auteurs}", title = "{T}\'{e}l\'{e}informatique", publisher = "DUNOD", edition = "2", year = "1987", } @TechReport{MIC90a, author = "MICROSOFT", title = "{L}{AN} Manager : guide de l'administrateur", institution = "MICROSOFT", note = "Documentation technique", year = "1990", } @TechReport{MIC90b, author = "MICROSOFT", title = "{LAN} Manager : Manuel de reference de l'administrateur", institution = "MICROSOFT", note = "Documentation technique", year = "1990", } @InProceedings{Mic91, author = "Z. Michalewicz", title = "A step towards optimal topology of 'Communication networks'", booktitle = "SPIE - The International Society for Optical Engineering", volume = "1470", pages = "112--22", year = "1991", } @PhdThesis{Mic93, author = "J. B. Michael", title = "A Formal Process for Testing the Consistency of Composed Security Policies", school = "George Mason University", month = aug, year = "1993", } @Article{Mil89, author = "J. K. Millen", title = "Models of Multilevel Computer Security", journal = "Advance in Computers", volume = "29", year = "1989", } @InProceedings{Mil92, author = "J. K. Millen", title = "A Resource Allocation Model for Denial of Service", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "137--147", year = "1992", } @Article{ML91, author = "M. Masmoudi and D. E. Lafaye de Micheaux", title = "Les lignes priv\'{e}es virtuelles", journal = "T.S.I.", volume = "10", number = "2", year = "1991", } @InProceedings{ML92, author = "J. K. Millen and T. F. Lunt", title = "Security for Object-Oriented Database Systems", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "260--272", year = "1992", } @Book{MM82, author = "C. H. Meyer and S. M. Matyas", title = "Cryptography: {A} Guide for the Design and Implementation of Secure Systems", publisher = "John Willey and Sons Publications", year = "1982", } @InProceedings{MM92, author = "U. S. Moskowitz and A. R. Miller", title = "The Influence of Delay Upon an Idealized Channel's Bandwidth", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "92--71", year = "1992", } @TechReport{MNSS87, author = "S. P. Miller and B. C. Neuman and J. I. Schiller and J. H. Saltzer", title = "{K}erberos Authentication and Authorization System", institution = "MIT Proj. ATHENA, Technical Plan, Section E.2.1", month = dec, year = "1987", } @InProceedings{Mos87, author = "L. E. Moser", title = "Graph homomorphisms and the design of secure computer systems", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "88--96", year = "1997", } @Article{MS90, author = "Robert A. McKosky and Sajjan G. Shiva", title = "A File Integrity Checking System to Detect and Recover from Program Modification Attacks in Multi-User Computer Systems", journal = "Computers and Security", volume = "9", number = "4", month = may, year = "1990", } @Misc{MJM93, author = "J. D. Moffett and D. Jonscher and J. A. McDermid", title = "The Policy Obstacle Course", howpublished = "SCHEMA/York/93/1 version 1", month = jul, year = "1993", } @InProceedings{MS91, author = "J. B. Michael and E. H. Sibley et al.", title = "A Modeling Paradigm for Representing Intentions in Information Systemes Policy.", booktitle = "First Workshop on Information Technologies and Systems", year = "1991", } @InProceedings{MT93, author = "R. Molva and G. Tsudik", title = "Authentication Method with Impersonal Token Cards", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "56--65", year = "1993", } @InProceedings{MTVZ92, author = "Refik Molva and Gene Tsudik and Els Van Herreweghen and Stefano Zatti", title = "KryptoKnight Authentication and Key Distribution System", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "155--174", year = "1992", } @TechReport{NBS77, author = "National {Bureau of} Standards", title = "Data {E}ncryption {S}tandard", institution = "NBS", year = "1977", } @TechReport{NCSC87, author = "{National Computer Security Center} {NCSC}", title = "Trusted {N}etwork {I}nterpretation of the {TCSEC}", institution = "NCSC", number = "NCSC-TG-005", month = jul, year = "1987", } @TechReport{NCSC90, author = "{National Computer Security Center} {NCSC}", title = "Trusted {N}etwork {I}nterpretation environments guideline", institution = "NCSC", number = "NCSC-TG-011, vers.1", month = aug, year = "1990", } @InProceedings{Nes78, author = "P. G. Nessett", title = "Computer Security Evaluation", booktitle = "Proc. NCC", volume = "47", editor = "AFIPS Press", year = "1978", } @Article{Nes87, author = "D. M. Nessett", title = "Factors Affecting Distributed System Security", journal = "IEEE TOSE", month = feb, year = "1987", } @Article{NF89, author = "Norme Fran\c{c}çaise", title = "Interconnexion des syst\`{e}mes ouverts", journal = "NF EN 27498 (ISO 7498-1)", month = "ao\^{u}t", year = "1989", } @TechReport{NF90, author = "Norme Fran\c{c}çaise", title = "Interconnexion des syst\`{e}mes ouverts : Architecture de s\'{e}curit\'{e}", institution = "ISO", number = "NF ISO 7498-2", month = "septembre", year = "1990", } @Article{NOP87, author = "D. B. Newman and J. K. Omura and R. L. Pickholtz", title = "Public Key Management for Network Security", journal = "IEEE Network Magazine", volume = "1", number = "2", month = apr, year = "1987", } @Article{NS78, author = "R. M. Needham and M. D. Schroeder", title = "Using encryption for authentication in large networks of computers", journal = "ACM", volume = "21", number = "12", year = "1978", } @Article{OA90, author = "Ingrid M. Olson and Marshall D. Abrams", title = "Computer Access Control Policy Choices", journal = "Computers and Security", volume = "9", month = dec, year = "1990", } @InProceedings{Oha90, author = "C. O'halloran", title = "A Calculus of Information Flow", booktitle = "Acte de ESORICS 90, Toulouse", pages = "147--159", month = oct, year = "1990", } @Article{OT89, author = "E. Okamoto and K. Tanaka", title = "Identity-Based Information Security Management System for Personal Computer Networks", journal = "IEEE Journal on Selected Areas in Communications", volume = "7", number = "2", month = feb, year = "1989", } @TechReport{PA??, author = "A. Pfitzmann and R. Assmann", title = "Efficient Software Implementations of (Generalized) {DES}", institution = "Univ. KARLSRUHE", year = "??", } @InProceedings{Pat90, author = "J. Patarin", title = "Pseudorandom Permutations based on the {D.E.S.} Scheme", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "185--190", year = "1990", } @InProceedings{PDJ93, author = "F. Piessens and B. De Decker and P. Janson", title = "Interconnecting Domains with Heterogeneous Key Distribution", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "66--81", year = "1993", } @TechReport{Pel90, author = "Christian Pelissier", title = "Guide de s\'{e}curit\'{e} pour les administrateurs de syst\`{e}mes {UNIX}", institution = "ONERA : Rapport interne", year = "1990", } @Misc{Pel92, author = "Christian Pelissier", title = "Guide de s\'{e}curit\'{e} pour des syst\`{e}mes {UNIX}", howpublished = "Draft, 22 juillet, 1992", month = "juillet", year = "1992", } @InProceedings{Per92a, author = "G{\"u}nther Pernul", title = "Security Constraint Processing in Multilevel Secure {AMAC} Schemata", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "349--372", year = "1992", } @TechReport{Per92b, author = "O. Perret", title = "La s\'{e}curit\'{e} certifi\'{e}e sous {UNIX}, \`{a} partir d'une exp\'{e}rience sur {S}un{OS MLS}", institution = "ENSTA : Rapport interne", year = "1991", } @Misc{PG??, author = "J. C. Pailles and M. Girault", title = "A Public Key Based Solution for Secured Data", howpublished = "Communications", year = "??", } @Article{PH90, author = "R. Paans and I. S. Herschberg", title = "Auditing the Change Management Process", journal = "Computers and Security", volume = "9", number = "2", month = apr, year = "1990", } @Article{Pic87, author = "J. Picciotto", title = "The Design of an Effective Auditing Subsystem", journal = "IEEE", year = "1987", } @Article{Pre89, author = "C. M. Preston", title = "Artificial Intelligence Applied to Information System Security", journal = "Information Age (Guildford)", volume = "11", number = "411", pages = "217--224", year = "1989", } @Article{PS91, author = "D. Pottas and S. H. von Solms", title = "A Computerized Management Reporting Aid for a Mainframe Security System", journal = "Computers and Security", volume = "10", month = oct, year = "1991", } @Book{PSRH85, author = "G. Pujolle and D. Serret and D. Dromard and E. Horlait", title = "{R}\'{e}seaux et {T}\'{e}l\'{e}matique, Tomes 1 et 2", publisher = "EYROLLES", year = "1985", } @Article{PW88, author = "L. G. Pierson and E. L. Witzke", title = "A Security Methodology for Computer Networks", journal = "ATT Technical Journal", pages = "28--36", month = may, year = "1988", } @InProceedings{QSKLG93, author = "X. Qian and M. Sticket and P. D. Karp and T. F. Lunt and T. D. Garvey", title = "Relational Database Systems", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "196--205", year = "1993", } @Article{Ram90, author = "Raju Ramaswamy", title = "A key Management Algorithm for Secure Communication in Open Systems Interconnection Architecture", journal = "Computers and Security", volume = "9", month = feb, year = "1990", } @InProceedings{Ran90, author = "G. Randell", title = "A Case Study in the Formal Rafinement of a Distributed Secure System", booktitle = "Acte de ESORICS 90, Toulouse", pages = "201--208", month = oct, year = "1990", } @InProceedings{RBG92, author = "M. Reiter and K. Birman and L. Gong", title = "Integrating Security in a Group Oriented Distributed System", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "18--32", year = "1992", } @Article{RC77, author = "R. C. Read and D. G. Corneil", title = "The Graph Isomorphism Disease", journal = "Journal of Graph Theory", volume = "1", year = "1977", } @Misc{Rey91, author = "J. K. Reynolds", title = "The helminthiasis of the Internet", howpublished = "Elsevier Science Publishers B.V. Ed.", year = "1991", } @InProceedings{RG93, author = "M. Reiter and L. Gong", title = "Preventing Denial and Forgery of Causal Relationships in Distributed Systems", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "30--40", year = "1993", } @Article{RMS89, author = "Bruce L. Riddle and Murray S. Miron and Judith A. Semo", title = "Passwords in Use in a University Timesharing Environment", journal = "Computers and Security", volume = "8", month = nov, year = "1989", } @Article{RMV94, author = "Pierre Rolin and Ludovic M\'{e} and Jos\'{e} Vazquez", title = "{S}\'{e}curit\'{e} des syst\`{e}mes informatiques", journal = "R\'{e}seaux et Informatique Repartie", year = "1994", pages = "31--74", } @Book{Rol89, author = "Pierre Rolin", title = "{R}\'{e}seaux locaux : Normes et protocoles", publisher = "HERMES", edition = "2", year = "1989", } @InProceedings{Rol91, author = "Pierre Rolin", title = "Architecture d'un r\'{e}seau de confiance", booktitle = "CFIP 91", year = "1991", } @Article{Rou85, author = "C. C. Rous", title = "What makes hackers tick? {A} computer owner's guide", journal = "CIPS Review", volume = "9", number = "4", pages = "14--15", month = jul, year = "1985", keywords = "hacking", } @Article{RR83, author = "J. Rushby and B. Randell", title = "A Distributed Secure System", journal = "Computer", volume = "16", number = "7", pages = "5--67", year = "1983", } @Article{RSA78a, author = "R. L. Rivest and A. Shamir and L. Adleman", title = "A Mothod for Obtaining Digital Signatures and Public-key Cryptosystems", journal = "ACM", volume = "2", number = "2", month = feb, year = "1978", } @TechReport{RSA78b, author = "R. L. Rivest and A. Shamir and L. Adleman", title = "Mental Poker", institution = "MIT", number = "TM-125", month = nov, year = "1978", } @InProceedings{RT92, author = "P. Rolin and L. Toutain", title = "Analyseur de s\'{e}curit\'{e} du r\'{e}seau", booktitle = "Actes du congr\`{e}s De nouvelles architecture pour les communications", year = "1992", } @Article{Rus81, author = "J. Rushby", title = "Design and Verification of Secure Systems", journal = "ACM", volume = "15", number = "5", pages = "12--21", month = dec, year = "1981", } @InProceedings{Rus85, author = "J. Rushby", title = "Networks are Systems", booktitle = "DOD Computer Security Workshop", year = "1985", } @Article{Rus90, author = "D. Russel", title = "High-level Security Architecture and the {K}erberos System", journal = "Computer Networks and ISDN Systems", volume = "19", pages = "201--214", year = "1990", } @Misc{Sam85, author = "M. Samociuk", title = "Hacking, or the Art of Armchair Espionage", howpublished = "Computer Fraud and Security Bulletin (Amsterdam) Supplement", volume = "7", number = "9", year = "1985", keywords = "hacking", } @Article{San88, author = "R. S. Sandhu", title = "The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes", journal = "Association for Computing Machinery", volume = "35", number = "2", month = apr, year = "1988", } @InProceedings{San92, author = "R. S. Sandhu", title = "The Typed Access Matrix Model", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "122--136", year = "1992", } @Article{Sat89, author = "M. Satyanarayanan", title = "Integrating Security in a Large Distributed System", journal = "ACM TOCS", volume = "7", number = "3", pages = "247--280", month = aug, year = "1989", } @Book{SB86, author = "B. Sarikaya and G. Bochmann", title = "Protocol Specification, Testing and Verification, {VI}", publisher = "NORTH-HOLLAND", year = "1986", } @InProceedings{Sch85, author = "D. D. Schnackenberg", title = "Development of a Multilevel Secure Local Area Network", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "97--104", year = "1985", } @TechReport{Sch91, author = "Herv\'{e} Schauer", title = "La s\'{e}curit\'{e} sous {UNIX}", institution = "CNES", year = "1991", } @TechReport{Sch92, author = "Herv\'{e} Schauer", title = "La s\'{e}curit\'{e} des r\'{e}seaux {TCP}/{IP} sous {UNIX}", institution = "Herv\'{e} Schauer Consultant", year = "1992", } @TechReport{Scs90a, author = "{ Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes d'information } SCSSI", title = "Crit\`{e}res d'\'{e}valuation de la s\'{e}curit\'{e} des syst\`{e}mes informatiques ({ITSEC})", institution = "SCSSI", year = "1990", } @TechReport{Scs90b, author = "{Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes d'information} {SCSSI}", title = "Glossaire de la s\'{e}curit\'{e} des syst\`{e}mes d'information", institution = "SCSSI", number = "CNTI/CN 27, N23", month = "octobre", year = "1990", keyword = "glossary", } @Misc{Cec91, author = "{ Commission of the European Communities }", title = "Information Technology Security Evaluation Criteria ({ITSEC}), version 1.2", month = jun, year = "1991", } @TechReport{Scs92, author = "{Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes d'information} {SCSSI}", title = "{D}\'{e}veloppement de syst\`{e}mes d'information s\'{e}curis\'{e}s ({DSIS})", institution = "SCSSI", month = "septembre", year = "1992", } @TechReport{SD89, author = "Bruno Struif and G. M. D Darmstadt", title = "Concepts Applications Activities", institution = "TELETRUST International Publication", month = mar, year = "1989", } @Misc{Sec91, title = "Actes de {SECURICOM}'91", howpublished = "SECURICOM", year = "1991", } @Misc{SF89, author = "J. E. Shimp and J. Filsinger", title = "Implementation of a Capabilities Knowledge Base for Data Integrity", howpublished = "IEEE CH2674-5/89/0000-0283", year = "1989", } @InProceedings{SG82, author = "D. P. Sidhu and M. Gasser", title = "A Multilevel Secure Local Area Network", booktitle = "Proceedings of the IEEE Symposium on Security and privacy", year = "1982", } @InProceedings{SG90, author = "S. W. Shieh and V. D. Gligor", title = "Auditing the Use of Covert Storage Channels in Secure Systems", booktitle = "Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA", month = may, year = "1990", } @Article{SG91, author = "S. W. Shieh and V. D. Gligor", title = "A Pattern-Oriented Intrusion-Detection Model and its Applications", journal = "IEEE", year = "1991", } @InProceedings{SG92, author = "S. G. Stubblebine and V. D. Gligor", title = "On Message Integrity in Cryptographic Protocols", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "85--104", year = "1992", } @InProceedings{SG93, author = "S. G. Stubblebine and V. D. Gligor", title = "Protocol Design for Integrity Protection", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "41--55", year = "1993", } @Article{Sha49, author = "C. E. Shannon", title = "Communication Theory of Secure Systems", journal = "Bell System Technical Journal", volume = "28", year = "1949", } @Misc{Shi82, author = "R. W. Shirey", title = "Security in Local Area Networks", howpublished = "IEEE CH1811-9/82/0000/0028\$00.75", year = "1982", } @Misc{Shi89, author = "R. W. Shirey", title = "Security in Local Area Networks", howpublished = "??", year = "1989", } @Article{Sim89, author = "G. J. Simmons", title = "A Protocol to Provide Verifiable Proof of Identity and Unforgeable transaction Receipts", journal = "IEEE Journal on Selected Areas in Communications", volume = "7", number = "4", month = may, year = "1989", } @InProceedings{SJ92, author = "Ravi S. Sandhu and Sushil Jajodia", title = "Polyinstantiation for Cover Stories", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "307--328", year = "1992", } @InProceedings{SK90, author = "Z. Savic and M. Komocar", title = "Security Kernel Design and Implementation in the {IBM} {PC} Environment", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "61--70", year = "1990", } @InProceedings{SM93, author = "P. Syverson and C. Meadows", title = "A Logical Language for Specifying Cryptographic Protocol Requirements", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "165--177", year = "1993", } @InProceedings{Sma88, author = "S. E. Smaha", title = "Haystack: An Intrusion Detection System", booktitle = "Proceedings of the 4th Aerospace Computer Security Application Conference", pages = "37--44", month = dec, year = "1988", } @InProceedings{Sne92, author = "E. Snekkenes", title = "Roles in Cryptographic Protocols", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "105--121", year = "1992", } @Article{Sny81, author = "L. Snyder", title = "Formal Models of Capability-Based Protection Stystems", journal = "IEEE trans. comput", volume = "C30", number = "3", year = "1981", } @Book{Spi89, author = "J. M. Spivey", title = "The {Z} Notation : a reference Manual", publisher = "C.A.R. Hoare Series Editor", year = "1989", } @InProceedings{SS92, author = "R. S. Sandhu and G. S. Suri", title = "Non-Monotonic Transformation of Access Rights", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "148--163", year = "1992", } @Misc{Ste??, author = "Jacques Stern", title = "La complexit\'{e} comme fondement de la cryptographie moderne", howpublished = "S\'{e}minaire : la cryptographie, fondements, applications, perspectives", year = "??", } @InProceedings{STH85, author = "R. Schell and T. F. Tao and M. Heckman", title = "Disingning the {GEMSOS} Security Kernel for Security and Performance", booktitle = "8th NCSC", pages = "108--119", year = "1985", } @Misc{Sto81, author = "A. Stoughton", title = "Acces Flow : {A} Protection Model Which Integrates Access Control and Information Flow", howpublished = "IEEE CH1629-5/81/0000/0009\$00.75", year = "1981", } @Article{Sto88, author = "C. Stoll", title = "Stalking the wily hacker", journal = "Communications of the ACM", volume = "31", number = "5", pages = "484--97", month = may, year = "1988", keywords = "hacking", } @TechReport{SUN90a, author = "SUN Microsystems", title = "{S}un{OS} {MLS} Programmer's Guide", institution = "Sun : documentation technique", month = jan, year = "1990", } @TechReport{SUN90b, author = "SUN Microsystems", title = "{S}un{OS} {MLS} System administrator", instituion = "SUN", note = "Chapitre 17 : Auditing, Sun : documentation technique", month = jan, year = "1990", } @InProceedings{Sut86, author = "D. Sutherland", title = "A Model of Information", booktitle = "9th National Computer Security Conference.", year = "1986", } @InProceedings{TA91, author = "J. J. Tardo and K. Alagappan", title = "{SPX} - Global Authentication Using Public-Key Certificates", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", year = "1991", } @InProceedings{TCL90, author = "H. S. Teng and K. Chen and S. C.-Y. Lu", title = "Adaptive Real-Time Anomaly Detection using Inductively Generated Sequential Patterns", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", month = may, year = "1990", } @Article{TGC90, author = "C. Tsai and V. D. Gligor and C. S. Chandersekaran", title = "On the Identification of Covert Storage Channels in Secure Systems", journal = "IEEE Transactions on Software Engineering", month = jun, year = "1990", } @InProceedings{TH90, author = "A. Tarah and C. Huitema", title = "{CHIMAERA} : {A} Network Security Model", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "127--134", year = "1990", } @InProceedings{TH92, author = "Anas Tarah and Christian Huitema", title = "Associating Metrics to Certification Paths", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "175--192", year = "1992", } @Article{TI89, author = "S. Tsujii and T. Itoh", title = "An {ID}-Based Cryptosystem Based on the Discrete Logarithm Problem", journal = "IEEE Journal on Selected Areas in Communications", volume = "7", number = "4", month = may, year = "1989", } @InProceedings{TLBL90, author = "B. Thomson and E. S. Lee and P. I. P. Boulton and D. M. Lewis", title = "Using Deducibility in Secure Network Modelling", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "117--124", year = "1990", } @InProceedings{Tou92, author = "Marie-Jeanne Toussaint", title = "Separating the Specification and Implementation Phases in Cryptology", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "77--102", year = "1992", } @InProceedings{TR92, author = "K. Tibourtine and P. Rolin", title = "Distribution de cl\'{e}s pour s\'{e}curiser les Communications des {RPC}", booktitle = "Actes de la convention {UNIX} 92", month = "mars", year = "1992", } @Misc{Tribunix8-42-43, title = "Tribunix, No 42 et 43", howpublished = "AFUU", year = "1992", note = "contient article LM/VA sur audit AIX", } @InProceedings{Tro93, author = "J. T. Trostle", title = "Modelling a Fuzzy Time System", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "82--89", year = "1993", } @InProceedings{TS90, author = "Gene Tsudik and R. Summers", title = "Aud{ES}: An Expert System for Security Auditing", booktitle = "Proceedings of the AAAI Conference on Innovative Application in Artificial Intelligence", month = may, year = "1990", } @TechReport{Tsu88, author = "Gene Tsudik", title = "An Expert System for Security Auditing", institution = "IBM Los Angeles Scientific Software", year = "1988", } @InProceedings{Tsu92, author = "Gene Tsudik", title = "Policy Enforcement in Stub Autonomous Domains", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "229--260", year = "1992", } @InProceedings{TY90, author = "LC. N. Tseung and K. C. Yu", title = "Guaranteed, Reliable, Secure Broadcast Networks", booktitle = "proceedings of the IEEE", pages = "576--583", year = "1990", } @Article{Var89, author = "Vijay Varadharajan", title = "Verification of Network Security Protocols", journal = "Computers and Security", volume = "8", month = dec, year = "1989", } @Article{Var90a, author = "Vijay Varadharajan", title = "Network Security Policy Models", journal = "Lecture Notes in Computer Science", volume = "453", pages = "74--95", year = "1990", } @Misc{Var90b, author = "Vijay Varadharajan", title = "Petri Net Based Modelling of Information Flow Security Requirements", howpublished = "IEEE Catalog Number 90TH0315-2", year = "1990", } @InProceedings{Var90c, author = "Vijay Varadharajan", title = "A Petri Net Framework for Modelling Information Flow Security Policies", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "125--126", year = "1990", } @InProceedings{Vaz93, author = "J. Vazquez-Gomez", title = "Modelling Multidomain Security", booktitle = "The New Security Paradigms Workshop II", year = "1993", } @Article{VK83, author = "V. L. Voydock and S. T. Kent", title = "Security Mechanisms in High Level Network Protocols", journal = "ACM Computing Surveys", pages = "135--171", month = jun, year = "1983", } @Article{VK84, author = "V. L. Voydock and S. T. Kent", title = "Security Mechanisms in a Transport Layer Protocol", journal = "Computer Networks", volume = "8", pages = "433--450", year = "1984", } @Article{VK85, author = "V. L. Voydock and S. T. Kent", title = "Security in High Level Network Protocols", journal = "IEEE Comm.", pages = "12--24", month = jul, year = "1985", } @InProceedings{VL89, author = "H. S. Vaccaro and G. E. Liepins", title = "Detection of Anomalous Computer Session Activity", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", month = may, year = "1989", } @InProceedings{Wal85, author = "S. T. Walker", title = "Network Security Overview", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "62--76", year = "1985", } @TechReport{War70, author = "W. H. Ware", title = "Security Controls for Computer Systems", booktitle = "Report on Defense Science Board Task Force on Compter Security", number = "R-609-1", year = "1970", } @InProceedings{WB90, author = "W. R. E. Weiss and A. Bauer", title = "Analysis of Audit and protocol Data using Methods from Artificial Intelligence", booktitle = "Proceedings of the 13th National Computer Security Conference", month = oct, year = "1990", } @Article{WC90, author = "S. R. White and L. Comerford", title = "{ABYSS}: An Architecture for Software Protection", journal = "IEEE Trans. on Soft. Engineering", volume = "16", number = "6", month = jun, year = "1990", } @InProceedings{WD87, author = "J. C. Williams and S G. W. Dinolt", title = "A graph-theoretic formulation of multilevel secure distributed systems: an overview", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "97--103", year = "1987", } @InProceedings{Wei69, author = "C. Weissman", title = "Security controls in the {ADEPT} 50 time system", booktitle = "AFIPS fall joint computer conference", year = "1969", } @InProceedings{Wei92, author = "C. Weissman", title = "{BLACKER} : security for the {DDN}, Examples of {A1} Security Engineering Trades", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "286--292", year = "1992", } @Article{WFZ92, author = "J. Wu and E. B. Fernandez and R. Zhang", title = "Some Extensions to the Lattice Model for Computer Security", journal = "Computer and Security", volume = "11", year = "1992", } @InProceedings{WG92, author = "Michael Wang and Andrzej Goscinski", title = "The Development and Testing of the Identity-Based Conference Key Distribution System for the {RHODOS} Distributed System", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "209--228", year = "1992", } @Article{Whi89, author = "C. E. White", title = "Viruses and worms: a campus under attack", journal = "Computer and security", volume = "8", month = jun, year = "1989", keywords = "hacking", } @Article{Wing90, author = "J. M. Wing", title = "A Specifier's Introduction to Formal Methods", journal = "IEEE Computer", year = "1990", } @InProceedings{Win90, author = "J. R. Winkler", title = "A {UNIX} Prototype for Intrusion Detection and Anomaly Detection in Secure Networks", booktitle = "Proceedings of the 13th National Computer Security Conference", year = "1990", } @InProceedings{Win92, author = "J. R. Winkler", title = "Intrusion and Anomaly Detection; {ISOA} Update", booktitle = "Proceedings of the 15th National Computer Security Conference", year = "1992", } @Article{Wit87, author = "I. H. Witten", title = "Computer (In)security : Infiltrating Open Systems", journal = "Abacus", address = "New York", volume = "4", number = "4", pages = "7--25", year = "1987", keywords = "hacking", } @Article{WL92a, author = "Y. C. Win and S. Lam", title = "Authentication for Distributed Systems", journal = "Computer", month = jan, year = "1992", } @InProceedings{WL92b, author = "T. Y. C. Woo and S. S Lam", title = "Authorization in Distributed Systems : {A} formal Approach", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "33--51", year = "1992", } @InProceedings{WL93, author = "T. Y. C. Woo and S. S. Lam", title = "A Semantic Model for Authentification Protocols", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "178--195", year = "1993", } @Article{Wol89, author = "M. Wolf", title = "Covert Channels in {LAN} Protocols", journal = "Lecture Notes in Computer Science, Local Area Network Security", volume = "396", year = "1989", } @Article{Woo84, author = "C. C. Wood", title = "Countering Unauthorized Systems Accesses", journal = "Journal of Systems Management", month = apr, year = "1984", } @TechReport{WQ??, author = "D. de Waleffe and J. J. Quisquater", title = "Better Login Protocols for Computer Networks", institution = "IBM", number = "LGE 08", pages = "163", year = "??", } @InProceedings{WQ90, author = "D. de Waleffe and J. J. Quisquater", title = "Better login protocol for computer networks", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "163--172", year = "1990", } @Article{X90, author = "{XXX article non sign\'{e} }", title = "La s\'{e}curit\'{e} informatique et son livre orange", journal = "G\'{e}nie Logiciel et Syst\`{e}mes Experts", volume = "19", month = "juin", year = "1990", } @InProceedings{Yaz90, author = "K. Yazdanian", title = "Relational Database Granularity", booktitle = "European Symposium on Research in Computer Security (ESORICS)", pages = "15--22", year = "1990", } @Article{YG90, author = "Ch. Yu and V. D. Gligor", title = "A Specification and Verification Method for Preventing Denial of Service", journal = "IEEE Trans. on Soft. Engineering", volume = "16", number = "6", month = jun, year = "1990", } @InProceedings{YKB93, author = "R. Yaholom and B. Klein and T. Beth", title = "Trust Relationships in Secure Systems-{A} Distributed Authentication Perspective", booktitle = "Proceedings of the IEEE Symposium on Security and Privacy", pages = "150--164", year = "1993", } @Article{You85, author = "W. D. Young", title = "Proving a Computer System Secure", journal = "Scientific Honeyweller", volume = "6", number = "2", month = jul, year = "1985", } @Misc{Sal90, author = "R. Salz", title = "Computer Oracle Passwd System ({COPS})", howpublished = "Newsgroup Article", year = "1990", } @Article{AM92, author = "Ludovic M\'e and Veronique Alanou", title = "Une exp\'{e}rience d'audit de s\'{e}curit\'{e} sous {AIX R}3.1", journal = "TRIBUNIX", page = "30-38", volume = "8", number = "43", year = "1992", } @TechReport{MV91, author = "Ludovic M\'e and Jos\'{e} Vazquez", title = "La s\'{e}curit\'{e} des syst\`{e}mes informatiques : \'{e}tude bibliographique", institution = "SUP\'ELEC/LM", number = "91-001", year = "1991", } @PhdThesis{Deb93, author = "Herv\'e Debar", title = "Application des r\'eseaux de neurones \`a la d\'etection d'intrusions sur les syst\`emes informatiques", school = "Universit\'e de Paris 6", year = "1993", } @MastersThesis{Por92, author = "Phillip Andrew Porras", title = "A State Transition Analysis Tool For Intrusion Detection", school = "University of California, Santa Barbara", year = "1992", } @InProceedings{SSHW88, author = "M. M. Sebring and E. Shellhouse and M. E. Hanna and R. A. Whitehurst", title = "Expert System in Intrusion Detection: {A} Case Study", booktitle = "Proceedings of the 11th National Computer Security Conference", pages = "74--81", year = "1988", } @TechReport{MP94, author = "Manel Medina and Enric Peig", title = "Survey of Security Related Application Areas and Objects", institution = "Universitat Polit\`{e}cnica de Catalunya", year = "1994", } @TechReport{JV94a, author = "Harold S. Javitz and Alfonso Valdes", title = "The {NIDES} Statistical Component Description and Justification", institution = "SRI", number = "A010", year = "1994", } @TechReport{JV94b, author = "Debra Anderson and Teresa Lunt and Harold Javitz and Ann Tamaru and Alfonso Valdes", title = "Safeguard Final Report: Detecting Unusual program Behavior Using the {NIDES} Statistical Component", institution = "SRI", year = "1994", } @TechReport{BB93, author = "Jean-Pierre Ban\^{a}tre and Ciar\'{a}n Bryce", title = "A Security Proof System for Netwoks of Communicating Processes", institution = "IRISA", number = "744", month = "juin", year = "1993", } @Unpublished{HA93, author = "Stephen E. Hansen and E. Todd Atkins", title = "Centralized System Monitoring With Swatch", note = "Stanford University", year = "1993", } @Unpublished{Ben92b, author = "Marc Benveniste", title = "Mod\`{e}le formel de s\'{e}curit\'{e}", note = "Document AQL", month = "novembre", year = "1993", } @Unpublished{Nee92, author = "R. M. Needham", title = "Reasoning about Cryptographic Protocols", note = "Document distribu\'{e} lors de ESORICS'92", year = "1992", } @InProceedings{Wie92, author = "Michael J. Wiener", title = "Efficient {DES} Key Search", booktitle = "Crypto'92", year = "1992", } @Proceedings{NSPW92, institution = "ACM SIGSAC", title = "New Security Paradigms Workshop", editor = "IEEE Computer Society Press", year = "1992", } @Proceedings{NSPW93, institution = "ACM SIGSAC", title = "New Security Paradigms Workshop", editor = "IEEE Computer Society Press", year = "1993", } @TechReport{CGLP92, author = "B. Courtois and M. C. Gaudel and J. C. Laprie and D. Powell", title = "{S}\^{u}ret\'{e} de fonctionnement informatique", institution = "LAAS", number = "92.382", month = "d\'{e}cembre", year = "1992", } @PhdThesis{Me94, author = "Ludovic M\'{e}", title = "Audit de s\'{e}curit\'{e} par algorithmes g\'{e}n\'{e}tiques", school = "Universit\'{e} de Rennes 1 - Num\'{e}ro d'ordre 1069", year = "1994", } @InProceedings{Lun90, author = "Teresa Lunt", title = "{IDES}: An intelligent System for Detecting Intruders", booktitle = "Computer Security, Threats and Countermeasures", month = nov, year = "1990", } @TechReport{Fal.90, author = "Kevin L. Fox and Ronda R. Henning and Jonathan H. Reed and Richard P. Simonian", title = "A Neural Network Approach Towards Intrusion Detection", institution = "Harris Corporation", year = "1990", } @Article{GS92b, author = "C. R Gent and C. P Sheppard", title = "Predicting Time Series by a Fully Connected Neural Network Trained by Back Propagation", journal = "Computing and Control Engineering Journal", month = may, year = "1992", } @Article{MS95, author = "David M'Raihi and Bruce Schneider", title = "Taxonomie des algorithmes cryptographiques", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "11--34", year = "1995", } @Article{Cat95, author = "Andr\'{e} Cattieuw", title = "Notion de preuve sans transfert de connaissance", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "35--42", year = "1995", } @Article{Lep95, author = "Marie-Noelle Lepareux", title = "Introduction aux protocoles z\'{e}ro-connaissance", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "43--52", year = "1995", } @Article{Har95, author = "Thierry Harl\'{e}", title = "Pas de syst\`{e}me cryptographique sans gestion de cl\'{e}s", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "53--60", year = "1995", } @Article{Rou95, author = "Yves Le Roux", title = "{L}'affaire Clipper, les d\'{e}bats sur le chiffrement aux Etats-Unis", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "61--66", year = "1995", } @Article{GUQ95, author = "Louis Guillou and Michel Ugon and Jean-Jacques Quisquater", title = "La carte \`{a} puce, un usage public de la cryptologie", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "67--88", year = "1995", } @Article{GT95, author = "Jean-Pierre Georges and Roland Thies", title = "Les services d'authentification et de s\'{e}curit\'{e} dans le {GSM}", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "89--102", year = "1995", } @Article{Buf95, author = "Thierry Buffenoir", title = "Fonctions de s\'{e}curit\'{e} pour la t\'{e}l\'{e}copie", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "103--110", year = "1995", } @Article{Heb95a, author = "Patrick H\'{e}brard", title = "{X509}, un cadre g\'{e}n\'{e}ral d'authentification", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "111--124", year = "1995", keywords = "authentication X509", } @Article{Fra95a, author = "Henri Francesconi", title = "{L}'\'{e}coute des signaux parasites", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "125--128", year = "1995", } @Article{Fra95b, author = "Henri Francesconi", title = "La r\'{e}glementation fran\c{c}aise sur la cryptologie", journal = "Syst\`{e}mes et s\'{e}curit\'{e}", pages = "129--136", year = "1995", } @InProceedings{Heb95b, author = "Patrick H\'{e}brard", title = "{S}\'{e}curit\'{e} dans les couches basses de l'{OSI}", pages = "111--129", year = "1995", booktitle = "Colloque Francophone sur l'Ing\'{e}nierie des Protocoles", address = "Rennes, France", month = may, } @InProceedings{BG95, author = "Christophe Bidan and Sylvain Gombault", title = "La s\'{e}curit\'{e} inter-domaine \`{a} l'aide des analyseurs de s\'{e}curit\'{e}", pages = "131--142", year = "1995", booktitle = "Colloque Francophone sur l'Ing\'{e}nierie des Protocoles", address = "Rennes, France", month = may, } @TechReport{JV94, author = "Abdelaziz Mounji and Baudouin Le Charlier and Denis Zampunieris and Naji Habra", title = "Distributed Audit trail Analysis", institution = "Facult\'{e} Universitaire Notre-Dame de la Paix", number = "RP-94-007", year = "1994", } @Misc{SGDN90, author = "{Secr\'{e}tariat G\'{e}n\'{e}ral de la D\'{e}fense Nationale}", title = "Protection des informations sensibles ne relevant pas du secret de d\'{e}fense", howpublished = "document commun SGDN/DISSI/SCSSI Num\'{e}ro 600", month = "janvier", year = "1990", } @Misc{SCSSI94, author = "{Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes Informatiques}", title = "La menace et les attaques informatiques", howpublished = "document commun DISSI/SCSSI Num\'{e}ro 650", month = "mars", year = "1994", } @InProceedings{Kah95, author = "Jos\'{e} Kahan", title = "A Capability-Based Authorization Model for the {WWW}", year = "1995", booktitle = "WWW'95 Conference", address = "Darmstadt, Germany", month = avril, } @InProceedings{Kah94, author = "Jos\'{e} Kahan", title = "Un nouveau mod\'{e}le d'autorisation pour les syst\`{e}mes de consultation d'information multim\'{e}dia r\'{e}partie", year = "1995", booktitle = "Colloque AFCET : o\`{u}, quand, comment prot\'{e}ger vos logiciels et documents \'{e}lectroniques", address = "Paris, France", year = "1994", month = "d\'{e}cembre", } @Article{DGKS94, author = "Michel Denault and Dimitris Gritzalis and Dimitris Karagiannis and Paul Spirakis", title = "Intrusion Detection: Approach and Performance Issues of the {SECURENET} System", journal = "Computers and Security", volume = "13", pages = "495--508", year = "1994", } @Misc{Mei93, author = "Eric Meillan", title = "Droit de la s\'{e}curit\'{e} des syst\`{e}mes d'information", howpublished = "cours fait \`{a} l'ENSTB", year = "1993", } @Misc{FL92, author = "Michael Fiey and Xavier Lacassin", title = "Les algorithmes cryptographiques", howpublished = "Annexe B, rapport de stage de fin d'\'{e}tude Sup\'{e}lec, Bull Ing\'{e}nierie", month = "juin", year = "1992", } @Misc{charte, title = "Charte d'utilisation des moyens informatiques", } @Misc{Ham95, author = "Riadh Hamdi", title = "{S}\'{e}curit\'{e} et Internet", howpublished = "Rapport de stage de fin d'\'{e}tudes Sup\'{e}lec \`{a} Transpac", month = "juin", year = "1995", } @Misc{Gai95, author = "Nicolas Gaillotte", title = "Audit de s\'{e}curit\'{e} sur un {SAS} internet", howpublished = "Rapport de stage de fin d'\'{e}tudes ENSTB \`{a} IBM", month = "juin", year = "1995", } @TechReport{IBM94, title = "Secured Network Gateway Version 1.2: Installation, Configuration and Administration Guide", organization = "IBM", edition = "first", year = "1994", month = dec, } @InProceedings{SSH93, author = "David R. Safford and Douglas Lee Schales and David K. Hess", title = "The {TAMU} Security Package: an Ongoing response to the Internet Intruders in an Academic Environment", booktitle = "Proceedings of the Fourth USENIX Security Symposium", year = "1993", } @Misc{Muf92, author = "Alec D. E. Muffett", title = "Crack: {A} Sensible Password Checker for Unix", howpublished = "from ftp:corton.inria.fr/CERT/tools/crack/crack4.1.tar", month = mar, year = "1992", } @PhdThesis{Kum95, author = "Sandeep Kumar", title = "Classification and Detection of Computer Intrusions", school = "Purdue University", year = "1995", month = aug, } @TechReport{KS94, author = "Sandeep Kumar and Eugene H. Spafford", title = "An Application of pattern Matching in Intrusion Detection", institution = "Purdue University", year = "1994", number = "CSD-TR-94-013", month = jun, } @Masterthesis{Asl95, author = "Taimur Aslam", title = "A taxonomy of Security Faults in the Unix Operating System", school = "Purdue University", year = "1995", month = aug, } @TechReport{CB94, author = "Mark Crosbie and Gene Spafford", title = "Defending a Computer System using Autonomous Agents", institution = "Purdue University", year = "1994", number = "95-022", month = mar, url = "http://www.cs.purdue.edu/homes/spaf/tech-reps/9522.ps", } @TechReport{CB95, author = "Mark Crosbie and Gene Spafford", title = "Active Defense of a Computer System using Autonomous Agents", institution = "Purdue University", year = "1995", number = "95-008", month = feb, url = "http://www.cs.purdue.edu/homes/spaf/tech-reps/9508.ps", } @TechReport{Fra94, author = "Jeremy Frank", title = "Artificial Intelligence and Intrusion Detection: Current and Future Directions", institution = "University of California at Davis", year = "1994", number = "NSA URP MDA904-93-C-4085", month = jun, } @Misc{Spa94, author = "Eugene Spafford", title = "Computer Viruses as Artificial Life", howpublished = "to appear in the Journal of Artificial Life", year = "1994", } @Manual{Zim94, title = "({PGP}) Pretty Good Privacy Encryption System: Users' Guide", author = "Philip Zimmermann", year = "1994", month = aug, } @Misc{Rou89, author = "B. Roulin", title = "Sp\'{e}cification de d\'{e}finition d'un {UNIX} s\'{e}curis\'{e}", howpublished = "document technique AQL", month = "juin", year = "1989", } @Article{MA96, author = "Ludovic M\'{e} and V\'{e}ronique Alanou", title = "{D}\'{e}tection d'intrusions dans un syst\`{e}me informatique~: m\'{e}thodes et outils", journal = "TSI", volume = "15", number = "4", pages = "429--450", year = "1996", } @Misc{Tal96, author = "Fran\c{c}ois Tallet", title = "Les firewalls", howpublished = "M\'{e}moire MEARI", year = "1996", } @Misc{Lig95, author = "Eric Ligaon", title = "Introduction \`{a} la s\'{e}curit\'{e} sous Solaris", howpublished = "S\'{e}minaire s\'{e}curit\'{e} SUN", year = "1995", } @Misc{BR96, author = "Jean-Jacques Bascou and Jer\^{o}me Romeu", title = "{D}\'{e}tection dynamique d'intrusions : une approche par r\'{e}seau de neurones", howpublished = "soumis pour publication \`{a} CFIP'96", } @Misc{RR96, author = "Patrick Ragaru and Roberto Ramos", title = "{S}\'{e}curisation d'architecture client-serveur", howpublished = "rapport de projet \'{e}tudiant de l'ENSTB", month = "f\'{e}vrier", year = "1996", keywords = "authentication kerberos DCE sesame", } @Misc{LR96, author = "S\'{e}bastien Letard and Herv\'{e} racine", title = "Mise en place d'un firewall {IP} sur un site universitaire", howpublished = "rapport de projet \'{e}tudiant de l'ENSTB", month = "f\'{e}vrier", year = "1996", } @Misc{Sun96, author = "Sun", title = "La s\'{e}curit\'{e} sur Internet", howpublished = "Documents remis lors du s\'{e}minaire du 26 mars 1996 \`{a} Rennes", month = "mars", year = "1996", } @Misc{NM95, author = "David Newmann and Brent Melson", title = "Can Firewall Take the Heat ?", howpublished = "Data Communication on the web", month = nov, year = "1995", } @Misc{Che91, author = "Bill Cheswick", title = "An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied", howpublished = "ATT Bell Laboratories", year = "1991", } @PhdThesis{Sam96, author = "Didier Samfat", title = "Architecture de s\'{e}curit\'{e} pour r\'{e}seaux mobiles", school = "Ecole Nationale des T\'{e}l\'{e}communications de Paris", year = "1996", } @Misc{Gui95, author = "Louis Guillou", title = "Comprehensive Approach of Zero-Knowledge Techniques", howpublished = "ISO/IEC JTC 1/SC 27 N 1185", month = oct, year = "1995", } @Misc{Jou96, author = "Manuella Jourdan", title = "{ITSEC}/{ITSEM}", howpublished = "M\'{e}moire M\'{e}ari 1995/96", year = "1996", } @Misc{Me96a, author = "Ludovic M\'{e}", title = "Genetic Algorithms, a Biologically Inspired Approach for Security Audit Trails Analysis", howpublished = "Short paper, 1996 IEEE Symposium on Security and Privacy", month = may, year = "1996", } @Article{MAA97, author = "Ludovic M\'{e} and V\'{e}ronique Alanou and Jorg Abraham", title = "Utilisation de cartes de Kohonen pour d\'{e}tecter des intrusions dans un syst\`{e}me informatique : une pr\'{e}-\'{e}tude", journal = "Valgo", year = "1997", } @InProceedings{Me96b, author = "Ludovic M\'{e}", title = "{M}\'{e}thodes et outils de la d\'{e}tection d'intrusions", booktitle = "Actes du congr\`{e}s Intelligence Economique et Comp\'{e}titive (IEC)", year = "1996", } @TechReport{Bis95, author = "Matt Bishop", title = "A standard audit trail format", institution = "Department of Computer Science, University of California at Davis", year = "1995", } @TechReport{CD94, author = "George Coulouris and Jean Dallimore", title = "A Security Model for Cooperative Work", institution = "Queen Mary and Westfield College, Department of Computer Science", year = "1994", number = "674", month = oct, } @Misc{Abr95, author = "Jorg Abraham", title = "Etude de l'utilisation de r\'{e}seaux de neurones de type carte de Kohonen pour la d\'{e}tection d'intrusions dans un syst\`{e}me informatique", howpublished = "Rappport de stage", month = "mars", year = "1995", } @InProceedings{Pro94, author = "Paul Proctor", title = "Audit Reduction and Misuse Detection in Heterogeneous Environments: Framework and Application", booktitle = "Proceedings of the 10th Annual Computer Security Applications", year = "1994", month = dec, } @Misc{Hay96, author = "Haystack Labs", title = "Stalker Product Overview", howpublished = "Document html~: \verb|http://www.haystack.com/prod/|", year = "1996", } @Misc{Sai96, author = "Science Applications International Corporation", title = "{CMDS}: Product Description", howpublished = "Document html~: \verb|http://www.saic.com:80/it/cmds|", year = "1996", } @Misc{Semper96, author = "Semper European Project", title = "Secure Electonic Marketplace for Europe", howpublished = "Document html~: \verb|http://www.semper.org|", year = "1996", keywords = "commerce electronique", } @Misc{Jon95, author = "Laurent Joncheray", title = "A Simple Active Attack Against {TCP}", month = apr, year = "1995", } @Misc{CGZ96, author = "Mireille Campana and Marc Girault and Gilles Z\'{e}mor", title = "Techniques de s\'{e}curit\'{e} appliqu\'{e}es au courrier \'{e}lectronique et \`{a} Internet", howpublished = "France T\'{e}l\'{e}com, Conseil scientifique, M\'{e}mento technique No~7", month = "juin", year = "1996", } @Misc{IETF, author = "IETF", title = "Information Technology Security", howpublished = "RFC1244", } @Article{Gui91, author = "Daniel Guinier", title = "Computer Virus Identification by Neural Networks", journal = "ACM SIGSAC Review", year = "1991", volume = "9", number = "4", pages = "49--59", } @InProceedings{Chr96, author = "Abdellatif Chraibi", title = "{V}\'{e}rification des protocoles cryptographiques de signature", booktitle = "Actes du congr\`{e}s CFIP'96", year = "1996", } @InProceedings{SRK96, author = "Michael Sobirey and Birk Richter and Hartmut Konig", title = "The Intrusion Detection System {AID}", booktitle = "Proceeding of the Joint Working Conference IFIP TC-6 and TC-11: Communication and Multimedia Security", year = "1996", } @Misc{Sun95, author = "Sun Microsystems", title = "The HotJava Browser~: a White Paper", howpublished = "Document publi\'{e} par Sun", year = "1995", } @TechReport{Cur90, author = "David A. Curry", title = "Improving the Security of Your Unix System", institution = "SRI", year = "1990", number = "ITSTD-721-FR-90-21", month = apr, } @Article{Rei95, author = "Jim Reid", title = "Open Systems Security: Traps and Pitfalls", journal = "Computers & Security", year = "1995", number = "14", pages = "496--517", } @TechReport{Gal87, author = "Patrick R. Gallagher", title = "A Guide to Understandinf Audit in Trusted Systems", institution = "NCSC", year = "1987", number = "NCSC-TG-001", month = jul, } @Misc{McM91, author = "Rob McMillan", title = "Site Security Policy Development", howpublished = "Security Emergency Response Team, Australia", year = "1991", } @Misc{Vou96, author = "Fabien Vouillon", title = "Etude des approches neuronales utilis\'{e}es en d\'{e}tection d'intrusions", howpublished = "M\'{e}moire M\'{e}ari, Sup\'{e}lec", month = "mars", year = "1996", } @Misc{HSPxx, author = "David K. Hess and David R. Safford and Udo W. Pooch", title = "A Unix Network Protocol Security Study: Network Information Service", howpublished = "?", month = "?", year = "?", } @Misc{Seexx, author = "Donn Seeley", title = "A Tour of the Worm", howpublished = "?", month = "?", year = "?", } @Misc{Venxx, author = "Wietse Venema", title = "{TCP} Wrapper", howpublished = "?", month = "?", year = "?", } @Article{Sch89, author = "Herv\'{e} Schauer", title = "La comptabilit\'{e} {UNIX} System {V}", journal = "Tribunix", year = "1989", volume = "26", } @Misc{Bry88, author = "Bill Bryant", title = "Designing an Authentication System: a Dialogue in Four Scenes", howpublished = "draft, Athena Project", month = feb, year = "1988", keywords = "authentication kerberos", } @Article{Hig90, author = "H. J. Highland", title = "Using and Breaking Encryption", journal = "Computers and Security", year = "1990", volume = "9", number = "8", pages = "668--671", keywords = "encryption emigma", } @InBook{Lan83, author = "Bill Landreth", title = "Histoire du piratage informatique", chapter = "2", pages = "27--35", publisher = "\'{e}diteur non connu", year = "1983", } @Misc{Dat91a, author = "Datapro Research Group", title = "Unix System Administration and Security", howpublished = "Datapro report", month = jan, year = "1991", } @Misc{Dat91b, author = "Datapro Research Group", title = "Computer Crime Methods and Detection", howpublished = "Datapro report", month = feb, year = "1991", keywords = "hacking", } @Article{DMC92, author = "R. Dixon and C. Marston and P. Collier", title = "A Report on the Joint {CIMA} and {IIA} Computer Fraud Survey", journal = "Computers and Security", year = "1992", volume = "11", pages = "307--313", keywords = "hacking", } @Article{Hig89, author = "H. J. Highland", title = "A Macro Virus", journal = "Computers and Security", year = "1989", volume = "8", number = "3", pages = "178--188", } @Misc{Rol92, author = "Pierre Rolin", title = "{S}\'{e}curit\'{e} des r\'{e}seaux", howpublished = "unpublished draft", month = "octobre", year = "1992", keywords = "authentication X509 kerberos chimerae", } @Article{GS91, author = "Simson Garfinkel and Gene Spafford", title = "Practical {UNIX} Security", journal = "SunExpert", year = "1991", pages = "68--73", } @Proceedings{Franconia90, institution = "IEEE", title = "Proceedings of the Computer Security Foundations Worshop {III}", editor = "IEEE Computer Society Press", year = "1990", } @Proceedings{oakland96, institution = "IEEE", title = "Proceedings of the 1996 {IEEE} Symposium on Security and Privacy", editor = "IEEE Computer Society Press", year = "1996", } @PhdThesis{Alt92, author = "Anas Altarah", title = "Chimaera~: un mod\`{e}le pour la s\'{e}curit\'{e} des syst\`{e}mes ouverts", school = "Universit\'{e} de Nice Sophia-Antipolis", year = "1992", month = "d\'{e}cembre", keywords = "authentication chimaera", } @Proceedings{NCSC16, institution = "NIST-NCSC", title = "Proceedings of the 16th National Computer Security Conference", editor = "?", year = "1993", } @Proceedings{oakland94, institution = "IEEE", title = "Proceedings of the 1996 {IEEE} Symposium on Security and Privacy", editor = "IEEE Computer Society Press", year = "1994", } @Proceedings{safecomp93, institution = "EWICS", title = "Proceedings of the 12th International Conference on Computer Safety, Reliability and Security", editor = "Springer-Verlag", year = "1993", } @PhdThesis{Vaz94, author = "Jos\'{e} V\'{a}zquez G\'{o}mez", title = "Contribution \`{a} la mod\'{e}lisation de la s\'{e}curit\'{e} multidomaine", school = "Universit\'{e} de Rennes 1", year = "1994", } @Misc{Mie92, author = "St\'{e}phane Mi\`{e}ge", title = "Codage et s\'{e}curit\'{e} des donn\'{e}es", howpublished = "Polycopi\'{e} Sup\'{e}lec No 3943", year = "1992", } @Misc{Cho90, author = "Pascal Chour", title = "Cartes \`{a} micro-circuit", howpublished = "Polycopi\'{e} Sup\'{e}lec No 3813", year = "1990", } @Misc{Ren94, author = "Herv\'{e} renaud", title = "Bases math\'{e}matiques du codage et de la s\'{e}curit\'{e}", howpublished = "Polycopi\'{e} Sup\'{e}lec No", year = "1994", } @Proceedings{IEC96, institution = "SCIP France and GBDA Europe and OSS Inc.", title = "Intelligence \'{e}conomique et comp\'{e}titive", editor = "sIECa", year = "1996", } @InProceedings{Me96c, author = "Ludovic M\'{e}", title = "{M}\'{e}thodes et outils de la d\'{e}tection d'intrusions", booktitle = "Actes du congr\`{e}s Intelligence \'{e}conomique et comp\'{e}titive", year = "1996", pages = "112--126", month = "novembre", } @PhdThesis{Kar91, author = "Arto T. Karila", title = "Open Systems Security: An Architectural Framework", school = "Helsinki University of Technology", year = "1991", } @Misc{TSI15-4, title = "Technique et science informatique, Vol.15, No 4", howpublished = "Hermes", year = "1996", note = "Contient papier LM/VA sur la d\'{e}tection d'intrusions", } @Misc{RIR4-1, author = "No 1 {R\'{e}seaux et informatique r\'{e}partie, Vol. 4}", howpublished = "Hermes", year = "1994", note = "Contient papier LM/JVG/PR sur les modeles", } @Misc{JCS1-1, author = "No 1 {Journal of Computer Security, Vol. 1}", howpublished = "IOS Press", year = "1992", } @Misc{CetDS1-2, title = "Computer and Data Security, Vol. 1, No 2", howpublished = "Research Information Ltd", } @Misc{CetS9-1, title = "Computers and Security", howpublished = "Elsevier Advanced Technology", month = feb, year = "1990", } @Proceedings{, institution = "CEN/CENELEC", title = "Security Aspects in {OSI} Functional Standards", editor = "?", year = "1989", } @Misc{Dac89, author = "Marc Dacier", title = "La s\'{e}curit\'{e} logique en informatique~: application aux r\'{e}seaux locaux", howpublished = "M\'{e}moire pr\'{e}sent\'{e} en vue de l'obtention du grade d'ing\'{e}nieur civil en informatique", year = "1989", } @Article{Den96, author = "Dorothy E. Denning", title = "A Taxonomy for Key Escrow Encryption Systems", journal = "Communication of the ACM", year = "1996", volume = "39", number = "3", month = mar, keywords = "tiers de confiance key escrowing", } @TechReport{JMW96, author = "d Chris Mitchell Nigel Jefferies a and Michael Walker", title = "Combining {TTP}-based key management with key escrow", institution = "Information Security Group, Royal Holloway, University of London", year = "1996", month = apr, keywords = "tiers de confiance key escrowing", } @PhdThesis{Ko96, author = "Calvin C. W. Ko", title = "Execution Monitoring of Security-Critical Programs in Distributed Systems: {A} Specification-based Approach", school = "University of California at Davis", year = "1996", } @Misc{Sob96a, author = "Michael Sobirey", title = "Michael Sobirey's Intrusion Detection Page", howpublished = "http://www.informatik.tu-cottbus.de/~sobirey/ids.html", year = "1996", keywords = "intrusion detection", } @Misc{Sob96b, author = "Michael Sobirey", title = "The Intrusion Detection System {AID}", howpublished = "http://www.informatik.tu-cottbus.de/~sobirey/aid-e.html", year = "1996", keywords = "intrusion detection", } @InProceedings{GM96, author = "Richard A. Griffith and Mac E. McGregor", title = "Designing and Operating a Multilevel Security Network Using Standard Commercial Products", booktitle = "Proceedings of the 19th National Information Systems Security Conference", year = "1996", month = oct, url = "from http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/readers-guide/NISSC96-paperlist.html", keywords = "Multilevel Security Network", } @TechReport{Ber93, author = "Aviv Bergman", title = "Intrusion Detection with Neural Networks", institution = "SRI International", year = "1993", number = "A012", month = feb, } @Misc{Hub96, author = "Markus Hubner", title = "{IP} Spoofing Demystified", howpublished = "Web doc", month = jun, year = "1996", url = "http://www.geocities.com/CapeCanaveral/3498/security.htm", } @InProceedings{ML97, author = "Abdelaziz Mounji and Baudouin Le Charlier", title = "Continuous Assesment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis", booktitle = "Proceedings of the IEEE ISOC'97 Symposium on Network and Distributed Systems Security", year = "1997", url = "http://www.info.fundp.ac.be/~amo/publication.html", keywords = "intrusion detection, ASAX", } @Misc{CC96, title = "Common Criteria for {IT} Security Evaluation", howpublished = "CD-ROM", month = jan, year = "1996", } @Article{Jef96, author = "Terry L. Jeffress", title = "The Auditcon Utility", journal = "NetWare Connection", year = "1996", pages = "32--42", month = dec, } @PhdThesis{Lau97, author = "Maryline Laurent", title = "Protection des communications sur les r\'{e}seaux {ATM}", school = "Universit\'{e} de Rennes 1", year = "1997", month = "juillet", } @Misc{AD97, author = "Theodore K. Apostolopoulos and Victoria C. Daskalou", title = "The Role of the Time Parameter in a Network Security Management Model", howpublished = "submitted to the IEEE Symposium on Computer Communication", year = "1997", note = "reviewed by L.M\'{e}", } @Misc{EHA97, author = "Mahmoud T. El-Hadidi and Nadia H. Hegazi and Heba K. Aslan", title = "Performance Analysis of the Kerberos Protocol in a Distributed Environment", howpublished = "submitted to the IEEE Symposium on Computer Communication", year = "1997", note = "reviewed by L.M\'{e}", } @Misc{AMG97, author = "M. Abdalla and M. Mahmoud and A. Goneid", title = "Secured Communication System with Neural Network Encoder", howpublished = "submitted to the IEEE Symposium on Computer Communication", year = "1997", note = "reviewed by L.M\'{e}", } @TechReport{Honeywell72, author = "Honeywell", title = "Multics", institution = "Honeywell", year = "1972", } @TechReport{Fal.96, author = "Edward W. Felten and Dirk Balfanz and Drew Dean and Dan S. Wallach", title = "Web Spoofing: An Internet Con Game", institution = "Princeton University", year = "1996", number = "540-96", } @Article{SH96, author = "Michael Shoffner and Merlin Hughes", title = "Java and Web-Executable Object Security", journal = "Dr. Dobb's Journal", year = "1996", month = nov, url = "http://www.ddj.com/ddj/1996/1996.11/shof.htm", } @InProceedings{DFH96, author = "Patrick D'Haeseleer and Stephanie Forrest and Paul Helman", title = "An Immunological Approach to Change Detection: Algorithms, Analysis and Implications", booktitle = "Proceedings of the 1996 IEEE Symposium on Security and Privacy", year = "1996", pages = "110--119", month = may, url = "http://www.cs.unm.edu/~forrest/ieee-sp-neg-select.ps.gz", } @InProceedings{FL96, author = "Stephanie Forrest and Thomas Longstaff", title = "A Sense of Self for Unix Processes", booktitle = "Proceedings of the 1996 IEEE Symposium on Security and Privacy", year = "1996", pages = "120--128", month = may, } @Misc{FSA97, author = "Stephanie Forrest and Anil Somayaji and David H. Ackley", title = "Building Diverse Computer Systems", howpublished = "Submitted to the Sixth Workshop on Hot Topics in Operating Systems", year = "1997", url = "http://www.cs.unm.edu/~forrest/hotos.ps", } @Misc{DF96, author = "Dipankar Dasgupta and Stephanie Forrest", title = "Novelty Detection in Time Series Data Using Ideas from Immunology", howpublished = "Web doc", year = "1996", url = "http://www.cs.unm.edu/~forrest/noveltydetection96.ps", } @Misc{FHS96, author = "Stephanie Forrest", title = "Computer Immunology", howpublished = "Submitted to Communications of the ACM", month = dec, year = "1996", url = "http://www.cs.unm.edu/~forrest/cacm.ps", } @Misc{Bob97, author = "Gildas Bobon", title = "Le march\'{e} de la s\'{e}curit\'{e}", howpublished = "Mémoire M\'{e}ari", month = "mars", year = "1997", } @Misc{Ber97, author = "Hughes Bertrand", title = "Intrusion Detection System", howpublished = "Mémoire M\'{e}ari", month = "mars", year = "1997", } @Misc{GD97, author = "Adriana Gorunescu and Cosmin Dimitriu", title = "Analyse d'audit", howpublished = "Mémoire Miniprojet ENSTB", month = "mars", year = "1997", keywords = "data mining", } @TechReport{GK95, author = "Sokratis Katsikas and Dimitris Gritzalis", title = "University Programmes on Information Security, Dependability and Safety", institution = "Erasmus", year = "1995", number = "ICP-94(95)-G-4016/11:IS-CD-3c", month = jul, } @Article{Bel89, author = "S. M. Bellovin", title = "Security Problems in the {TCP}/{IP} Protocol Suite", journal = "Computer Communication Review", year = "1989", volume = "19", number = "2", pages = "32--48", month = apr, } @Misc{Far96, author = "Dan Farmer", title = "Shall We Dust Moscow", howpublished = "Web doc", month = dec, year = "1996", url = "http://www.trouble.org/survey/", } @Book{Ben96, author = "Alain Bensoussan", title = "Les {T}\'{e}l\'{e}coms et le droit", publisher = "Hermes", year = "1996", } @Proceedings{esorics96, title = "Proceedings of the 1996 European Symposium on Research in Computer Security", year = "1996", } @Proceedings{oakland97, institution = "IEEE", title = "Proceedings of the 1997 {IEEE} Symposium on Security and Privacy", editor = "IEEE Computer Society Press", year = "1997", } @Misc{RG95, author = "Ron Rivest and Rosario Gennaro", title = "Course on Network and Computer Security", howpublished = "Web doc", year = "1995", url = "http://theory.lcs.mit.edu/~rosario/6.915/home.html", } @Misc{BWF96, author = "M. Bishop and C. Wee and J. Frank", title = "Goal Oriented Auditing and Logging", howpublished = "Submitted to IEEE Transactions on Computing Systems", year = "1996", url = "http://seclab.cs.ucdavis.edu/papers.html", } @InProceedings{HS97, author = "John Hale and Sujeet Shenoi", title = "Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery", booktitle = "Proceedings of the 1997 IEEE Symposium on Security and Privacy", year = "1997", url = "http://euler.mcs.utulsa.edu/~hale/oakim.ps", keywords = "intrusions detection", } @InProceedings{Aal.97, author = "Paul Ammann and Sushil Jajodia and Catherine D. McCollum and Barbara T. Blaustein", title = "Surviving Information Warfare Attacks on Databases", booktitle = "Proceedings of the 1997 IEEE Symposium on Security and Privacy", year = "1997", url = "http://www.isse.gmu.edu/~csis/publications/oak97-iw.ps", keywords = "intrusions detection", } @InProceedings{KRL97, author = "Calvin Ko and Manfred Ruschitzka and Karl Levitt", title = "Execution Monitoring of Security-Critical Programs in a Distributed System: {A} Specification-based Approach", booktitle = "Proceedings of the 1997 IEEE Symposium on Security and Privacy", year = "1997", keywords = "intrusions detection", } @InProceedings{LJ97, author = "Ulf Lindqvist and Erland Jonsson", title = "How to Systematically Classify Computer Security Intrusions", booktitle = "Proceedings of the 1997 IEEE Symposium on Security and Privacy", year = "1997", url = "http://www.ce.chalmers.se/~ulf/pubs.html", keywords = "intrusions detection", } @TechReport{Lin96, author = "Ulf Lindqvist", title = "Observations on the Nature of Computer Security Intrusions", institution = "Chalmers university of technology", year = "1996", number = "253L", month = dec, keywords = "intrusions detection", } @Misc{RS96, author = "R. L. Rivest and A. Shamir", title = "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps", howpublished = "Web doc", month = may, year = "1996", url = "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps", keywords = "commerce electronique", } @InBook{Hag96, author = "Jean Haguet", title = "{L}'internet~: guide stratégique pour l'entreprise", chapter = "15", publisher = "Masson", year = "1996", url = "http://www.gctech.fr/librairie/documentation.html", keywords = "commerce electronique", } @PhdThesis{Mou97, author = "Abdelaziz Mounji", title = "Rule-Based Distributed Intrusion Detection", school = "Universit\'{e} de Namur", year = "1997", month = "Juillet 1997", keywords = "detection d'intrusions", }