[Bookshelf]

Information Security Bookshelf


Papers

[Papers]

[Books] [ACSA Publications] [Papers] [Presentations] [Reports] [Other Collections]
Books ACSA Publications Papers Presentations Reports Other Collections

Links below will open in a new window for easier reading

Prudent engineering practice for cryptographic protocols
Abadi, M. & Needham, R.
1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

New Thinking About Information Technology Security
Marshall D. Abrams & Michael V. Joyce
This paper was first published in Computers & Security, Vol. 14 No.1 pp. 57-68, © Elsevier Advanced Technology 1995, Oxford, UK; http://www.elsevier.nl/locate/compsec.

Trusted Computing Update
Marshall D. Abrams & Michael V. Joyce
This paper was first published in Computers & Security, Vol. 14 No.1 pp. 57-68, © Elsevier Advanced Technology 1995, Oxford, UK; http://www.elsevier.nl/locate/compsec.

Trusted System Concepts
Marshall D. Abrams & Michael V. Joyce
This paper was first published in Computers & Security, Vol. 14 No.1 pp. 57-68, © Elsevier Advanced Technology 1995, Oxford, UK; http://www.elsevier.nl/locate/compsec.

Frank Miller: Inventor Of The One-Time Pad
Steven M. Bellovin
Columbia University Tech Report

No Silver Bullet Essence and Accident in Software Engineering
Fred Brooks
Proceedings of the IFIP Tenth World Computing Conference: 10691076

Designing an Authentication System: a Dialogue in Four Scenes
Bill Bryant
MIT, 1988

A logic of authentication
Michael Burrows, Martin Abadi, and Roger Needham
ACM Transactions on Computer Systems (TOCS)
TOCS Homepage archive Volume 8 Issue 1, Feb. 1990

New Directions In Cryptography
Whitfield Diffie And Martin E. Hellman
IEEE Transactions on Information Theory, 1976

The First Ten Years Of Public Key Cryptography
W. Diffie
Proceedings of the IEEE 76:5, May 1988

A prototype B3 trusted X Window System
Jeremy Epstein, John McHugh, Rita Pascale, Hilarie Orman, Glenn Benson, Charles Martin, Ann Marmor-Squires, Bonnie Danner, Martha Branstad
Seventh Annual Computer Security Applications Conference, 1991

W32.Stuxnet Dossier
Nicolas Falliere, Liam O Murchu, and Eric Chien
Symantec Whitepaper, 2011

Multics Security Evaluation: Vulnerability Analysis
Paul A. Karger and Roger R. Schell
HQ Electronic Systems Division: Hanscom AFB, MA, 1974

Analysis of an Electronic Voting System
T. Kohno
IEEE Symposium of Security and Privacy, 2004

The compromise of US navy cryptanalysis after the battle of midway
B. Nelson Macpherson
Intelligence and National Security
Volume 2, Issue 2, 1987

Secure Communications Over Insecure Channels
Ralph C. Merkle
ACM, 1979

Password Security: A Case History
Morris & Thompson
ACM, 1979

On The Criteria To Be Used In Decomposing Systems Into Modules
D.L. Parnas
ACM, 1972

The Athens Affair
Prevelakis, Spinellis
IEEE Spectrum, July 2007

Vulnerabilities of network control protocols: an example
Eric Rosen
ACM SIGCOMM Computer Communication Review
Volume 11 Issue 3, July 1981
(RFC 789)

End-To-End Arguments In System Design
J.H. Saltzer, D.P. Reed, and D.D. Clark
ACM Transactions on Computer Systems (TOCS)
Volume 2 Issue 4, Nov. 1984

The Protection of Information in Computer Systems
Jerome H. Saltzer & Michael D. Schroeder
Massachusetts Institute of Technology Cambridge, Mass. USA 1975

TCB Subsets for Incremental Evaluation
W. R. Shockley, and R.R. Schell
This paper was first published in Proc. AIAA/ASIS/IEEE 3rd Aerospace Computer Security Conference, 1987, pp. 131-139.

The Internet Worm Program: An Analysis
Eugene H. Spafford
ACM SIGCOMM Computer Communication Review, 1989

How To 0wn The Internet In Your Spare Time
Staniford, Paxson, Weaver
Proceedings of the 11th USENIX Security Symposium, 2002

Department Of Defense Trusted Computer System Evaluation Criteria
DOD, 1985

Randomness Requirements For Security, RFC 4086
http://www.ietf.org/rfc/rfc4086.txt


[Return to Bookcase] [Return to ACSA Home Page] [Return to ACSAC Conference Page] [Contribute to Bookshelf]
Return to Bookshelf Home Return to ACSA Home Return to ACSAC Home Contribute to Bookshelf