| |
1. @Article{Aal.91,
Author= " T. Araki and T. Morizumi and H. Nagase and T. Takenaka and K. Yamashita",
Title= "Security level assignment by graph analysis",
Journal= "IEICE Transactions",
Volume = "E74",
Number = "8",
Pages = "2166-2175",
Month = "August",
Year = "1991"}
2. @Article{AGS83,
Author= " S.R. Ames and M. Gasser and R.R. Schell",
Title= "Security Kernel Design and Implementation : An Introduction",
Journal= "Computer",
Volume = "16",
Number = "7",
Month = "July",
Year = "1983"}
3. @Article{AJ87,
Author= "M.D. Abrams and A.B. Jeng",
Title= "Network Security Protocol Reference Model and the Trusted Computer System Evaluation Criteria",
Journal= "IEEE Network Magazine",
Pages = "24-33",
Month = "April",
Year = "1987"}
4. @Article{AL91,
Author= " J. Alves-Foss and K. Levitt",
Title= "The Verification of Secure Distributed Systems",
Journal= "IEEE, COMPCON",
Year = "1991"}
5. @Article{AM92,
Author= "Ludovic M\'e and Veronique Alanou",
Title= "Une exp\'{e}rience d'audit de s\'{e}curit\'{e} sous {AIX R}3.1",
Journal= "TRIBUNIX",
page = "30-38",
Volume = "8",
Number = "43",
Year = "1992"}
6. @Article{Ams88,
Author= "Ellen Amsel, CISA",
Title= "Network Security and Access Controls",
Journal= "Computers and Security",
Volume = "7",
Month = "February",
Year = "1988"}
7. @Article{AP87a,
Author= " M.D. Abrams and H.J. Podell",
Title= "Network Security Overview",
Journal= "Computer and Networks Security",
Year = "1987"}
8. @Article{AP87b,
Author= " M.D. Abrams and H.J. Podell",
Title= "Society and policy issues",
Journal= "Computer and Networks Security",
Year = "1987"}
9. @Article{AP87c,
Author= " M.D. Abrams and H.J. Podell",
Title= "Management Issues",
Journal= "Computer and Networks Security",
Year = "1987"}
10. @Article{AP87d,
Author= " M.D. Abrams and H.J. Podell",
Title= "Formal Models",
Journal= "Computer and Networks Security",
Year = "1987"}
11. @Article{AP87e,
Author= " M.D. Abrams and H.J. Podell",
Title= "Protocols",
Journal= "Computer and Networks Security",
Year = "1987"}
12. @Article{Bai82,
Author= " S.C. Bailin",
Title= "Distribution of Access Control Functions in a Local Area Networks",
Journal= "IEEE CH1811-9/82/0000/0118\$00.75",
Year = "1982"}
13. @Article{BD87,
Author= " S. Budkowski and P. Dembinski",
Title= "An Introduction to Estelle : A Specification language for Distributed Systems",
Journal= "Computer Networks and ISDN systems",
Volume = "3",
Number = "3",
Year = "1987"}
14. @Article{Bel89,
Author= "S.M. Bellovin",
Title= "Security Problems in the TCP/IP Protocol Suite",
Journal= "Computer Communication Review",
Year = "1989",
Volume = "19",
Number = "2",
Pages = "32-48",
Month = "April",
Keywords= ""}
15. @Article{Ber87,
Author= " D.M. Berry",
Title= "Towards a Formal Basis for the Formal Development Method and the Ina Jo Specification Language",
Journal= "IEEE transaction on software Engineering",
Volume = "13",
Number = "2",
Month = "February",
Year = "1987"}
16. @Article{BKY85,
Author= " W.E. Boebert and R.Y. Kain and W.D. Young",
Title= "Secure Computing : The Secure ADA Target Aproach",
Journal= "Scientific Honeyweller, Vol. 6, N 2",
Month = "July",
Year = "1985"}
17. @Article{BM90,
Author= " S.M. Bellovin and M. Merritt",
Title= "Limitations of the {K}erberos Authentication System",
Journal= "Computer Communications Review",
Month = "octobre",
Year = "1990"}
18. @Article{Boc90,
Author= " G. V. Bochman",
Title= "Protocol specification for {OSI}",
Journal= "Computer networks and ISDN systems",
Volume = "18",
Pages = "167-184",
Year = "1990"}
19. @Article{Bok81a,
Author= " S.H. Bokhari",
Title= "On the Mapping Problem",
Journal= "IEEE Transaction on Computers",
Volume = "C-30",
Number = "3",
Year = "1981"}
20. @Article{Bok81b,
Author= " S.H. Bokhari",
Title= "The Role of a Well Defined Auditing Process in the
Enforcement of Privacy Policy and Data Security",
Journal= "IEEE",
Year = "1981"}
21. @Article{BP92,
Author= " J.B. Bowles and C.E. Pelaez",
Title= "Data security-bad code",
Journal= "IEEE Spectrum",
Month = "August",
Year = "1992",
Keywords= "hacking"}
22. @Article{Bra87,
Author= " D.K. Branstad",
Title= "Considerations for Security in the {OSI} Architecture",
Journal= "IEEE Network Magazine",
Pages = "34-39",
Month = "April",
Year = "1987"}
23. @Article{BS79,
Author= " M. Bishop and L. Snyder",
Title= "The Transfert of Information and Authority in a Protection System",
Journal= "ACM 0-89791-009-5/79/1200/0045",
Year = "1979"}
24. @Article{BS80,
Author= " G.V. Bochmann and C.A. Sunshine",
Title= "Formal Methods in Communication Protocol Design",
Journal= "IEEE Transactions on Communications",
Volume = "28",
number ="4",
Month = "April",
Year = "1980"}
25. @Article{Buf95,
Author= "Thierry Buffenoir",
Title= "Fonctions de s\'{e}curit\'{e} pour la t\'{e}l\'{e}copie",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "103-110",
Year = "1995"}
26. @Article{Car93,
Author= " Ulf Carlsen",
Title= "Using Logics to detect Implementation-Dependent Flaws",
Year = "1993",
Keywords= "authentication logic"}
27. @Article{Cat95,
Author= "Andr\'{e} Cattieuw",
Title= "Notion de preuve sans transfert de connaissance",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "35-42",
Year = "1995"}
28. @Article{CGHM81,
Author= " M.H. Cheheyl and M. Gasser and G.A. Huff and J.K. Millen",
Title= "Verifying Security",
Journal= "Computing Surveys",
Volume = "13",
Number = "3",
Month = "September",
Year = "1981"}
29. @Article{CLT88,
Author= " A.C. Capel and C. Lafierre and K.C. Toth",
Title= "Protecting the security of {X}.25 Communications",
Journal= "Data Communication",
Month = "November",
Year = "1988"}
30. @Article{Col90,
Author= " Robert Cole",
Title= "A Model for Security Distributed Systems",
Journal= "Computers and Security",
Volume = "9",
Month = "June",
Year = "1990"}
31. @Article{Coo71,
Author= " S.A. Cook",
Title= "The Complexity of Theorem Proving Procedures",
Journal= "ACM Symposium on Theory of Computing",
Year = "1971"}
32. @Article{CW87,
Author= " D.D. Clark and D.R. Wilson",
Title= "A Comparison of Commercial and Military Computer Security Policies",
Journal= "IEEE",
Year = "1987"}
33. @Article{Dav81,
Author= " D.W. Davies",
Title= "Ciphers and the Application of the Data Encryption Standard",
Journal= "Computer IEEE",
Year = "1981"}
34. @Article{Dav83,
Author= " D.W. Davies",
Title= "Applying the RSA Digital Signature to Electronic Mail",
Journal= "Computer",
Month = "February",
Year = "1983"}
35. @Article{Deh89,
Author= " Khosrow Dehnad",
Title= "A Simple Way of Improving the Login Security",
Journal= "Computers and Security",
Volume = "8",
Month = "November",
Year = "1989"}
36. @Article{Den76,
Author= " Dorothy E. Denning",
Title= "A Lattice Model of Secure Information Flow",
Journal= "ACM",
Volume = "19",
Number = "5",
Month = "May",
Year = "1976"}
37. @Article{Den87,
Author= " D.E. Denning",
Title= "An Intrusion-Detection Model",
Journal= "IEEE transaction on Software Engineering",
Pages= "222-232",
Volume = "13",
Number = "2",
Year = "1987"}
38. @Article{Den96,
Author= "Dorothy E. Denning",
Title= "A Taxonomy for Key Escrow Encryption Systems",
Journal= "Communication of the ACM",
Year = "1996",
Volume = "39",
Number = "3",
Month = "March",
Keywords= "tiers de confiance key escrowing"}
39. @Article{DGKS94,
Author= "Michel Denault and Dimitris Gritzalis and Dimitris Karagiannis and Paul Spirakis",
Title= "Intrusion Detection: Approach and Performance Issues of the SECURENET System",
Journal= "Computers and Security",
Volume = "13",
Pages = "495-508",
Year = "1994"}
40. @Article{DH76,
Author= " W. Diffie and M.E. Hellam",
Title= "New Directions in Cryptography",
Journal= "IEEE Transactions on Information Theory",
Volume = "IT-22",
Number = "6",
Month = "November",
Year = "1976"}
41. @Article{DH77,
Author= " W. Diffie and M.E. Hellam",
Title= "Exhaustive Cryptanalysis of the NBS DES",
Journal= "Computer",
Volume = "10",
Number = "6",
Month = "June",
Year = "1977"}
42. @Article{DM83,
Author= " R. DeMillo and M. Merritt",
Title= "Protocol for Data Security",
Journal= "Computer",
Month = "February",
Year = "1983"}
43. @Article{DMC92,
Author= "R. Dixon and C. Marston and P. Collier",
Title= "A Report on the Joint CIMA and IIA Computer Fraud Survey",
Journal= "Computers and Security",
Year = "1992",
Volume = "11",
Pages = "307-313",
Keywords= "hacking"}
44. @Article{ET91,
Author= " D. Estrin and G. Tsudik",
Title= "Secure Control of Transit internetwork traffic",
Journal= "Elsevier Science Publishers B.V. Ed.",
Year = "1991"}
45. @Article{Fen74,
Author= " J.S. Fenton",
Title= "Memoryless Subsystems",
Journal= "The computer journal",
Volume = "17",
Number = "2",
Year = "1974"}
46. @Article{Fer90,
Author= " R. Ferreira",
Title= "The Practical Application of State of The Art Security in Real Environments",
Journal= "Lecture Notes in Computer Science",
Volume = "453",
Year = "1990"}
47. @Article{Fer91,
Author= " Josep Domingo-Ferrer",
Title= "Algorithm-Sequenced Access Control",
Journal= "Computers and Security",
Volume = "10",
Month = "October",
Year = "1991"}
48. @Article{Fra83,
Author= " L.J. Fraim",
Title= "Scomp: A Solution to the Multilevel Security Problem",
Journal= "Computer",
Volume = "16",
Number = "7",
Month = "July",
Year = "1983"}
49. @Article{Fra95a,
Author= "Henri Francesconi",
Title= "L'\'{e}coute des signaux parasites",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "125-128",
Year = "1995"}
50. @Article{Fra95b,
Author= "Henri Francesconi",
Title= "La r\'{e}glementation fran\c{c}aise sur la cryptologie",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "129-136",
Year = "1995"}
51. @Article{GMP92,
Author= " J.Glasgow and G. MacEwen and P. Panangaden",
Title= "A logic for Reasoning About Security",
Journal= "ACM Transactions on Computer Systems",
Volume = "10",
Number = "3",
Month = "August",
Year = "1992",
Keywords= "authentication logic"}
52. @Article{GS91,
Author= "Simson Garfinkel and Gene Spafford",
Title= "Practical UNIX Security",
Journal= "SunExpert",
Year = "1991",
Pages = "68-73",
Keywords= ""}
53. @Article{GS92b,
Author= "C.R Gent and C.P Sheppard",
Title= "Predicting Time Series by a Fully Connected Neural Network Trained by Back Propagation",
Journal= "Computing and Control Engineering Journal",
Month = "May",
Year = "1992"}
54. @Article{GT95,
Author= "Jean-Pierre Georges and Roland Thies",
Title= "Les services d'authentification et de s\'{e}curit\'{e} dans le GSM",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "89-102",
Year = "1995"}
55. @Article{Gui91,
Author= "Daniel Guinier",
Title= "Computer Virus Identification by Neural Networks",
Journal= "ACM SIGSAC Review",
Year = "1991",
Volume = "9",
Number = "4",
Pages = "49-59"}
56. @Article{GUQ95,
Author= "Louis Guillou and Michel Ugon and Jean-Jacques Quisquater",
Title= "La carte \`{a} puce, un usage public de la cryptologie",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "67-88",
Year = "1995"}
57. @Article{Gus88,
Author= " D. Gusfield",
Title= "A Graph Theoric Approach to Statistical Data Security",
Journal= "SIAM J. Computer",
Volume = "17",
Number = "3",
Year = "1988"}
58. @Article{HA??,
Author= " Stephen E. Hansen and E. Todd Atkins",
Title= "Centralized System Monitoring With Swatch",
Journal= "Proceedings of the the USENIX Conference",
Year = "??"}
59. @Article{Har89,
Author= " C.L. Harrold",
Title= "An Introduction to the SMITE Approach to Secure Computing",
Journal= "Computers and Security",
Volume = "8",
Month = "October",
Year = "1989"}
60. @Article{Har95,
Author= "Thierry Harl\'{e}",
Title= "Pas de syst\`{e}me cryptographique sans gestion de cl\'{e}s",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "53-60",
Year = "1995"}
61. @Article{Has91,
Author= " J. Hastwell",
Title= "Measuring User Accountability in an Integrated Network Environment",
Journal= "",
Year = "1991"}
62. @Article{Heb95a,
Author= "Patrick H\'{e}brard",
Title= "X509, un cadre g\'{e}n\'{e}ral d'authentification",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "111-124",
Year = "1995",
Keywords= "authentication X509"}
63. @Article{Her87,
Author= " I.S. Herschberg",
Title= "The Hackers' Comfort",
Journal= "Computers and Security",
Volume = "6",
Number = "2",
Pages = "133-138",
Year = "1987",
Keywords= "hacking"}
64. @Article{Hig89,
Author= "H.J. Highland",
Title= "A Macro Virus",
Journal= "Computers and Security",
Year = "1989",
Volume = "8",
Number = "3",
Pages = "178-188",
Keywords= ""}
65. @Article{Hig90,
Author= "H.J. Highland",
Title= "Using and Breaking Encryption",
Journal= "Computers and Security",
Year = "1990",
Volume = "9",
Number = "8",
Pages = "668-671",
Keywords= "encryption emigma"}
66. @Article{HRU76,
Author= " M.A. Harrison and W.L. Ruzzo and J.D. Ullman",
Title= "Protection in operating systems",
Journal= "ACM",
Volume = "19",
Number = "8",
Pages = "461-471",
Month = "August",
Year = "1976"}
67. @Article{Hru88,
Author= " J.Hruska",
Title= "Data viruses, Trojan horses and logic bombs-how to combat them?",
Journal= "Computer Fraud and Security Bulletin",
Volume = "10",
Number = "6",
Month = "April",
Year = "1988",
Keywords= "hacking"}
68. @Article{Jan92,
Author= " Janus Associates",
Title= "Information Security Administration Model : A Management Model to Help Identify the Best Practices of the Administration Function within the Security Group",
Journal= "Computer and Security",
Volume = "11",
Pages= "327-340",
Year = "1992"}
69. @Article{Jef96,
Author= "Terry L. Jeffress",
Title= "The Auditcon Utility",
Journal= "NetWare Connection",
Year = "1996",
Pages = "32-42",
Month = "December",
Keywords= ""}
70. @Article{JMG88,
Author= " C. Jard and J.F. Monin and R. Groz",
Title= "Development of V\'{e}da, a Prototyping Tool for Distributed Algorithms",
Journal= "IEEE Transactions on software engineering",
Volume = "14",
Number = "3",
Month = "March",
Year = "1988"}
71. @Article{Kak83,
Author= " S.C. Kak",
Title= "Data Security in Computer Networks",
Journal= "Computer IEEE",
Pages = "8-10",
Year = "1983"}
72. @Article{Kak88,
Author= " Viiveke Fak",
Title= "Are we vulnerable to a virus attack? A report from Sweden",
Journal= "Computers and Security",
Volume = "7",
Month = "April",
Year = "1988",
Keywords= "hacking"}
73. @Article{KBN88,
Author= " B.C. Karp and L.K. Barker and L.D. Nelson",
Title= "The Secure Data Network System",
Journal= "ATT Technical Journal",
Pages = "19-27",
Month = "May",
Year = "1988"}
74. @Article{Kem82a,
Author= " R.A. Kemmerer",
Title= "Formal Verification of an Operating System Kernel",
Journal= "Communication of the ACM",
Volume = "12",
Number = "10",
Pages = "576-581",
Year = "1982"}
75. @Article{Klu91,
Author= " H.M. Kluepfel",
Title= "In search of the cuckoo's nest - an auditing framework for evaluating the security of open networks",
Journal= "EDP Auditor Journal",
Volume = "3",
Pages = "36-48",
Year = "1991",
Keywords= "hacking"}
76. @Article{KP91,
Author= " R.A. Kemmerer and P.A. Porras",
Title= "Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels",
Journal= "IEEE Transaction on Software Engineering",
Volume = "17",
Number = "11",
Month = "November",
Year = "1991"}
77. @Article{Kru89,
Author= " Jan P. Kruys",
Title= "Security of Open Systems",
Journal= "Computers and Security",
Volume = "8",
Month = "April",
Year = "1989"}
78. @Article{Kru91,
Author= " Jan P. Kruys",
Title= "Progress in Secure Distributed Systems",
Journal= "Computers and Security",
Volume = "10",
Month = "August",
Year = "1991"}
79. @Article{Lac74,
Author= " R.D. Lackey",
Title= "Penetration of computer systems an overview",
Journal= "Honeywell Computer Journal",
Year = "1974",
Keywords= "hacking"}
80. @Article{Lal.90c,
Author= " T.F. Lunt and D. Denning and R. Schell and M. Heckman and W. Shockley",
Title= "The SeaView Security Model",
Journal= "IEEE Trans. on Soft. Engineering",
Volume = "16",
Number = "6",
Month = "June",
Year = "1990"}
81. @Article{Lam73,
Author= " B.W. Lampson",
Title= "A Note on the Confinement Problem",
Journal= "ACM",
Volume = "16",
Number = "10",
Pages = "613-615",
Month = "October",
Year = "1973"}
82. @Article{Lam74,
Author= " B.W. Lampson",
Title= "Protection",
Journal= "ACM",
Volume = "8",
Number = "1",
Pages = "18-24",
Month = "January",
Year = "1974"}
83. @Article{Lan81,
Author= " C.E. Landwerh",
Title= "Formal Models for Computer Security",
Journal= "Computer Surveys",
Volume = "13",
Pages = "247-275",
Year = "1981"}
84. @Article{LAN86,
Author= " Y. Lapid and N. Ahituv and S. Neumann",
Title= "Approaches to handling 'Trojan Horse' threats",
Journal= "Computer and security",
Volume = "5",
Month = "September",
Year = "1986",
Keywords= "hacking"}
85. @Article{LAN89,
Author= "{European Institute for System Security} {EISS}",
Title= "Local Area Network Security",
Journal= "Lecture Notes in Computer Science",
Volume = "396",
Year = "1989"}
86. @Article{Lat90,
Author= " David L. Lathrop",
Title= "Perestroika and its implications for Computer Security in the {U.S.S.R.}",
Journal= "Computers and Security",
Volume = "9",
Month = "December",
Year = "1990"}
87. @Article{Lee90,
Author= " P.J. Lee",
Title= "Secure User Access Control for Public Networks",
Journal= "Lecture Notes in Computer Science",
Volume = "453",
Year = "1990"}
88. @Article{Lep95,
Author= "Marie-Noelle Lepareux",
Title= "Introduction aux protocoles z\'{e}ro-connaissance",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "43-52",
Year = "1995"}
89. @Article{LHM84,
Author= " C.E. Landwehr and C.L. Heitmeyer and J. McLean",
Title= "A Security Model for Military Message System",
Journal= "ACM Trans. Comput. Syst.",
Volume = "2",
Pages = "198-222",
Year = "1984"}
90. @Article{Llo90,
Author= " Ivor Lloyd",
Title= "Software Evaluation in High Integrity Systems",
Journal= "Computers and Security",
Volume = "9",
Month = "August",
Year = "1990"}
91. @Article{LR92,
Author= " D. Longley and S. Rigby",
Title= "An Automatic Search for Security Flaws in Key Management Schemes",
Journal= "Computer and Security",
Volume = "11",
Number = "1",
Pages = "75-89",
Month = "May",
Year = "1992"}
92. @Article{LS90,
Author= " W.P. Lu and M.K. Sundareshan",
Title= "A Model for Multilevel Security in Computer Networks",
Journal= "IEEE trans. on software",
Volume = "16",
Number = "6",
Month = "June",
Year = "1990"}
93. @Article{Lun89,
Author= " Teresa F. Lunt",
Title= "Access Control Policies : Some unanswered Questions",
Journal= "Computers and Security",
Volume = "8",
Month = "February",
Year = "1989"}
94. @Article{Lun93,
Author= " Teresa F. Lunt",
Title= "A Survey of Intrusion Detection techniques",
Journal= "Computers and Security",
Volume = "12",
Year = "1993"}
95. @Article{LV92,
Author= " G.E. Liepins and H.S. Vaccaro",
Title= "Intrusion Detection: Its Role and Validation",
Journal= "Computers and Security",
Volume = "11",
Pages = "347-355",
Year = "1992"}
96. @Article{MA96,
Author= "Ludovic M\'{e} and V\'{e}ronique Alanou",
Title= "D\'{e}tection d'intrusions dans un syst\`{e}me informatique~: m\'{e}thodes et outils",
Journal= "TSI",
Volume = "15",
Number = "4",
Pages = "429-450",
Year = "1996" }
97. @Article{MAA97,
Author= "Ludovic M\'{e} and V\'{e}ronique Alanou and Jorg Abraham",
Title= "Utilisation de cartes de Kohonen pour d\'{e}tecter des intrusions dans un syst\`{e}me informatique : une pr\'{e}-\'{e}tude",
Journal= "Valgo",
Year = "1997"}
98. @Article{Mcc90,
Author= " D. MC. Cullough",
Title= "A Hookup Theorem for Multilevel Security",
Journal= "IEEE Trans. on Soft. Engineering",
Volume = "16",
Number = "6",
Month = "June",
Year = "1990"}
99. @Article{Men90,
Author= " Belden Menkus",
Title= "How an 'Audit Trail' Aids in Maintaining Information Integrity...as Illustrated in Retailing",
Journal= "Computers and Security",
Volume = "9",
Number = "2",
Month = "April",
Year = "1990"}
100. @Article{Men91,
Author= " B. Menkus",
Title= "'Hackers': know the adversary",
Journal= "Computers and Security",
Volume = "10",
Number = "5",
Pages = "405-409",
Month = "August",
Year = "1991",
Keywords= "hacking"}
101. @Article{Mer79,
Author= " P.M. Merlin",
Title= "Specification and Validation of Protocols",
Journal= "IEEE Transactions on Communications",
Volume = "27",
Number = "11",
Month = "November",
Year = "1979"}
102. @Article{Mer90a,
Author= " Lindsay C.J. Mercer",
Title= "Tailor-made Auditing of Information Systems for the Detection of Fraud",
Journal= "Computers and Security",
Volume = "9",
Number = "1",
Month = "February",
Year = "1990"}
103. @Article{Mer90b,
Author= " Lindsay C.J. Mercer",
Title= "Fraud Detection via Regression Analysis",
Journal= "Computers and Security",
Volume = "9",
Number = "5",
Month = "June",
Year = "1990"}
104. @Article{MF90,
Author= " A.M. Myong and K.A. Forcht",
Title= "The computer hacker: friend or foe?",
Journal= "Journal of Computer Information Systems",
Volume = "31",
Number = "2",
Pages = "47-49",
Year = "1990",
Keywords= "hacking"}
105. @Article{Mil89,
Author= " J.K. Millen",
Title= "Models of Multilevel Computer Security",
Journal= "Advance in Computers",
Volume = "29",
Year = "1989"}
106. @Article{ML91,
Author= " M. Masmoudi and D.E. Lafaye de Micheaux",
Title= "Les lignes priv\'{e}es virtuelles",
Journal= "T.S.I.",
Volume = "10",
Number = "2",
Year = "1991"}
107. @Article{MS90,
Author= " Robert A. McKosky and Sajjan G. Shiva",
Title= "A File Integrity Checking System to Detect and Recover from Program Modification Attacks in Multi-User Computer Systems",
Journal= "Computers and Security",
Volume = "9",
Number = "4",
Month = "May",
Year = "1990"}
108. @Article{MS95,
Author= "David M'Raihi and Bruce Schneider",
Title= "Taxonomie des algorithmes cryptographiques",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "11-34",
Year = "1995"}
109. @Article{Nes87,
Author= "D.M. Nessett",
Title= "Factors Affecting Distributed System Security",
Journal= "IEEE TOSE",
Month = "February",
Year = "1987"}
110. @Article{NF89,
Author= " Norme Fran\c{c}çaise",
Title= "Interconnexion des syst\`{e}mes ouverts",
Journal= "NF EN 27498 (ISO 7498-1)",
Month = "ao\^{u}t",
Year = "1989"}
111. @Article{NOP87,
Author= " D.B. Newman and J.K. Omura and R.L. Pickholtz",
Title= "Public Key Management for Network Security",
Journal= "IEEE Network Magazine",
Volume = "1",
Number = "2",
Month = "April",
Year = "1987"}
112. @Article{NS78,
Author= " R.M. Needham and M.D. Schroeder",
Title= "Using encryption for authentication in large networks of computers",
Journal= "ACM",
Volume = "21",
Number = "12",
Year = "1978"}
113. @Article{OA90,
Author= " Ingrid M. Olson and Marshall D. Abrams",
Title= "Computer Access Control Policy Choices",
Journal= "Computers and Security",
Volume = "9",
Month = "December",
Year = "1990"}
114. @Article{OT89,
Author= " E. Okamoto and K. Tanaka",
Title= "Identity-Based Information Security Management System for Personal Computer Networks",
Journal= "IEEE Journal on Selected Areas in Communications", Volume = "7",
Number = "2",
Month = "February",
Year = "1989"}
115. @Article{PH90,
Author= " R. Paans and I.S. Herschberg",
Title= "Auditing the Change Management Process",
Journal= "Computers and Security",
Volume = "9",
Number = "2",
Month = "April",
Year = "1990"}
116. @Article{Pic87,
Author= " J. Picciotto",
Title= "The Design of an Effective Auditing Subsystem",
Journal= "IEEE",
Year = "1987"}
117. @Article{Pre89,
Author= " C.M. Preston",
Title= "Artificial Intelligence Applied to Information System Security",
Journal= "Information Age (Guildford)",
Volume = "11",
Number = "411",
Pages = "217-224",
Year = "1989"}
118. @Article{PS91,
Author= " D. Pottas and S.H. von Solms",
Title= "A Computerized Management Reporting Aid for a Mainframe Security System",
Journal= "Computers and Security",
Volume = "10",
Month = "October",
Year = "1991"}
119. @Article{PW88,
Author= " L.G. Pierson and E.L. Witzke",
Title= "A Security Methodology for Computer Networks",
Journal= "ATT Technical Journal",
Pages = "28-36",
Month = "May",
Year = "1988"}
120. @Article{Ram90,
Author= " Raju Ramaswamy",
Title= "A key Management Algorithm for Secure Communication in Open Systems Interconnection Architecture",
Journal= "Computers and Security",
Volume = "9",
Month = "February",
Year = "1990"}
121. @Article{RC77,
Author= " R.C. Read and D.G. Corneil",
Title= "The Graph Isomorphism Disease",
Journal= "Journal of Graph Theory",
Volume = "1",
Year = "1977"}
122. @Article{Rei95,
Author= "Jim Reid",
Title= "Open Systems Security: Traps and Pitfalls",
Journal= "Computers & Security",
Year = "1995",
Number = "14",
Pages = "496-517"}
123. @Article{RMS89,
Author= " Bruce L. Riddle and Murray S. Miron and Judith A. Semo",
Title= "Passwords in Use in a University Timesharing Environment",
Journal= "Computers and Security",
Volume = "8",
Month = "November",
Year = "1989"}
124. @Article{RMV94,
Author= "Pierre Rolin and Ludovic M\'{e} and Jos\'{e} Vazquez",
Title= "S\'{e}curit\'{e} des syst\`{e}mes informatiques",
Journal= "R\'{e}seaux et Informatique Repartie",
Year = "1994",
Pages = "31-74"}
125. @Article{Rou85,
Author= " C.C. Rous",
Title= "What makes hackers tick? A computer owner's guide",
Journal= "CIPS Review",
Volume = "9",
Number = "4",
Pages = "14-15",
Month = "July",
Year = "1985",
Keywords= "hacking"}
126. @Article{Rou95,
Author= "Yves Le Roux",
Title= "L'affaire Clipper, les d\'{e}bats sur le chiffrement aux Etats-Unis",
Journal= "Syst\`{e}mes et s\'{e}curit\'{e}",
Pages = "61-66",
Year = "1995"}
127. @Article{RR83,
Author= " J. Rushby and B. Randell",
Title= "A Distributed Secure System",
Journal= "Computer",
Volume = "16",
Number = "7",
Pages = "5-67",
Year = "1983"}
128. @Article{RSA78a,
Author= " R.L. Rivest and A. Shamir and L. Adleman",
Title= "A Mothod for Obtaining Digital Signatures and Public-key Cryptosystems",
Journal= "ACM",
Volume = "2",
Number = "2",
Month = "February",
Year = "1978"}
129. @Article{Rus81,
Author= " J. Rushby",
Title= "Design and Verification of Secure Systems",
Journal= "ACM",
Volume = "15",
Number = "5",
Pages = "12-21",
Month = "December",
Year = "1981"}
130. @Article{Rus90,
Author= "D. Russel",
Title= "High-level Security Architecture and the {K}erberos System",
Journal= "Computer Networks and ISDN Systems",
Volume = "19",
Pages = "201-214",
Year = "1990"}
131. @Article{San88,
Author= " R.S. Sandhu",
Title= "The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes",
Journal= "Association for Computing Machinery",
Volume = "35",
Number = "2",
Month = "April",
Year = "1988"}
132. @Article{Sat89,
Author= " M. Satyanarayanan",
Title= "Integrating Security in a Large Distributed System",
Journal= "ACM TOCS",
Volume = "7",
Number = "3",
Pages = "247-280",
Month = "August",
Year = "1989"}
133. @Article{Sch89,
Author= "Herv\'{e} Schauer",
Title= "La comptabilit\'{e} UNIX System V",
Journal= "Tribunix",
Year = "1989",
Volume = "26"}
134. @Article{SG91,
Author= " S.W. Shieh and V.D. Gligor",
Title= "A Pattern-Oriented Intrusion-Detection Model and its Applications",
Journal= "IEEE",
Year = "1991"}
135. @Article{SH96,
Author= "Michael Shoffner and Merlin Hughes",
Title= "Java and Web-Executable Object Security",
Journal= "Dr. Dobb's Journal",
Year = "1996",
Month = "november",
url= "http://www.ddj.com/ddj/1996/1996.11/shof.htm"}
136. @Article{Sha49,
Author= " C.E. Shannon",
Title= "Communication Theory of Secure Systems",
Journal= "Bell System Technical Journal",
Volume = "28",
Year = "1949"}
137. @Article{Sim89,
Author= " G.J. Simmons",
Title= "A Protocol to Provide Verifiable Proof of Identity and Unforgeable transaction Receipts",
Journal= "IEEE Journal on Selected Areas in Communications",
Volume = "7",
Number = "4",
Month = "May",
Year = "1989"}
138. @Article{Sny81,
Author= " L. Snyder",
Title= "Formal Models of Capability-Based Protection Stystems",
Journal= "IEEE trans. comput",
Volume = "C30",
Number = "3",
Year = "1981"}
139. @Article{Sto88,
Author= " C. Stoll",
Title= "Stalking the wily hacker",
Journal= "Communications of the ACM",
Volume = "31",
Number = "5",
Pages = "484-97",
Month = "May",
Year = "1988",
Keywords= "hacking"}
140. @Article{TGC90,
Author= " C. Tsai and V.D. Gligor and C.S. Chandersekaran",
Title= "On the Identification of Covert Storage Channels in Secure Systems",
Journal= "IEEE Transactions on Software Engineering",
Month = "June",
Year = "1990"}
141. @Article{TI89,
Author= " S. Tsujii and T. Itoh",
Title= "An ID-Based Cryptosystem Based on the Discrete Logarithm Problem",
Journal= "IEEE Journal on Selected Areas in Communications",
Volume = "7",
Number = "4",
Month = "May",
Year = "1989"}
142. @Article{Var89,
Author= " Vijay Varadharajan",
Title= "Verification of Network Security Protocols",
Journal= "Computers and Security",
Volume = "8",
Month = "December",
Year = "1989"}
143. @Article{Var90a,
Author= " Vijay Varadharajan",
Title= "Network Security Policy Models",
Journal= "Lecture Notes in Computer Science",
Volume = "453",
Pages = "74-95",
Year = "1990"}
144. @Article{VK83,
Author= " V.L. Voydock and S.T. Kent",
Title= "Security Mechanisms in High Level Network Protocols",
Journal= "ACM Computing Surveys",
Pages= "135-171",
Month = "June",
Year = "1983"}
145. @Article{VK84,
Author= " V.L. Voydock and S.T. Kent",
Title= "Security Mechanisms in a Transport Layer Protocol",
Journal= "Computer Networks",
Volume = "8",
Pages = "433-450",
Year = "1984"}
146. @Article{VK85,
Author= " V.L. Voydock and S.T. Kent",
Title= "Security in High Level Network Protocols",
Journal= "IEEE Comm.",
Pages = "12-24",
Month = "July",
Year = "1985"}
147. @Article{WC90,
Author= " S.R. White and L. Comerford",
Title= "ABYSS: An Architecture for Software Protection",
Journal= "IEEE Trans. on Soft. Engineering",
Volume = "16",
Number = "6",
Month = "June",
Year = "1990"}
148. @Article{WFZ92,
Author= " J.Wu and E.B. Fernandez and R. Zhang",
Title= "Some Extensions to the Lattice Model for Computer Security",
Journal= "Computer and Security",
Volume = "11",
Year = "1992"}
149. @Article{Whi89,
Author= " C.E. White",
Title= "Viruses and worms: a campus under attack",
Journal= "Computer and security",
Volume = "8",
Month = "June",
Year = "1989",
Keywords= "hacking"}
150. @Article{Wing90,
Author= " J.M. Wing",
Title= "A Specifier's Introduction to Formal Methods",
Journal= "IEEE Computer",
Year = "1990"}
151. @Article{Wit87,
Author= " I.H. Witten",
Title= "Computer (In)security : Infiltrating Open Systems",
Journal= "Abacus",
Address= "New York",
Volume = "4",
Number = "4",
Pages = "7-25",
Year = "1987",
Keywords= "hacking"}
152. @Article{WL92a,
Author= " Y.C. Win and S. Lam",
Title= "Authentication for Distributed Systems",
Journal= "Computer",
Month = "January",
Year = "1992"}
153. @Article{Wol89,
Author= " M. Wolf",
Title= "Covert Channels in {LAN} Protocols",
Journal= "Lecture Notes in Computer Science, Local Area Network Security",
Volume = "396",
Year = "1989"}
154. @Article{Woo84,
Author= " C.C. Wood",
Title= "Countering UnAuthorized Systems Accesses",
Journal= "Journal of Systems Management",
Month = "April",
Year = "1984"}
155. @Article{X90,
Author= " {XXX Article non sign\'{e} }",
Title= "La s\'{e}curit\'{e} informatique et son livre orange",
Journal= "G\'{e}nie Logiciel et Syst\`{e}mes Experts",
Volume = "19",
Month = "juin",
Year = "1990"}
156. @Article{YG90,
Author= " Ch. Yu and V. D. Gligor",
Title= "A Specification and Verification Method for Preventing Denial of Service",
Journal= "IEEE Trans. on Soft. Engineering",
Volume = "16",
Number = "6",
Month = "June",
Year = "1990"}
157. @Article{You85,
Author= " W.D. Young",
Title= "Proving a Computer System Secure",
Journal= "Scientific Honeyweller",
Volume = "6",
Number = "2",
Month = "July",
Year = "1985"}
158. @book{Ben96,
Author= "Alain Bensoussan",
Title= "Les T\'{e}l\'{e}coms et le droit",
Publisher = "Hermes",
Year = "1996",
Keywords= ""}
159. @book{Den82,
Author= " Dorothy E. Denning",
Title= "Cryptography and Data Security",
Publisher = "Addison-Wesley Publishing Company",
Year = "1982"}
160. @book{DP89,
Author= " D.W. Davies and W.L. Price",
Title= "Security for Computer Networks",
Publisher = "John Willey and Sons Publications",
Edition = "2nd",
Year = "1989"}
161. @book{Gas88,
Author= " M. Gasser",
Title= "Building a secure computer system",
Publisher = "Van Hoostrand and Reinhold",
Year = "1988"}
162. @book{GJ79,
Author= " M.R. Garey and D.S. Johnson",
Title= "Computers and Intractability : A Guide to the Theory of NP-Completeness",
Publisher = "W.H. Freeman and Company",
Year = "1979"}
163. @book{Gri81,
Author= " David Gries",
Title= "The Science of Programming",
Publisher = "Springer-Verlag, New York",
Year = "1981"}
164. @book{LLT87,
Author= " J.M. Lamere and Y. Leroux and J. Tourly",
Title= "La s\'{e}curit\'{e} des r\'{e}seaux : M\'{e}thodes et techniques",
Publisher = "DUNOD",
Year = "1987"}
165. @book{MG87,
Author= " C. Macchi and J.F. {Guilbert and 13 Co-auteurs}",
Title= "T\'{e}l\'{e}informatique",
Publisher = "DUNOD",
Edition = "2",
Year = "1987"}
166. @book{MM82,
Author= " C.H. Meyer and S.M. Matyas",
Title= "Cryptography: A Guide for the Design and Implementation of Secure Systems",
Publisher = "John Willey and Sons Publications",
Year = "1982"}
167. @book{PSRH85,
Author= " G. Pujolle and D. Serret and D. Dromard and E.Horlait",
Title= "R\'{e}seaux et T\'{e}l\'{e}matique, Tomes 1 et 2",
Publisher = "EYROLLES",
Year = "1985"}
168. @book{Rol89,
Author= " Pierre Rolin",
Title= "R\'{e}seaux locaux : Normes et protocoles",
Publisher = "HERMES",
Edition = "2",
Year = "1989"}
169. @book{SB86,
Author= " B. Sarikaya and G. Bochmann",
Title= "Protocol Specification, Testing and Verification, VI",
Publisher = "NORTH-HOLLAND",
Year = "1986"}
170. @book{Spi89,
Author= " J.M. Spivey",
Title= "The Z Notation : a reference Manual",
Publisher = "C.A.R. Hoare Series Editor",
Year = "1989"}
171. @in proceedings{DR91,
Author= " Marc Dacier and Michel Rutsaert",
Title= "Comment g\'{e}rer la transitivit\'{e} en s\'{e}curit\'{e}",
BookTitle= "Actes de la convention {UNIX}'91",
Pages = "205-217",
Year = "1991"}
172. @in proceedings{Eal.92,
Author= " J. Epstein and J. McHugh and R. Pascale and C. Martin and D. Rothnie and H. Orman and A. Marmor-Squires and M. Branstad and B. Danner",
Title= "Evolution of a Trusted {B}3 Window System Prototype",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "226-239",
Year = "1992"}
173. @inbook{Hag96,
Author= "Jean Haguet",
Title= "L'internet~: guide stratégique pour l'entreprise",
Chapter ="15",
Publisher = "Masson",
Year = "1996",
url= "http://www.gctech.fr/librairie/documentation.html",
Keywords= "commerce electronique" }
174. @inbook{Jac91,
Author= " J.L. Jacob",
Title= "Specifying security properties",
Publisher = "??",
Chapter ="??",
Year = "1991"}
175. @inbook{Lan83,
Author= "Bill Landreth",
Title= "Histoire du piratage informatique",
Chapter ="2",
Pages = "27-35",
Publisher = "\'{e}diteur non connu",
Year = "1983",
Keywords= ""}
176. @Proceedings{Aal.97,
Author= "Paul Ammann and Sushil Jajodia and Catherine D. McCollum and Barbara T. Blaustein",
Title= "Surviving Information Warfare Attacks on Databases",
BookTitle= "Proceedings of the 1997 IEEE Symposium on Security and Privacy",
Year = "1997",
url= "http://www.isse.gmu.edu/~csis/publications/oak97-iw.ps",
Keywords= "intrusions detection"}
177. @Proceedings{AB90,
Author= " I.F. Akyildiz and G.S. Benson",
Title= "A Security Reclassifier for a Local Area Network",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "85-96",
Year = "1990"}
178. @Proceedings{ABJ93,
Author= " V. Atluri and E. Bertino and S. Jajodia",
Title= "Achieving Stricter Correctness Requirements in Multilevel Secure Databases",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "135-149",
Year = "1993"}
179. @Proceedings{AJJ92,
Author= " P. Ammann and F. Jaeckle and S. Jajodia",
Title= "A Two Snapshot Algorithm for Concurrency Control in Multi-Level Secure Databases",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "204-215",
Year = "1992"}
180. @Proceedings{AL92,
Author= "Bruno d' Ausbourg and Jean-Henri Llareus",
Title= "M2{S} : A Machine for Multilevel Security",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "373-392",
Year = "1992"}
181. @Proceedings{And85,
Author= " J.P. Anderson",
Title= "A Unification of Computer and Network Security and Privacy Concepts",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Year = "1985"}
182. @Proceedings{And92,
Author= " Ross J. Anderson",
Title= "UEPS - A Second Generation Electronic Wallet",
BookTitle= "European Symposium on Research in Computer Security(ESORICS)",
Pages = "411-418",
Year = "1992"}
183. @InProceedings{Bad91,
Author= "Lee Badger",
Title= "{Covert Channel Analysis Planning for Large Systems}",
Pages = "120-136",
Year = 1991,
BookTitle= "{Proceedings of the 14th National Computer Security Conference}",
Address= "Washington, DC",
Month = oct}
184. @Proceedings{Bai90,
Author= " D.J. Bailey",
Title= "Managing Computer Security : How Can Research Help ?",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "235-242",
Year = "1990"}
185. @Proceedings{Bak91,
Author= " B.C. Baker",
Title= "Les enjeux des bases de donn\'{e}es SQL s\'{e}curis\'{e}es",
BookTitle= "Convention {UNIX} 91",
Year = "1991"}
186. @Proceedings{BD90,
Author= " L. Blain and Y. Deswarte",
Title= "An Intrusion-Tolerant Security Server for an Open Distributed System",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "97-104",
Year = "1990"}
187. @Proceedings{Ben92,
Author= " G. Benson",
Title= "An Optimal Solution to the Secure Reader-Writer Problem",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "251-259",
Year = "1992"}
188. @Proceedings{BG95,
Author= "Christophe Bidan and Sylvain Gombault",
Title= "La s\'{e}curit\'{e} inter-domaine \`{a} l'aide des analyseurs des\'{e}curit\'{e}",
Pages = "131-142",
Year = 1995,
BookTitle= "Colloque Francophone sur l'Ing\'{e}nierie des Protocoles",
Address= "Rennes, France",
Month = may}
189. @Proceedings{BGS92,
Author= " John A. Bull and Li Gong and Karen R. Sollins",
Title= "Towards Security in an Open Systems Federation",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "3-20",
Year = "1992"}
190. @Proceedings{Bie90,
Author= " P. Bieber",
Title= "Epistemic Verification of Cryptographic Protocols",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "211-222",
Year = "1990"}
191. @Proceedings{Bis90,
Author= " J. Biskup",
Title= "A General Framework for Database Security",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages= "35-44",
Year = "1990"}
192. @Proceedings{BJMN93,
Author= " B.T. Blaustein and S. Jajodia and C.D. McCollum and L. Notargiacomo",
Title= "A Model of Atomicity for Multilevel Transactions",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "120-134",
Year = "1993"}
193. @Proceedings{BK88,
Author= " D.S. Bauer and M.E. Koblentz",
Title= "NIDX, a Real-Time Intrusion Detection Expert System",
BookTitle= "Proceedings of the USENIX'88 Conference",
Pages = "261-272",
Month = "june",
Year = "1988"}
194. @Proceedings{BM92,
Author= " S.M. Bellovin and M. Merritt",
Title= "Encrypted Key Exchange : Password-Based Protocols Secure Against Dictionary Attacks",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "72-84",
Year = "1992"}
195. @Proceedings{BN89,
Author= " D.F.C. Brewer and M.J. Nash",
Title= "The Chinese Wall Security Policy",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Year = "1989"}
196. @Proceedings{Boy92,
Author= " Colin Boyd",
Title= "A Formal Framework for Authentication",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "273-292",
Year = "1992"}
197. @Proceedings{Bro79,
Author= " P. Browne",
Title= "The Security Audit",
BookTitle= "Checklist For Computer Security Center Self-Audits",
Pages = "173-184",
Year = "1979"}
198. @Proceedings{Cal.90,
Author= " P. Casey and A. Brouwer and D. Herson and J.F. Pacault and F. Taal and U. Van Essen",
Title= "Harmonised Criteria for the Security Evaluation of its Systems and Products",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "243-",
Year = "1990"}
199. @Proceedings{Cal92,
Author= " Christel Calas",
Title= "GDoM : a Multilevel Document Manager",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "393-410",
Year = "1992"}
200. @Proceedings{CD92,
Author= " O. Costich and J. McDermott",
Title= "A Multilevel Transaction Problem for Multilevel Secure Database Systems and Its Solution for the Replicated Architecture",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "192-203",
Year = "1992"}
201. @Proceedings{Cha86,
Author= " B.G. Matley",
Title= "An Analysis of the Differences between the computer Security Practices in the Military and Private Sectors",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "71-74",
Year = "1986"}
202. @Proceedings{Chr96,
Author= "Abdellatif Chraibi",
Title= "V\'{e}rification des protocoles cryptographiques de signature",
BookTitle= "Actes du congr\`{e}s CFIP'96",
Year = "1996"}
203. @Proceedings{Cup90b,
Author= " F. Cuppens",
Title= "An Epistemic and deontic Logic for Reasoning about Computer Security",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "135-146",
Year = "1990"}
204. @Proceedings{Cup93,
Author= " F. Cuppens",
Title= "A Logical Analysis of Authorized and Prohibited Information Flows",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "100-109",
Year = "1993"}
205. @Proceedings{CY92,
Author= " F. Cuppens and K. Yazdanian",
Title= "A 'Natural' Decomposition of Multi-level Relations",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "273-285",
Year = "1992"}
206. @Proceedings{DBS92,
Author= " Herv\'{e} Debar and Monique Becker and Didier Siboni",
Title= "A Neural Network Component for an Intrusion Detection System",
BookTitle= "Proceedings of the IEEE Symposium of Research in Computer Security and Privacy",
Pages = "240-250",
Month = "May",
Year = "1992"}
207. @Proceedings{Des92,
Author= " Yvo Desmedt",
Title= "Breaking the Traditional Computer Security Barriers",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "125-140",
Year = "1992"}
208. @Proceedings{DFH96,
Author= "Patrick D'Haeseleer and Stephanie Forrest and Paul Helman",
Title= "An Immunological Approach to Change Detection: Algorithms, Analysis and Implications",
BookTitle= "Proceedings of the 1996 IEEE Symposium on Security and Privacy",
Year = "1996",
Pages = "110-119",
Month = "May",
url= "http://www.cs.unm.edu/~forrest/ieee-sp-neg-select.ps.gz"}
209. @Proceedings{DGV92,
Author= " Joan Daemen and Ren\'{e} Govaerts and Joos Vandewalle",
Title= "A Hardware Design Model for Cryptographic Algorithms",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "419-434",
Year = "1992"}
210. @Proceedings{DHN88,
Author= " A.L. Donaldson and J. McHugh and K.A. Nyberg",
Title= "Covert Channels in Trusted {LAN}'s",
BookTitle= "Proceedings of the 11th National Computer Security Conference",
Year = "1988"}
211. @Proceedings{DM90,
Author= " E. Deberdt and S. Martin",
Title= "Methodology 'Minerve Security' Evaluation Process of Software Security",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "223-234",
Year = "1990"}
212. @Proceedings{FL96,
Author= "Stephanie Forrest and Thomas Longstaff",
Title= "A Sense of Self for Unix Processes",
BookTitle= "Proceedings of the 1996 IEEE Symposium on Security and Privacy",
Year = "1996",
Pages = "120-128",
Month = "May"}
213. @Proceedings{FLR77,
Author= " R.J. Feiertag and K.N. Levitt and L. Robinson",
Title= "Proving Multilevel Security of a System Design",
BookTitle= "6th ACM symposium on operating system principles",
Pages = "57-65",
Month = "November",
Year = "1977"}
214. @Proceedings{FM93,
Author= " T. Fine and S.E. Minear",
Title= "Assuring Distributed Trusted Mach",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "206-218",
Year = "1993"}
215. @Proceedings{FN79,
Author= " R.J. Feiertag and P.G. Neumann",
Title= "The Foundation of a Provably Secure Operating System ({PSOS})",
BookTitle= "NCC",
Volume = "47",
Editor= "AFIPS Press",
Year = "1979"}
216. @Proceedings{FR92,
Author= " Jean-Charles Fabre and Brian Randell",
Title= "An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "193-208",
Year = "1992"}
217. @Proceedings{FS91,
Author= "Dan Farmer and E.H. Spafford",
Title= "The COPS Security Checker System",
BookTitle= "Proceedings of the 14th National Computer Security Conference",
Pages = "372-385",
Month = "October",
Year = "1991"}
218. @Proceedings{FZ92,
Author= " G.P. Ford and Jun Zhang",
Title= "A structural graph matching approach to image understanding",
BookTitle= "SPIE - The International Society for Optical Engineering",
Volume = "1607",
Pages = "559-69",
Year = "1992"}
219. @Proceedings{Gau91,
Author= "G. Gaudin",
Title= "Gestion de s\'{e}curit\'{e} en environnement h\'{e}t\'{e}rog\`{e}ne",
BookTitle= "De nouvelles architectures pour les communications~: les r\'{e}seaux informatiques, qualit\'{e} de service, s\'{e}curit\'{e} et performances",
Year = "1991",
Pages = "73-80",
Month = "octobre" }
220. @Proceedings{GL91,
Author= " T.D. Garvey and T.F. Lunt",
Title= "Model-based Intrusion Detection",
BookTitle= "Proceedings of the 14th National Computer Security Conference",
Month = "October",
Year = "1991"}
221. @Proceedings{GLP92,
Author= " V.D. Gligor and S.-W. Luan and J.N. Pato",
Title= "On Inter-Realm Authentification in Large Distributed Systems",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "2-17",
Year = "1992"}
222. @Proceedings{GM82,
Author= " J. A. Goguen and J. Meseguer",
Title= "Security Policies and Security Models",
BookTitle= "IEEE Symp. Security and Privacy",
Year = "1982"}
223. @Proceedings{GM89,
Author= "J. Glasgow and G. MacEwen",
Title= "Obligation as the Basis of Integrity Specification",
BookTitle= "Computer Security Foundations Workshop, Franconia, N.H.",
Month = "June",
Year = "1989"}
224. @Proceedings{GM96,
Author= "Richard A. Griffith and Mac E. McGregor",
Title= "Designing and Operating a Multilevel Security Network Using Standard Commercial Products",
BookTitle= "Proceedings of the 19th National Information Systems Security Conference",
Year = "1996",
Month = "October",
url= "from http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/readers-guide/NISSC96-paperlist.html",
Keywords= "Multilevel Security Network"}
225. @Proceedings{GP90,
Author= " M. Girault and J.C. Pailles",
Title= "An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "173-184",
Year = "1990"}
226. @Proceedings{GPP90,
Author= " D. Graft and M. Pabrai and U. Pabrai",
Title= "Methodology for Network Security Design",
BookTitle= "IEEE Symp. Security and Privacy",
Pages = "675-682",
Year = "1990"}
227. @Proceedings{Gra87,
Author= " C. Gray Girling",
Title= "Covert Channels in {LAN}'s",
BookTitle= "IEEE Symp. Security and Privacy",
Year = "1987"}
228. @Proceedings{Gra93,
Author= " {J. W.} {Gray III}",
Title= "On Introducing Noise into the Bus-Contention Channel",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "90-99",
Year = "1993"}
229. @Proceedings{GS92,
Author= " {J. W.} {Gray III} and P.F. Syverson",
Title= "A Logical Approach to Multilevel Security of Probabilistic Systems",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "164-176",
Year = "1992"}
230. @Proceedings{HA92,
Author= "H. Hosmer and M. D. Abrams",
Title= "MultiPolicy Machine: A New Security Paradigm",
BookTitle= "IEEE Simposium on Security and Privacy",
Note = "Poster Session Abstract",
Year = "1992"}
231. @Proceedings{Hal.93,
Author= " J.D. Horton and R. Harland and E. Ashby and R.H. Cooper and W.F. Hyslop and B.G. Nickerson and W.M. Stewart and O.K. Ward",
Title= "The Cascade Vulnerability Problem",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "110-119",
Year = "1993"}
232. @InProceedings{Heb95b,
Author= "Patrick H\'{e}brard",
Title= "S\'{e}curit\'{e} dans les couches basses de l'OSI",
Pages = "111-129",
Year = 1995,
BookTitle= "Colloque Francophone sur l'Ing\'{e}nierie des Protocoles",
Address= "Rennes, France",
Month = may}
233. @Proceedings{HG92,
Author= " Jingsha He and Virgil D. Gligor",
Title= "Formal Methods and Automated Tool for Timing-Channel Identification in {TCB} Source Code",
BookTitle= "proceedings of the European Symposium on Research in Computer Security (ESORICS)",
Pages = "57-76",
Year = "1992"}
234. @Proceedings{HH86,
Author= " L. R. Halme and J. Van Horne",
Title= "Automated Analysis of Computer System Audit Trails for Security Purposes",
BookTitle= "Computer Security Conference",
Pages = "71-74",
Year = "1986"}
235. @Proceedings{HK91,
Author= " I. Houston and S. King",
Title= "CICS project report - Experiences and Results from the Use of {Z} in {IBM}",
BookTitle= "Formal Software Development Methods: International Symposium of VDM Europe",
Volume = "2-4",
Editor= "Springer Verlag",
Address= "Berlin",
Year = "1991"}
236. @Proceedings{HL92,
Author= " Ralf C. Hauser and E. Stewart Lee",
Title= "Verification and Modelling of Authentification Protocols",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "141-154",
Year = "1992"}
237. @Proceedings{HLLS90,
Author= " G. Hoffmann and S. Lechner and M. Leclerca and F. Steiner",
Title= "Authentification and Access Control in a Distributed System",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "71-84",
Year = "1990"}
238. @Proceedings{HLMM92,
Author= " Naji Habra and Baudouin Le Charlier and Abdelaziz Mounji and Isabelle Mathieu",
Title= "ASAX : Software Architecture and Rule- Based Language for Universal Audit Trail Analysis",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "435-450",
Year = "1992"}
239. @Proceedings{HM90,
Author= " E.S. Hocking and J.A. McDermid",
Title= "Towards on Object-Oriented Development Environment for Secure Applications",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "191-200",
Year = "1990"}
240. @Proceedings{Hos91a,
Author= " H. H. Hosmer",
Title= "Integrating Security Policies",
BookTitle= "Proceedings of the Third RADC Workshop of Multilevel Database Security, Castile, NY, MITRE MTP 385",
Month = "May",
Year = "1991"}
241. @Proceedings{Hos91b,
Author= " H. H. Hosmer",
Title= "Shared Sensitivity Labels",
BookTitle= "Data Security IV, Status and Prospects, North Holand",
Year = "1991"}
242. @Proceedings{Hos91c,
Author= " H. H. Hosmer",
Title= "The Multipolicy Machine: A New Paradigm for Multilevel Secure Systems",
BookTitle= "National Institute of Standards and Technology Workshop on Secure Labels",
Month = "June",
Year = "1991"}
243. @Proceedings{Hos91d,
Author= " H. H. Hosmer",
Title= "A Multipolicy Model: A Working Paper",
BookTitle= "Fourth RADC Multilevel Database Security Workshop",
Month = "April",
Year = "1991"}
244. @Proceedings{Hos91e,
Author= " H. H. Hosmer",
Title= "Metapolicies {I}",
BookTitle= "ACM SIGSAC Data Management Workshop, San Antonio, TX",
Month = "December",
Year = "1991"}
245. @Proceedings{Hos92,
Author= "H. H. Hosmer",
Title= "Metapolicies {II}",
BookTitle= "Proceedings of the 15th National Computer Security Conference, Baltimore, MD",
Month = "October",
Year = "1992"}
246. @Proceedings{HS97,
Author= "John Hale and Sujeet Shenoi",
Title= "Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery",
BookTitle= "Proceedings of the 1997 IEEE Symposium on Security and Privacy",
Year = "1997",
url= "http://euler.mcs.utulsa.edu/~hale/oakim.ps",
Keywords= "intrusions detection"}
247. @Proceedings{Hu92,
Author= " W.M. Hu",
Title= "Lattice Scheduling and Covert Channels",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "53-61",
Year = "1992"}
248. @Proceedings{Ilg93,
Author= "K. Ilgun",
Title= "USTAT : A Real-Time Intrusion Detection System for {UNIX}",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "16-29",
Year = "1993"}
249. @Proceedings{JA92,
Author= " S. Jajodia and V. Atluri",
Title= "Alternative Correctness Criteria for Concurrent Execution of Transactions",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "216-225",
Year = "1992"}
250. @Proceedings{JDS91,
Author= " Kathleen A. Jackson and David H. Dubois and Cathy A. Stalling",
Title= "An Expert System Application for Network Intrusion Detection",
BookTitle= "Proceedings of the 14th National Computer Security Conference",
Year = "1991"}
251. @Proceedings{JLS76,
Author= " A.K. Jones and R.J. Lipton and L. Snyder",
Title= "A Linear Time Algorithm for Deciding Security",
BookTitle= "17th Annual Symp. on Foundations of Computer Science",
Year = "1976"}
252. @Proceedings{Jon90,
Author= " R.W. Jones",
Title= "A General Mechanism for Access Control : Its Relationship to Secure System Concepts",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "45-50",
Year = "1990"}
253. @Proceedings{JS92,
Author= " Andrew J.I. Jones and Marek Sergot",
Title= "Formal Specification of Security Requirements using the Theory of Normative Positions",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "103-124",
Year = "1992"}
254. @InProceedings{Kah94,
Author= "Jos\'{e} Kahan",
Title= "Un nouveau mod\'{e}le d'autorisation pour les syst\`{e}mes de consultation d'information multim\'{e}dia r\'{e}partie",
Year = 1995,
BookTitle= "Colloque AFCET : o\`{u}, quand, comment prot\'{e}ger vos logiciels et documents \'{e}lectroniques",
Address= "Paris, France",
Year = 1994,
Month = "d\'{e}cembre"}
255. @InProceedings{Kah95,
Author= "Jos\'{e} Kahan",
Title= "A Capability-Based Authorization Model for the WWW",
Year = 1995,
BookTitle= "WWW'95 Conference",
Address= "Darmstadt, Germany",
Month = avril}
256. @Proceedings{Kai90,
Author= " J. Kaiser",
Title= "An Object-Oriented Architecture to Support System Reliability and Security",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "51-60",
Year = "1990"}
257. @Proceedings{Kal.92,
Author= " Y. Klein and E.Roche and F.Taal and M. Van Dulm and U. Van Essen and P. Wolf and J. Yates",
Title= "The IT Security Evaluation Manuel ({ITSEM})",
BookTitle= "Proceedings of the 15th NCSC Conference",
Year = "1992"}
258. @Proceedings{Kan80,
Author= " A. Kandel",
Title= "Fuzzy statistics and systems security",
BookTitle= "Conference : Security Through Science and Engineering",
Month = "September",
Year = "1980"}
259. @Proceedings{Kar78,
Author= " P.A. Karger",
Title= "The Lattice Model in a Public Computing network",
BookTitle= "ACM Annual Conference",
Volume = "1",
Year = "1978"}
260. @Proceedings{KC90,
Author= " R. Kaplan and R.J.M. Clyde",
Title= "Viruses, worms, and Trojan horses. VI The war continues",
BookTitle= "Digital Equipment Computer Users Society. Fall",
Pages = "119-137",
Year = "1990",
Keywords= "hacking"}
261. @Proceedings{Kel90,
Author= " U. Kelter",
Title= "Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "23-34",
Year = "1990"}
262. @Proceedings{Kel92,
Author= " Udo Kelter",
Title= "Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "21-40",
Year = "1992"}
263. @Proceedings{Kem82b,
Author= " R.A. Kemmerer",
Title= "A Practical Approach to Identifying Storage and Timing Channels",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Year = "1982"}
264. @Proceedings{Kes92,
Author= " Volker Kessler",
Title= "On the Chinese Wall Model",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "41-56",
Year = "1992"}
265. @Proceedings{Kim91,
Author= " J. Kimmins",
Title= "Developing a Network Security Architecture : Concepts and Issues",
BookTitle= "Proceedings of the SECURICOM'91 Conference",
Month = "march",
Year = "1991"}
266. @Proceedings{KK92,
Author= " Iwen E. Kang and Thomas F. Keefe",
Title= "On Transaction Processing for Multilevel Secure Replicated Databases",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "329-348",
Year = "1992"}
267. @Proceedings{Klu89,
Author= " H.M. Kluepfel",
Title= "Foiling the wily hacker: more than analysis and containment",
BookTitle= "International Carnahan Conference on Security Technology",
Pages = "15-21",
Year = "1989",
Keywords= "hacking"}
268. @Proceedings{Koh91,
Author= " J.T. Kohl",
Title= "The evolution of the {K}erberos Authentication Service",
BookTitle= "Acte de EurOpen 91",
Pages = "295-313",
Year = "1991"}
269. @Proceedings{KRL97,
Author= "Calvin Ko and Manfred Ruschitzka and Karl Levitt",
Title= "Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-based Approach",
BookTitle= "Proceedings of the 1997 IEEE Symposium on Security and Privacy",
Year = "1997",
url= "",
Keywords= "intrusions detection"}
270. @Proceedings{Kun86,
Author= " J.D. Kuhn",
Title= "Research Toward Intrusion Detection Through Automated Abstraction of Audit Data",
BookTitle= "Computer Security Conference",
Pages = "204-208",
Year = "1986"}
271. @Proceedings{KW93,
Author= " J.O. Kephart and S.R. White",
Title= "Measuring and Modeling Computer Virus Prevalence",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "2-15",
Year = "1993"}
272. @Proceedings{Lal.90b,
Author= " T.F. Lunt and A. Tamaru and F. Gilham and R. Jagannathan and P.G. Neumann and C. Jalali",
Title= "IDES: A Progress Report",
BookTitle= "Proceedings of the Computer Security Application Conference",
Pages = "273-285",
Year = "1990"}
273. @Proceedings{Lap90,
Author= " L. La Padula",
Title= "Formal Modeling in a Generalized Framework for Access Control",
BookTitle= "Computer Security Foundation Workshop III",
Month = "June",
Year = "1990"}
274. @Proceedings{LB92,
Author= " Kwok-Yan Lam and Thomas Beth",
Title= "Timely Authentication in Distributed Systems",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "293-306",
Year = "1992"}
275. @Proceedings{LG92,
Author= " Kwok-Yan Lam and Dieter Gollmann",
Title= "Freshness Assurance of Authentication Protocols",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "261-272",
Year = "1992"}
276. @Proceedings{LH90,
Author= " T.F. Lunt and D. Hsieh",
Title= "The SeaView Secure Database System : A Progress Report",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "3-14",
Year = "1990"}
277. @Proceedings{LJ88,
Author= " T.F. Lunt and R. Jagannathan",
Title= "A Prototype Real-Time Intrusion-Detection Expert System",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "59-66",
Year = "1988"}
278. @Proceedings{LJ97,
Author= "Ulf Lindqvist and Erland Jonsson",
Title= "How to Systematically Classify Computer Security Intrusions",
BookTitle= "Proceedings of the 1997 IEEE Symposium on Security and Privacy",
Year = "1997",
url= "http://www.ce.chalmers.se/~ulf/pubs.html",
Keywords= "intrusions detection"}
279. @Proceedings{LK89,
Author= " Z.L. Lichtman and J.F. Kimmins",
Title= "An Audit Trail Reduction Paradigm Based on Trusted Processes",
BookTitle= "Proceedings of the 13th National Computer Security Conference",
Year = "1989"}
280. @Proceedings{LTBS90,
Author= " E.S. Lee and B. Thomson and P.I.P. Boulton and M. Stumm",
Title= "An Architecture for a Trusted Network",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "105-116",
Year = "1990"}
281. @Proceedings{Lun90,
Author= "Teresa Lunt",
Title= "IDES: An intelligent System for Detecting Intruders",
BookTitle= "Computer Security, Threats and Countermeasures",
Month = "November",
Year = "1990"}
282. @Proceedings{Mal.90,
Author= " N. McAuliffe and D. Wolcott and L. Schaefer and N. Kelem and B. Hubbard and T. Haluey",
Title= "Is your Computer Being Misused? A Survey of Current Intrusion Detection System Technology",
BookTitle= "Proceedings of the IEEE Computer Security Applications Conference",
Pages = "260-272",
Year = "1990"}
283. @Proceedings{Mat85,
Author= " B.G. Matley",
Title= "Computer Privacy in America: Conflicting Practices and Policy Choises",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "219-223",
Year = "1985"}
284. @Proceedings{Mcl88,
Author= " J. McLean",
Title= "The Algebra of Security",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Month = "April",
Year = "1988"}
285. @Proceedings{Me93b,
Author= "Ludovic M\'e",
Title= "Security Audit Trail Analysis Using Genetic Algorithms",
BookTitle= "Proceedings of the 12th International Conference on Computer Safety, Reliability and Security",
Pages = "329-340",
Month = "October",
Year = "1993"}
286. @Proceedings{Me96b,
Author= "Ludovic M\'{e}",
Title= "M\'{e}thodes et outils de la d\'{e}tection d'intrusions",
BookTitle= "Actes du congr\`{e}s Intelligence Economique et Comp\'{e}titive (IEC)",
Year = "1996"}
287. @Proceedings{Me96c,
Author= "Ludovic M\'{e}",
Title= "M\'{e}thodes et outils de la d\'{e}tection d'intrusions",
BookTitle= "Actes du congr\`{e}s Intelligence \'{e}conomique et comp\'{e}titive",
Year = "1996",
Pages = "112-126",
Month = "novembre",
Keywords= ""}
288. @Proceedings{Mea92,
Author= " C. Meadows",
Title= "Using Traces of Procedure Calls to Reason About Composability",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "177-191",
Year = "1992"}
289. @Proceedings{Mic91,
Author= " Z. Michalewicz",
Title= "A step towards optimal topology of 'Communication networks'",
BookTitle= "SPIE - The International Society for Optical Engineering",
Volume = "1470",
Pages = "112-22",
Year = "1991"}
290. @Proceedings{Mil92,
Author= " J.K. Millen",
Title= "A Resource Allocation Model for Denial of Service",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "137-147",
Year = "1992"}
291. @Proceedings{ML92,
Author= " J.K. Millen and T.F. Lunt",
Title= "Security for Object-Oriented Database Systems",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "260-272",
Year = "1992"}
292. @Proceedings{ML97,
Author= "Abdelaziz Mounji and Baudouin Le Charlier",
Title= "Continuous Assesment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis",
BookTitle= "Proceedings of the IEEE ISOC'97 Symposium on Network and Distributed Systems Security",
Year = "1997",
url= "http://www.info.fundp.ac.be/~amo/publication.html",
Keywords= "intrusion detection, ASAX"}
293. @Proceedings{MM92,
Author= " U.S. Moskowitz and A.R. Miller",
Title= "The Influence of Delay Upon an Idealized Channel's Bandwidth",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "92-71",
Year = "1992"}
294. @Proceedings{Mos87,
Author= " L.E. Moser",
Title= "Graph homomorphisms and the design of secure computer systems",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "88-96",
Year = "1997"}
295. @Proceedings{MS91,
Author= "J. B. Michael and E. H. Sibley et al.",
Title= "A Modeling Paradigm for Representing Intentions in Information Systemes Policy.",
BookTitle= "First Workshop on Information Technologies and Systems",
Year = "1991"}
296. @Proceedings{MT93,
Author= " R. Molva and G. Tsudik",
Title= "Authentication Method with Impersonal Token Cards",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "56-65",
Year = "1993"}
297. @Proceedings{MTVZ92,
Author= " Refik Molva and Gene Tsudik and Els Van Herreweghen and Stefano Zatti",
Title= "KryptoKnight Authentication and Key Distribution System",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "155-174",
Year = "1992"}
298. @Proceedings{Nes78,
Author= " P.G. Nessett",
Title= "Computer Security Evaluation",
BookTitle= "Proc. NCC",
Volume = "47",
Editor= "AFIPS Press",
Year = "1978"}
299. @Proceedings{Oha90,
Author= " C. O'halloran",
Title= "A Calculus of Information Flow",
BookTitle= "Acte de ESORICS 90, Toulouse",
Pages = "147-159",
Month = "October",
Year = "1990"}
300. @Proceedings{Pat90,
Author= " J. Patarin",
Title= "Pseudorandom Permutations based on the {D.E.S.} Scheme",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "185-190",
Year = "1990"}
301. @Proceedings{PDJ93,
Author= " F. Piessens and B. De Decker and P. Janson",
Title= "Interconnecting Domains with Heterogeneous Key Distribution",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "66-81",
Year = "1993"}
302. @Proceedings{Per92a,
Author= " Günther Pernul",
Title= "Security Constraint Processing in Multilevel Secure AMAC Schemata",
BookTitle= "European Symposium on Research in Computer Security ESORICS)",
Pages = "349-372",
Year = "1992"}
303. @Proceedings{Pro94,
Author= "Paul Proctor",
Title= "Audit Reduction and Misuse Detection in Heterogeneous Environments: Framework and Application",
BookTitle= "Proceedings of the 10th Annual Computer Security Applications",
Year = "1994",
Month = "December"}
304. @Proceedings{QSKLG93,
Author= " X. Qian and M. Sticket and P.D. Karp and T.F. Lunt and T.D. Garvey",
Title= "Relational Database Systems",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "196-205",
Year = "1993"}
305. @Proceedings{Ran90,
Author= " G. Randell",
Title= "A Case Study in the Formal Rafinement of a Distributed Secure System",
BookTitle= "Acte de ESORICS 90, Toulouse",
Pages = "201-208",
Month = "October",
Year = "1990"}
306. @Proceedings{RBG92,
Author= " M. Reiter and K. Birman and L. Gong",
Title= "Integrating Security in a Group Oriented Distributed System",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "18-32",
Year = "1992"}
307. @Proceedings{RG93,
Author= " M. Reiter and L. Gong",
Title= "Preventing Denial and Forgery of Causal Relationships in Distributed Systems",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "30-40",
Year = "1993"}
308. @Proceedings{Rol91,
Author= " Pierre Rolin",
Title= "Architecture d'un r\'{e}seau de confiance",
BookTitle= "CFIP 91",
Year = "1991"}
309. @Proceedings{RT92,
Author= " P. Rolin and L. Toutain",
Title= "Analyseur de s\'{e}curit\'{e} du r\'{e}seau",
BookTitle= "Actes du congr\`{e}s De nouvelles architecture pour les communications",
Year = "1992"}
310. @Proceedings{Rus85,
Author= " J. Rushby",
Title= "Networks are Systems",
BookTitle= "DOD Computer Security Workshop",
Year = "1985"}
311. @Proceedings{San92,
Author= "R.S. Sandhu",
Title= "The Typed Access Matrix Model",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "122-136",
Year = "1992"}
312. @Proceedings{Sch85,
Author= " D.D. Schnackenberg",
Title= "Development of a Multilevel Secure Local Area Network",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "97-104",
Year = "1985"}
313. @Proceedings{SG82,
Author= " D.P. Sidhu and M. Gasser",
Title= "A Multilevel Secure Local Area Network",
BookTitle= "Proceedings of the IEEE Symposium on Security and privacy",
Year = "1982"}
314. @Proceedings{SG90,
Author= " S.W. Shieh and V.D. Gligor",
Title= "Auditing the Use of Covert Storage Channels in Secure Systems",
BookTitle= "Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA",
Month = "May",
Year = "1990"}
315. @Proceedings{SG92,
Author= " S.G. Stubblebine and V.D. Gligor",
Title= "On Message Integrity in Cryptographic Protocols",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "85-104",
Year = "1992"}
316. @Proceedings{SG93,
Author= " S.G. Stubblebine and V.D. Gligor",
Title= "Protocol Design for Integrity Protection",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "41-55",
Year = "1993"}
317. @Proceedings{SJ92,
Author= " Ravi S. Sandhu and Sushil Jajodia",
Title= "Polyinstantiation for Cover Stories",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "307-328",
Year = "1992"}
318. @Proceedings{SK90,
Author= " Z. Savic and M. Komocar",
Title= "Security Kernel Design and Implementation in the {IBM} {PC} Environment",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "61-70",
Year = "1990"}
319. @Proceedings{SM93,
Author= " P. Syverson and C. Meadows",
Title= "A Logical Language for Specifying Cryptographic Protocol Requirements",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "165-177",
Year = "1993"}
320. @Proceedings{Sma88,
Author= " S.E. Smaha",
Title= "Haystack: An Intrusion Detection System",
BookTitle= "Proceedings of the 4th Aerospace Computer Security Application Conference",
Pages = "37-44",
Month = "december",
Year = "1988"}
321. @Proceedings{Sne92,
Author= " E. Snekkenes",
Title= "Roles in Cryptographic Protocols",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "105-121",
Year = "1992"}
322. @Proceedings{SRK96,
Author= "Michael Sobirey and Birk Richter and Hartmut Konig",
Title= "The Intrusion Detection System AID",
BookTitle= "Proceeding of the Joint Working Conference IFIP TC-6 and TC-11: Communication and Multimedia Security",
Year = "1996"}
323. @Proceedings{SS92,
Author= " R.S. Sandhu and G.S. Suri",
Title= "Non-Monotonic Transformation of Access Rights",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "148-163",
Year = "1992"}
324. @Proceedings{SSH93,
Author= "David R. Safford and Douglas Lee Schales and David K. Hess",
Title= "The TAMU Security Package: an Ongoing response to the Internet Intruders in an Academic Environment",
BookTitle= "Proceedings of the Fourth USENIX Security Symposium",
Year = "1993" }
325. @Proceedings{SSHW88,
Author= "M.M. Sebring and E. Shellhouse and M.E. Hanna and R.A. Whitehurst",
Title= "Expert System in Intrusion Detection: A Case Study",
BookTitle= "Proceedings of the 11th National Computer Security Conference",
Pages = "74-81",
Year = "1988"}
326. @Proceedings{STH85,
Author= " R. Schell and T.F. Tao and M. Heckman",
Title= "Disingning the GEMSOS Security Kernel for Security and Performance",
BookTitle= "8th NCSC",
Pages = "108-119",
Year = "1985"}
327. @Proceedings{Sut86,
Author= "D. Sutherland",
Title= "A Model of Information",
BookTitle= "9th National Computer Security Conference.",
Year = "1986"}
328. @Proceedings{TA91,
Author= " J.J. Tardo and K. Alagappan",
Title= "SPX - Global Authentication Using Public-Key Certificates",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Year = "1991"}
329. @Proceedings{TCL90,
Author= " H.S. Teng and K. Chen and S.C.-Y. Lu",
Title= "Adaptive Real-Time Anomaly Detection using Inductively Generated Sequential Patterns",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Month = "May",
Year = "1990"}
330. @Proceedings{TH90,
Author= " A. Tarah and C. Huitema",
Title= "CHIMAERA : A Network Security Model",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "127-134",
Year = "1990"}
331. @Proceedings{TH92,
Author= " Anas Tarah and Christian Huitema",
Title= "Associating Metrics to Certification Paths",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "175-192",
Year = "1992"}
332. @Proceedings{TLBL90,
Author= " B. Thomson and E.S. Lee and P.I.P. Boulton and D.M. Lewis",
Title= "Using Deducibility in Secure Network Modelling",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "117-124",
Year = "1990"}
333. @Proceedings{Tou92,
Author= " Marie-Jeanne Toussaint",
Title= "Separating the Specification and Implementation Phases in Cryptology",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "77-102",
Year = "1992"}
334. @Proceedings{TR92,
Author= " K. Tibourtine and P. Rolin",
Title= "Distribution de cl\'{e}s pour s\'{e}curiser les Communications des {RPC}",
BookTitle= "Actes de la convention {UNIX} 92",
Month = "mars",
Year = "1992"}
335. @Proceedings{Tro93,
Author= " J.T. Trostle",
Title= "Modelling a Fuzzy Time System",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "82-89",
Year = "1993"}
336. @Proceedings{TS90,
Author= " Gene Tsudik and R. Summers",
Title= "AudES: An Expert System for Security Auditing",
BookTitle= "Proceedings of the AAAI Conference on Innovative Application in Artificial Intelligence",
Month = "May",
Year = "1990"}
337. @Proceedings{Tsu92,
Author= " Gene Tsudik",
Title= "Policy Enforcement in Stub Autonomous Domains",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "229-260",
Year = "1992"}
338. @Proceedings{TY90,
Author= " LC.N. Tseung and K.C. Yu",
Title= "Guaranteed, Reliable, Secure Broadcast Networks",
BookTitle= "proceedings of the IEEE",
Pages = "576-583",
Year = "1990"}
339. @Proceedings{Var90c,
Author= " Vijay Varadharajan",
Title= "A Petri Net Framework for Modelling Information Flow Security Policies",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "125-126",
Year = "1990"}
340. @Proceedings{Vaz93,
Author= "J. Vazquez-Gomez",
Title= "Modelling Multidomain Security",
BookTitle= "The New Security Paradigms Workshop II",
Year ="1993"}
341. @Proceedings{VL89,
Author= " H.S. Vaccaro and G.E. Liepins",
Title= "Detection of Anomalous Computer Session Activity",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Month = "May",
Year = "1989"}
342. @Proceedings{Wal85,
Author= " S.T. Walker",
Title= "Network Security Overview",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "62-76",
Year = "1985"}
343. @Proceedings{WB90,
Author= " W.R.E. Weiss and A. Bauer",
Title= "Analysis of Audit and protocol Data using Methods from Artificial Intelligence",
BookTitle= "Proceedings of the 13th National Computer Security Conference",
Month = "October",
Year = "1990"}
344. @Proceedings{WD87,
Author= " J.C. Williams and S G.W. Dinolt",
Title= "A graph-theoretic formulation of multilevel secure distributed systems: an overview",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "97-103",
Year = "1987"}
345. @Proceedings{Wei69,
Author= " C. Weissman",
Title= "Security controls in the {ADEPT} 50 time system",
BookTitle= "AFIPS fall joint computer conference",
Year = "1969"}
346. @Proceedings{Wei92,
Author= "C. Weissman",
Title= "BLACKER : security for the {DDN}, Examples of {A1} Security Engineering Trades",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "286-292",
Year = "1992"}
347. @Proceedings{WG92,
Author= " Michael Wang and Andrzej Goscinski",
Title= "The Development and Testing of the Identity-Based Conference Key Distribution System for the {RHODOS} Distributed System",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "209-228",
Year = "1992"}
348. @Proceedings{Wie92,
Author= "Michael J. Wiener",
Title= "Efficient {DES} Key Search",
BookTitle= "Crypto'92",
Year = "1992" }
349. @Proceedings{Win90,
Author= " J.R. Winkler",
Title= "A {UNIX} Prototype for Intrusion Detection and Anomaly Detection in Secure Networks",
BookTitle= "Proceedings of the 13th National Computer Security Conference",
Year = "1990"}
350. @Proceedings{Win92,
Author= " J.R. Winkler",
Title= "Intrusion and Anomaly Detection; {ISOA} Update",
BookTitle= "Proceedings of the 15th National Computer Security Conference",
Year = "1992"}
351. @Proceedings{WL92b,
Author= " T.Y.C. Woo and S.S Lam",
Title= "Authorization in Distributed Systems : A formal Approach",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "33-51",
Year = "1992"}
352. @Proceedings{WL93,
Author= " T.Y.C. Woo and S.S. Lam",
Title= "A Semantic Model for Authentification Protocols",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "178-195",
Year = "1993"}
353. @Proceedings{WQ90,
Author= " D. de Waleffe and J.J. Quisquater",
Title= "Better login protocol for computer networks",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "163-172",
Year = "1990"}
354. @Proceedings{Yaz90,
Author= " K. Yazdanian",
Title= "Relational Database Granularity",
BookTitle= "European Symposium on Research in Computer Security (ESORICS)",
Pages = "15-22",
Year = "1990"}
355. @Proceedings{YKB93,
Author= " R. Yaholom and B. Klein and T. Beth",
Title= "Trust Relationships in Secure Systems-A Distributed Authentication Perspective",
BookTitle= "Proceedings of the IEEE Symposium on Security and Privacy",
Pages = "150-164",
Year = "1993"}
356. @Manual{green89,
Title= "IT Security Evaluation Criteria, Bundesanzeiger",
Organization= "German Information Security Agency (GISA)",
Year = "1989"}
357. @Manual{Zim94,
Title= "(PGP) Pretty Good Privacy Encryption System: Users' Guide",
Author= "Philip Zimmermann",
Year = "1994",
Month = "August" }
358. @Thesis{Por92,
Author= "Phillip Andrew Porras",
Title= "A State Transition Analysis Tool For Intrusion Detection",
School= "University of California, Santa Barbara",
Year = "1992"}
359. @Thesis{Asl95,
Author= "Taimur Aslam",
Title= "A taxonomy of Security Faults in the Unix Operating System",
School= "Purdue University",
Year = "1995",
Month = "August" }
360. @Miscellaneous{Abr95,
Author= "Jorg Abraham",
Title= "Etude de l'utilisation de r\'{e}seaux de neurones de type carte de Kohonen pour la d\'{e}tection d'intrusions dans unsyst\`{e}me informatique",
Howpublished= "Rappport de stage",
Month = "mars",
Year = "1995"}
361. @Miscellaneous{AD97,
Author= "Theodore K. Apostolopoulos and Victoria C. Daskalou",
Title= "The Role of the Time Parameter in a Network Security Management Model",
Howpublished= "submitted to the IEEE Symposium on Computer Communication",
Year = "1997",
Note = "reviewed by L.M\'{e}"}
362. @Miscellaneous{AMG97,
Author= "M. Abdalla and M. Mahmoud and A. Goneid",
Title= "Secured Communication System with Neural Network Encoder",
Howpublished= "submitted to the IEEE Symposium on Computer Communication",
Year = "1997",
Note = "reviewed by L.M\'{e}"}
363. @Miscellaneous{Ber97,
Author= "Hughes Bertrand",
Title= "Intrusion Detection System",
Howpublished= "Mémoire M\'{e}ari",
Month = "mars",
Year = "1997",
Keywords= ""}
364. @Miscellaneous{Bob97,
Author= "Gildas Bobon",
Title= "Le march\'{e} de la s\'{e}curit\'{e}",
Howpublished= "Mémoire M\'{e}ari",
Month = "mars",
Year = "1997",
Keywords= ""}
365. @Miscellaneous{BR96,
Author= "Jean-Jacques Bascou and Jer\^{o}me Romeu",
Title= "D\'{e}tection dynamique d'intrusions : une approche par r\'{e}seau de neurones",
Howpublished= "soumis pour publication \`{a} CFIP'96" }
366. @Miscellaneous{Bry88,
Author= "Bill Bryant",
Title= "Designing an Authentication System: a Dialogue in Four Scenes",
Howpublished= "draft, Athena Project",
Month = "February",
Year = "1988",
Keywords= "authentication kerberos"}
367. @Miscellaneous{BWF96,
Author= "M. Bishop and C. Wee and J. Frank",
Title= "Goal Oriented Auditing and Logging",
Howpublished= "Submitted to IEEE Transactions on Computing Systems",
Year = "1996",
url= "http://seclab.cs.ucdavis.edu/papers.html",
Keywords= ""}
368. @Miscellaneous{CC96,
Title= "Common Criteria for IT Security Evaluation",
Howpublished= "CD-ROM",
Month = "January",
Year = "1996"}
369. @Miscellaneous{CCI88,
Author= " CCITT",
Title= "X509, The directory - Authentication framework",
Month = "November",
Year = "1987",
Keywords= "authentication X509"}
370. @Miscellaneous{Cec91,
Author= " { Commission of the European Communities } ",
Title= "Information Technology Security Evaluation Criteria ({ITSEC}), version 1.2",
Month = "june",
Year = "1991"}
371. @Miscellaneous{Cen90,
Author= "{Security Group} {CEN/CENELEC}",
Title= "Taxonomie for security standardisation",
Howpublished= "doc. de travail",
Month = "September",
Year = "1990"}
372. @Miscellaneous{CetDS1-2,
Title= "Computer and Data Security, Vol. 1, No 2",
Howpublished= "Research Information Ltd",
Keywords= ""}
373. @Miscellaneous{CetS9-1,
Title= "Computers and Security",
Howpublished= "Elsevier Advanced Technology",
Month = "february",
Year = "1990",
Keywords= ""}
374. @Miscellaneous{CGZ96,
Author= "Mireille Campana and Marc Girault and Gilles Z\'{e}mor",
Title= "Techniques de s\'{e}curit\'{e} appliqu\'{e}es au courrier\'{e}lectronique et \`{a} Internet",
Howpublished= "France T\'{e}l\'{e}com, Conseil scientifique, M\'{e}mento technique No~7",
Month = "juin",
Year = "1996"}
375. @Miscellaneous{charte,
Title= "Charte d'utilisation des moyens informatiques", }
376. @Miscellaneous{Che91,
Author= "Bill Cheswick",
Title= "An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied",
Howpublished= "ATT Bell Laboratories",
Year = "1991" }
377. @Miscellaneous{Cho90,
Author= "Pascal Chour",
Title= "Cartes \`{a} micro-circuit",
Howpublished= "Polycopi\'{e} Sup\'{e}lec No 3813",
Year = "1990",
Keywords= ""}
378. @Miscellaneous{CJ90,
Author= " K. Cutler and F. Jones",
Title= "{CISR} Commercial International Security Requirements",
Howpublished= "CISR DRAFT",
Month = "August",
Year = "1990"}
379. @Miscellaneous{Cup90a,
Author= " F. Cuppens",
Title= "Une logique \'{e}pist\'{e}mique et d\'{e}ontique pour raisonner sur la s\'{e}curit\'{e} des syst\`{e}mes informatiques",
Howpublished= "ONERA-CERT doc. interne",
Month = "mars",
Year = "1990"}
380. @Miscellaneous{Dac89,
Author= "Marc Dacier",
Title= "La s\'{e}curit\'{e} logique en informatique~: application aux r\'{e}seaux locaux",
Howpublished= "M\'{e}moire pr\'{e}sent\'{e} en vue de l'obtention du grade d'ing\'{e}nieur civil en informatique",
Year = "1989",
Keywords= ""}
381. @Miscellaneous{Dat91a,
Author= "Datapro Research Group",
Title= "Unix System Administration and Security",
Howpublished= "Datapro report",
Month = "January",
Year = "1991",
Keywords= ""}
382. @Miscellaneous{Dat91b,
Author= "Datapro Research Group",
Title= "Computer Crime Methods and Detection",
Howpublished= "Datapro report",
Month = "February",
Year = "1991",
Keywords= "hacking"}
383. @Miscellaneous{DF96,
Author= "Dipankar Dasgupta and Stephanie Forrest",
Title= "Novelty Detection in Time Series Data Using Ideas from Immunology",
Howpublished= "Web doc",
Year = "1996",
url= "http://www.cs.unm.edu/~forrest/noveltydetection96.ps",
Keywords= ""}
384. @Miscellaneous{DOD85,
Author= "{U.S. Defense Department}",
Title= "Trusted Computer System Evaluation Criteria",
Institution= "DoD",
Number = "5200.28-STD",
Year = "1985"}
385. @Miscellaneous{ECMA88,
Author= "ECMA",
Title= "Security In Open Systems: A Security Framework",
Institution= "ECMA",
Number = "TR/46",
Year = "1988"}
386. @Miscellaneous{EHA97,
Author= "Mahmoud T. El-Hadidi and Nadia H. Hegazi and Heba K. Aslan",
Title= "Performance Analysis of the Kerberos Protocol in a Distributed Environment",
Howpublished= "submitted to the IEEE Symposium on Computer Communication",
Year = "1997",
Note = "reviewed by L.M\'{e}"}
387. @Miscellaneous{Far96,
Author= "Dan Farmer",
Title= "Shall We Dust Moscow",
Howpublished= "Web doc",
Month = "December",
Year = "1996",
url= "http://www.trouble.org/survey/",
Keywords= ""}
388. @Miscellaneous{FB90,
Author= " Dan Farmer and Robert Baldwin",
Title= "Computer Oracle and Password System ({COPS})",
How published = "Newsgroup comp.sources.unix",
Year = "1990"}
389. @Miscellaneous{FHS96,
Author= "Stephanie Forrest",
Title= "Computer Immunology",
Howpublished= "Submitted to Communications of the ACM",
Month = "December",
Year = "1996",
url= "http://www.cs.unm.edu/~forrest/cacm.ps",
Keywords= ""}
390. @Miscellaneous{FL92,
Author= "Michael Fiey and Xavier Lacassin",
Title= "Les algorithmes cryptographiques",
Howpublished= "Annexe B, rapport de stage de fin d'\'{e}tude Sup\'{e}lec, Bull Ing\'{e}nierie",
Month = "juin",
Year = "1992" }
391. @Miscellaneous{FSA97,
Author= "Stephanie Forrest and Anil Somayaji and David H. Ackley",
Title= "Building Diverse Computer Systems",
Howpublished= "Submitted to the Sixth Workshop on Hot Topics in Operating Systems",
Year = "1997",
url= "http://www.cs.unm.edu/~forrest/hotos.ps"}
392. @Miscellaneous{Gai95,
Author= "Nicolas Gaillotte",
Title= "Audit de s\'{e}curit\'{e} sur un SAS internet",
Howpublished= "Rapport de stage de fin d'\'{e}tudes ENSTB \`{a} IBM",
Month = "juin",
Year = "1995" }
393. @Miscellaneous{GD97,
Author= "Adriana Gorunescu and Cosmin Dimitriu",
Title= "Analyse d'audit",
Howpublished= "Mémoire Miniprojet ENSTB",
Month = "mars",
Year = "1997",
Keywords= "data mining"}
394. @Miscellaneous{Gui95,
Author= "Louis Guillou",
Title= "Comprehensive Approach of Zero-Knowledge Techniques",
Howpublished= "ISO/IEC JTC 1/SC 27 N 1185",
Month = "October",
Year = "1995" }
395. @Miscellaneous{Ham95,
Author= "Riadh Hamdi",
Title= "S\'{e}curit\'{e} et Internet",
Howpublished= "Rapport de stage de fin d'\'{e}tudes Sup\'{e}lec \`{a} Transpac",
Month = "juin",
Year = "1995" }
396. @Miscellaneous{Hay96,
Author= "Haystack Labs",
Title= "Stalker Product Overview",
Howpublished= "Document html~: \verb|http://www.haystack.com/prod/|",
Year = "1996"}
397. @Miscellaneous{HS88,
Author= " J. Henshall and S. Shaw",
Title= "O{SI} Explained End to End Computer Communication Standards",
Editor= "Chichester, U.K.: Ellis Horwood Limited",
Year = "1988"}
398. @Miscellaneous{HSPxx,
Author= "David K. Hess and David R. Safford and Udo W. Pooch",
Title= "A Unix Network Protocol Security Study: Network Information Service",
Howpublished= "?",
Month = "?",
Year = "?"}
399. @Miscellaneous{Hub96,
Author= "Markus Hubner",
Title= "IP Spoofing Demystified",
Howpublished= "Web doc",
Month = "June",
Year = "1996",
url= "http://www.geocities.com/CapeCanaveral/3498/security.htm",
Keywords= ""}
400. @Miscellaneous{IEE89,
Author= "{IEEE LAN Secutity Working Group}",
Title= "Standard for Interoperable Local Area Network ({LAN}) Security ({SILS}), IEEE 802.10",
Month = "December",
Year = "1989"}
401. @Miscellaneous{IETF,
Author= "IETF",
Title= "Information Technology Security",
Howpublished= "RFC1244"}
402. @Miscellaneous{JCS1-1,
Author= "Journal of Computer Security, Vol. 1, No 1",
Howpublished= "IOS Press",
Year = "1992",
Keywords= ""}
403. @Miscellaneous{JM91,
Author= " P. Janson and R. Molva",
Title= "Security in Open Networks and Distributed Systems",
Howpublished= "Elsevier Science Publishers",
Year = "1991"}
404. @Miscellaneous{Jon95,
Author= "Laurent Joncheray",
Title= "A Simple Active Attack Against TCP",
Howpublished= "",
Month = "April",
Year = "1995"}
405. @Miscellaneous{Jou96,
Author= "Manuella Jourdan",
Title= "ITSEC/ITSEM",
Howpublished= "M\'{e}moire M\'{e}ari 1995/96",
Year = "1996" }
406. @Miscellaneous{Kie89,
Author= " M. Kielsky",
Title= "Security and Access Control Features of the {VAX/VMS} Operating System",
Howpublished= "??",
Year = "1989"}
407. @Miscellaneous{KW91,
Author= " J.O. Kephart and S.R. White",
Title= "Directed-Graph Epidemiological Models of Computer Viruses",
Editor= "IEEE",
Year = "1991"}
408. @Miscellaneous{Lig95,
Author= "Eric Ligaon",
Title= "Introduction \`{a} la s\'{e}curit\'{e} sous Solaris",
Howpublished= "S\'{e}minaire s\'{e}curit\'{e} SUN",
Year = "1995" }
409. @Miscellaneous{Lin90,
Author= " T.Y. Lin",
Title= "Probalistic Measure on Aggregations",
Editor= "IEEE",
Year = "1990"}
410. @Miscellaneous{LR96,
Author= "S\'{e}bastien Letard and Herv\'{e} racine",
Title= "Mise en place d'un firewall IP sur un site universitaire",
Howpublished= "rapport de projet \'{e}tudiant de l'ENSTB",
Month = "f\'{e}vrier",
Year = "1996" }
411. @Miscellaneous{McM91,
Author= "Rob McMillan",
Title= "Site Security Policy Development",
Howpublished= "Security Emergency Response Team, Australia",
Year = "1991"}
412. @Miscellaneous{Me96a,
Author= "Ludovic M\'{e}",
Title= "Genetic Algorithms, a Biologically Inspired Approach for Security Audit Trails Analysis",
Howpublished= "Short paper, 1996 IEEE Symposium on Security and Privacy",
Month = "May",
Year = "1996" }
413. @Miscellaneous{Mei93,
Author= "Eric Meillan",
Title= "Droit de la s\'{e}curit\'{e} des syst\`{e}mes d'information",
Howpublished= "cours fait \`{a} l'ENSTB",
Year = "1993" }
414. @Miscellaneous{Mie92,
Author= "St\'{e}phane Mi\`{e}ge",
Title= "Codage et s\'{e}curit\'{e} des donn\'{e}es",
Howpublished= "Polycopi\'{e} Sup\'{e}lec No 3943",
Year = "1992",
Keywords= ""}
415. @Miscellaneous{MJM93,
Author= "J. D. Moffett and D. Jonscher and J. A. McDermid",
Title= "The Policy Obstacle Course",
Howpublished= "SCHEMA/York/93/1 version 1",
Month = "July",
Year = "1993"}
416. @Miscellaneous{Muf92,
Author= "Alec D.E. Muffett",
Title= "Crack: A Sensible Password Checker for Unix",
Howpublished= "from ftp:corton.inria.fr/CERT/tools/crack/crack4.1.tar",
Month = "march",
Year = "1992" }
417. @Miscellaneous{NM95,
Author= "David Newmann and Brent Melson",
Title= "Can Firewall Take the Heat ?",
Howpublished= "Data Communication on the web",
Month = "November",
Year = "1995" }
418. @Miscellaneous{Pel92,
Author= " Christian Pelissier",
Title= "Guide de s\'{e}curit\'{e} pour des syst\`{e}mes {UNIX}",
Howpublished= "Draft, 22 juillet, 1992",
Month = "juillet",
Year = "1992"}
419. @Miscellaneous{PG??,
Author= " J.C. Pailles and M. Girault",
Title= "A Public Key Based Solution for Secured Data ",
Howpublished= "Communications",
Year = "??"}
420. @Miscellaneous{Ren94,
Author= "Herv\'{e} renaud",
Title= "Bases math\'{e}matiques du codage et de la s\'{e}curit\'{e}",
Howpublished= "Polycopi\'{e} Sup\'{e}lec No",
Year = "1994",
Keywords= ""}
421. @Miscellaneous{Rey91,
Author= " J.K. Reynolds",
Title= "The helminthiasis of the Internet",
Howpublished= "Elsevier Science Publishers B.V. Ed.",
Year = "1991"}
422. @Miscellaneous{RG95,
Author= "Ron Rivest and Rosario Gennaro",
Title= "Course on Network and Computer Security",
Howpublished= "Web doc",
Year = "1995",
url= "http://theory.lcs.mit.edu/~rosario/6.915/home.html",
Keywords= ""}
423. @Miscellaneous{RIR4-1,
Author= "R\'{e}seaux et informatique r\'{e}partie, Vol. 4, No 1",
Howpublished= "Hermes",
Year = "1994",
Note = "Contient papier LM/JVG/PR sur les modeles",
Keywords= ""}
424. @Miscellaneous{Rol92,
Author= "Pierre Rolin",
Title= "S\'{e}curit\'{e} des r\'{e}seaux",
Howpublished= "unpublished draft",
Month = "octobre",
Year = "1992",
Keywords= "authentication X509 kerberos chimerae"}
425. @Miscellaneous{Rou89,
Author= "B. Roulin",
Title= "Sp\'{e}cification de d\'{e}finition d'un UNIX s\'{e}curis\'{e}",
Howpublished= "document technique AQL",
Month = "juin",
Year = "1989" }
426. @Miscellaneous{RR96,
Author= "Patrick Ragaru and Roberto Ramos",
Title= "S\'{e}curisation d'architecture client-serveur",
Howpublished= "rapport de projet \'{e}tudiant de l'ENSTB",
Month = "f\'{e}vrier",
Year = "1996",
Keywords= "authentication kerberos DCE sesame" }
427. @Miscellaneous{RS96,
Author= "R.L. Rivest and A. Shamir",
Title= "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps",
Howpublished= "Web doc",
Month = "May",
Year = "1996",
url= "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps",
Keywords= "commerce electronique" }
428. @Miscellaneous{Sai96,
Author= "Science Applications International Corporation",
Title= "CMDS: Product Description",
Howpublished= "Document html~: \verb|http://www.saic.com:80/it/cmds|",
Year = "1996"}
429. @Miscellaneous{Sal90,
Author= "R. Salz",
Title= "Computer Oracle Passwd System (COPS)",
Howpublished= "Newsgroup Article",
Year = "1990"}
430. @Miscellaneous{Sam85,
Author= " M. Samociuk",
Title= "Hacking, or the Art of Armchair Espionage",
Howpublished= "Computer Fraud and Security Bulletin (Amsterdam) Supplement",
Volume = "7",
Number = "9",
Year = "1985",
Keywords= "hacking"}
431. @Miscellaneous{SCSSI94,
Author= "{Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes Informatiques}",
Title= "La menace et les attaques informatiques",
Howpublished= "document commun DISSI/SCSSI Num\'{e}ro 650",
Month = "mars",
Year = "1994"}
432. @Miscellaneous{Sec91,
Title= "Actes de SECURICOM'91",
Howpublished= "SECURICOM",
Year = "1991"}
433. @Miscellaneous{Seexx,
Author= "Donn Seeley",
Title= "A Tour of the Worm",
Howpublished= "?",
Month = "?",
Year = "?"}
434. @Miscellaneous{Semper96,
Author= "Semper European Project",
Title= "Secure Electonic Marketplace for Europe",
Howpublished= "Document html~: \verb|http://www.semper.org|",
Year = "1996",
Keywords= "commerce electronique"}
435. @Miscellaneous{SF89,
Author= " J.E. Shimp and J. Filsinger",
Title= "Implementation of a Capabilities Knowledge Base for Data Integrity",
Howpublished= "IEEE CH2674-5/89/0000-0283",
Year = "1989"}
436. @Miscellaneous{SGDN90,
Author= "{Secr\'{e}tariat G\'{e}n\'{e}ral de la D\'{e}fense Nationale}",
Title= "Protection des informations sensibles ne relevant pas du secret de d\'{e}fense",
Howpublished= "document commun SGDN/DISSI/SCSSI Num\'{e}ro 600",
Month = "janvier",
Year = "1990"}
437. @Miscellaneous{Shi82,
Author= " R.W. Shirey",
Title= "Security in Local Area Networks",
Howpublished= "IEEE CH1811-9/82/0000/0028\$00.75",
Year = "1982"}
438. @Miscellaneous{Shi89,
Author= " R.W. Shirey",
Title= "Security in Local Area Networks",
Howpublished= "??",
Year = "1989"}
439. @Miscellaneous{Sob96a,
Author= "Michael Sobirey",
Title= "Michael Sobirey's Intrusion Detection Page",
Howpublished= "http://www.informatik.tu-cottbus.de/~sobirey/ids.html",
Year = "1996",
Keywords= "intrusion detection"}
440. @Miscellaneous{Sob96b,
Author= "Michael Sobirey",
Title= "The Intrusion Detection System AID",
Howpublished= "http://www.informatik.tu-cottbus.de/~sobirey/aid-e.html",
Year = "1996",
Keywords= "intrusion detection"}
441. @Miscellaneous{Spa94,
Author= "Eugene Spafford",
Title= "Computer Viruses as Artificial Life",
Howpublished= "to appear in the Journal of Artificial Life",
Year = "1994" }
442. @Miscellaneous{Ste??,
Author= " Jacques Stern",
Title= "La complexit\'{e} comme fondement de la cryptographie moderne",
Howpublished= "S\'{e}minaire : la cryptographie, fondements, applications, perspectives",
Year = "??"}
443. @Miscellaneous{Sto81,
Author= " A. Stoughton",
Title= "Acces Flow : A Protection Model Which Integrates Access Control and Information Flow",
Howpublished= "IEEE CH1629-5/81/0000/0009\$00.75",
Year = "1981"}
444. @Miscellaneous{Sun95,
Author= "Sun Microsystems",
Title= "The HotJava Browser~: a White Paper",
Howpublished= "Document publi\'{e} par Sun",
Year = "1995"}
445. @Miscellaneous{Sun96,
Author= "Sun ",
Title= "La s\'{e}curit\'{e} sur Internet",
Howpublished= "Documents remis lors du s\'{e}minaire du 26 mars 1996 \`{a} Rennes",
Month = "mars",
Year = "1996" }
446. @Miscellaneous{Tal96,
Author= "Fran\c{c}ois Tallet",
Title= "Les firewalls",
Howpublished= "M\'{e}moire MEARI",
Year = "1996" }
447. @Miscellaneous{Tribunix8-42-43,
Title= "Tribunix, No 42 et 43",
Howpublished= "AFUU",
Year = "1992",
Note = "contient Article LM/VA sur audit AIX",
Keywords= "" }
448. @Miscellaneous{TSI15-4,
Title= "Technique et science informatique, Vol.15, No 4",
Howpublished= "Hermes",
Year = "1996",
Note = "Contient papier LM/VA sur la d\'{e}tection d'intrusions",
Keywords= ""}
449. @Miscellaneous{Var90b,
Author= " Vijay Varadharajan",
Title= "Petri Net Based Modelling of Information Flow Security Requirements",
Howpublished= "IEEE Catalog Number 90TH0315-2",
Year = "1990"}
450. @Miscellaneous{Venxx,
Author= "Wietse Venema",
Title= "TCP Wrapper",
Howpublished= "?",
Month = "?",
Year = "?"}
451. @Miscellaneous{Vou96,
Author= "Fabien Vouillon",
Title= "Etude des approches neuronales utilis\'{e}es en d\'{e}tection d'intrusions",
Howpublished= "M\'{e}moire M\'{e}ari, Sup\'{e}lec",
Month = "mars",
Year = "1996"}
452. @phdthesis{Alt92,
Author= "Anas Altarah",
Title= "Chimaera~: un mod\`{e}le pour la s\'{e}curit\'{e} des syst\`{e}mes ouverts",
School= "Universit\'{e} de Nice Sophia-Antipolis",
Year = "1992",
Month = "d\'{e}cembre",
Keywords= "authentication chimaera"}
453. @phdthesis{Bie89,
Author= " P. Bieber",
Title= "Aspects epist\'{e}miques des protocoles cryptographiques",
School= "Universit\'{e} Paul-Sabatier - TOULOUSE N d'ordre 531",
Year = "1989"}
454. @phdthesis{Deb93,
Author= "Herv\'e Debar",
Title= "Application des r\'eseaux de neurones \`a la d\'etection d'intrusions sur les syst\`emes informatiques",School= "Universit\'e de Paris 6",
Year = "1993"}
455. @phdthesis{Kar91,
Author= "Arto T. Karila",
Title= "Open Systems Security: An Architectural Framework",
School= "Helsinki University of Technology",
Year = "1991",
Keywords= ""}
456. @phdthesis{Ko96,
Author= "Calvin C.W. Ko",
Title= "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach",
School= "University of California at Davis",
Year = "1996",
Keywords= ""}
457. @phdthesis{Kum95,
Author= "Sandeep Kumar",
Title= "Classification and Detection of Computer Intrusions",
School= "Purdue University",
Year = "1995",
Month = "August" }
458. @phdthesis{Lau97,
Author= "Maryline Laurent",
Title= "Protection des communications sur les r\'{e}seaux ATM",
School= "Universit\'{e} de Rennes 1",
Year = "1997",
Month = "juillet"}
459. @phdthesis{Me94,
Author= "Ludovic M\'{e}",
Title= "Audit de s\'{e}curit\'{e} par algorithmes g\'{e}n\'{e}tiques",
School= "Universit\'{e} de Rennes 1 - Num\'{e}ro d'ordre 1069",
Year = "1994"}
460. @phdthesis{Mic93,
Author= "J. B. Michael",
Title= "A Formal Process for Testing the Consistency of Composed Security Policies",
School= "George Mason University",
Month = "August",
Year = "1993"}
461. @phdthesis{Mou97,
Author= "Abdelaziz Mounji",
Title= "Rule-Based Distributed Intrusion Detection",
School= "Universit\'{e} de Namur",
Year = "1997",
Month = "Juillet 1997",
url= "",
Keywords= "detection d'intrusions" }
462. @phdthesis{Sam96,
Author= "Didier Samfat",
Title= "Architecture de s\'{e}curit\'{e} pour r\'{e}seaux mobiles",
School= "Ecole Nationale des T\'{e}l\'{e}communications de Paris",
Year = "1996" }
463. @phdthesis{Vaz94,
Author= "Jos\'{e} V\'{a}zquez G\'{o}mez",
Title= "Contribution \`{a} la mod\'{e}lisation de la s\'{e}curit\'{e}multidomaine",
School= "Universit\'{e} de Rennes 1",
Year = "1994",
Keywords= ""}
464. @proceedings{,
Institution= "CEN/CENELEC",
Title= "Security Aspects in OSI Functional Standards",
Editor= "?",
Year = "1989",
Keywords= ""}
465. @proceedings{DNAC91,
Institution= "DNAC",
Title= "De nouvelles architecture pour les communications~: les r\'{e}seaux informatiques, qualit\'{e} de service, s\'{e}curit\'{e} et performances",
Editor= "Eyrolles",
Year = "1991"}
466. @proceedings{esorics96,
Institution= "",
Title= "Proceedings of the 1996 European Symposium on Research in Computer Security",
Editor= "",
Year = "1996",
Keywords= ""}
467. @proceedings{Franconia90,
Institution= "IEEE",
Title= "Proceedings of the Computer Security Foundations Worshop III",
Editor= "IEEE Computer Society Press",
Year = "1990",
Keywords= ""}
468. @proceedings{IEC96,
Institution= "SCIP France and GBDA Europe and OSS Inc.",
Title= "Intelligence \'{e}conomique et comp\'{e}titive",
Editor= "sIECa",
Year = "1996",
Keywords= ""}
469. @proceedings{NCSC16,
Institution= "NIST-NCSC",
Title= "Proceedings of the 16th National Computer Security Conference",
Editor= "?",
Year = "1993",
Keywords= ""}
470. @proceedings{NSPW92,
Institution= "ACM SIGSAC",
Title= "New Security Paradigms Workshop",
Editor= "IEEE Computer Society Press",
Year = "1992" }
471. @proceedings{NSPW93,
Institution= "ACM SIGSAC",
Title= "New Security Paradigms Workshop",
Editor= "IEEE Computer Society Press",
Year = "1993" }
472. @proceedings{oakland94,
Institution= "IEEE",
Title= "Proceedings of the 1996 IEEE Symposium on Security and Privacy",
Editor= "IEEE Computer Society Press",
Year = "1994",
Keywords= ""}
473. @proceedings{oakland96,
Institution= "IEEE",
Title= "Proceedings of the 1996 IEEE Symposium on Security and Privacy",
Editor= "IEEE Computer Society Press",
Year = "1996",
Keywords= ""}
474. @proceedings{oakland97,
Institution= "IEEE",
Title= "Proceedings of the 1997 IEEE Symposium on Security and Privacy",
Editor= "IEEE Computer Society Press",
Year = "1997",
Keywords= ""}
475. @proceedings{safecomp93,
Institution= "EWICS",
Title= "Proceedings of the 12th International Conference on Computer Safety, Reliability and Security",
Editor= "Springer-Verlag",
Year = "1993",
Keywords= ""}
476. @Technical Report {ABKL90,
Author= " M. Abadi and M. Burrows and C. Kaufman and B. Lampson",
Title= "Authentication and Delegation with Smart-cards",
Institution= "DIGITAL, Systems Research Center",
Number = "67",
Month = "October",
Year = "1990"}
477. @Technical Report {AFN90,
Author= "AFNOR",
Title= "Pour une approche m\'{e}thodique de la s\'{e}curit\'{e} des syst\`{e}mes d'information (LES METHODES MARION ET MELISA)",
Institution= "CNTI/CN27/GE1",
Number = "4",
Month = "novembre",
Year = "1990"}
478. @Technical Report {Amb91,
Author= "O. Ambrois",
Title= "Aspects of security, integrity and privacy in the telecommunication network",
Institution= "CSELT",
Volume = "XIX",
Number = "2",
Month = "avril",
Year = "1991"}
479. @Technical Report {And72,
Author= " J.P. Anderson",
Title= "Computer Security Technology Planning Study",
Institution= "ESD-TR-73-51",
Volume = "1",
Month = "October",
Year = "1972"}
480. @Technical Report {And80,
Author= " J.P. Anderson",
Title= "Computer Security Threat Monitoring and Surveillance",
Institution= "James P. Anderson Company, Fort Washington, Pennsylvania",
Month = "April",
Year = "1980"}
481. @Technical Report {BAN89,
Author= " M. Burrows and M. Abadi and R. Needham",
Title= "A Logic of Authentication",
Institution= "DIGITAL, Systems Research Center, N 39",
Month = "February",
Year = "1989",
Keywords= "authentication logic"}
482. @Technical Report {BB93,
Author= "Jean-Pierre Ban\^{a}tre and Ciar\'{a}n Bryce",
Title= "A Security Proof System for Netwoks of Communicating Processes",
Institution= "IRISA",
Number = "744",
Month = "juin",
Year = "1993" }
483. @Technical Report {Ber93,
Author= "Aviv Bergman",
Title= "Intrusion Detection with Neural Networks",
Institution= "SRI International",
Year = "1993",
Number = "A012",
Month = "February"}
484. @Technical Report {Bib77,
Author= " K.J. Biba",
Title= "Integrity consideration for secure computer systems",
Institution= "MITRE Corp., MTR-2997",
Year = "1977"}
485. @Technical Report {Bis95,
Author= "Matt Bishop",
Title= "A standard audit trail format",
Institution= "Department of Computer Science, University of California at Davis",
Year = "1995"}
486. @Technical Report {BLP73,
Author= " D.E. Bell and L.J. La Padula",
Title= "Security computer systems : mathematical foundations",
Institution= "Hanscom AFB. Bedford. MA. Rep. FSD-TR-73-278.,
ESD/AFSC",
Volume = "1",
Year = "1973"}
487. @Technical Report {BLP74,
Author= "D.E. Bell and L.J. LaPadula",
Title= "Security Computer Systems: Mathematical foundations and
model",
Institution= "MITRE Corp., Bedford, Mass.",
Year = "1974"}
488. @Technical Report {BLP75,
Author= "D.E. Bell and L.J. La Padula",
Title= "Secure Computer Systems: Unified Exposition and Multics Interpretation",
Institution= "MTR-2997, MITRE Corp., Bedford, Mass.",
Month = "July",
Year = "1975"}
489. @Technical Report {CB94,
Author= "Mark Crosbie and Gene Spafford",
Title= "Defending a Computer System using Autonomous Agents",
Institution= "Purdue University",
Year = "1994",
Number = "95-022",
Month = "March",
URL = "http://www.cs.purdue.edu/homes/spaf/tech-reps/9522.ps" }
490. @Technical Report {CB95,
Author= "Mark Crosbie and Gene Spafford",
Title= "Active Defense of a Computer System using Autonomous Agents",
Institution= "Purdue University",
Year = "1995",
Number = "95-008",
Month = "February",
URL = "http://www.cs.purdue.edu/homes/spaf/tech-reps/9508.ps" }
491. @Technical Report {CD94,
Author= "George Coulouris and Jean Dallimore",
Title= "A Security Model for Cooperative Work",
Institution= "Queen Mary and Westfield College, Department of Computer Science",
Year = "1994",
Number = "674",
Month = "October"}
492. @Technical Report {CGLP92,
Author= "B. Courtois and M.C. Gaudel and J.C. Laprie and D. Powell",
Title= "S\^{u}ret\'{e} de fonctionnement informatique",
Institution= "LAAS",
Number = "92.382",
Month = "d\'{e}cembre",
Year = "1992" }
493. @Technical Report {Cra91,
Author= " R.E. Crandall",
Title= "Fast Elliptic Encryption",
Institution= "NeXT, Scientific Computation Group",
Number = "91.04.07",
Year = "1991"}
494. @Technical Report {Cur90,
Author= "David A. Curry",
Title= "Improving the Security of Your Unix System",
Institution= "SRI",
Year = "1990",
Number = "ITSTD-721-FR-90-21",
Month = "April"}
495. @Technical Report {Dav85,
Author= " W.L. Davis Jr",
Title= "Synopsis of {U.S.} Department of Defense Evaluation Criteria",
Institution= "IBM",
Number = "85212PUR0233",
Month = "July",
Year = "1985"}
496. @Technical Report {DKD92,
Author= " Marc Dacier and Mohamed Kaâniche and Yves Deswarte",
Title= "A Framework for Operational Security Assessment of
Computing Systems",
Institution= "LAAS",
Number = "92-434",
Year = "1992"}
497. @Technical Report {DM??,
Author= " E. Deberdt and S. Martin",
Title= "M\'{e}thodologie '{MINERVE SECURITE}' demarche d'\'{e}valuation de la s\'{e}curit\'{e} des logiciels",
Institution= "IBM",
Number = "LGE 08",
Pages = "223",
Year = "??"}
498. @Technical Report {ECMA89,
Author= " ECMA",
Title= "Security In Open Systems : Data Elements and Service Definitions",
Institution= "ECMA",
Number = "138",
Note = "Standard",
Year = "1989"}
499. @Technical Report {Fal.90,
Author= "Kevin L. Fox and Ronda R. Henning and Jonathan H. Reed and Richard P. Simonian",
Title= "A Neural Network Approach Towards Intrusion Detection",
Institution= "Harris Corporation",
Year = "1990" }
500. @Technical Report {Fal.96,
Author= "Edward W. Felten and Dirk Balfanz and Drew Dean and Dan S. Wallach",
Title= "Web Spoofing: An Internet Con Game",
Institution= "Princeton University",
Year = "1996",
Number = "540-96"}
501. @Technical Report {Fei80,
Author= " R.J. Feiertag",
Title= "A technique for Proving Specification Are multilevel Secure",
jInstitution= "Computer Science Lab SRI International. Menlo Park,
Cal.",
Number = "CSL-109",
Year = "1980"}
502. @Technical Report {Fra94,
Author= "Jeremy Frank",
Title= "Artificial Intelligence and Intrusion Detection: Current and Future Directions",
Institution= "University of California at Davis",
Year = "1994",
Number = "NSA URP MDA904-93-C-4085",
Month = "June" }
503. @Technical Report {Gal87,
Author= "Patrick R. Gallagher",
Title= "A Guide to Understandinf Audit in Trusted Systems",
Institution= "NCSC",
Year = "1987",
Number = "NCSC-TG-001",
Month = "July"}
504. @Technical Report {GK95,
Author= "Sokratis Katsikas and Dimitris Gritzalis",
Title= "University Programmes on Information Security, Dependability and Safety",
Institution= "Erasmus",
Year = "1995",
Number = "ICP-94(95)-G-4016/11:IS-CD-3c",
Month = "July",
Keywords= ""}
505. @Technical Report {Honeywell72,
Author= "Honeywell",
Title= "Multics",
Institution= "Honeywell",
Year = "1972"}
506. @Technical Report {IBM90a,
Author= " IBM",
Title= "{AIX} version 3.1 for {RISC} System/6000{TM} : General Concepts and Procedures",
Institution= "IBM : documentation technique",
Year = "1990"}
507. @Technical Report {IBM91,
Author= " IBM",
Title= "Elements of {AIX} Security",
Institution= "IBM : documentation technique",
Number = "GG24-3622-01",
Year = "1991"}
508. @Technical Report {IBM94,
Title= "Secured Network Gateway Version 1.2: Installation, Configuration and Administration Guide",
organization= "IBM",
Edition = "first",
Year = "1994",
Month = "december" }
509. @Technical Report {ISO84,
Author= "ISO",
Title= "Information Processing Systems -- {OSI} Reference Model, International Standards Organization",
Institution= "ISO",
Number = "7498",
Month = "October",
Year = "1984"}
510. @Technical Report {ISO89,
Author= "ISO",
Title= "Information Processing Systems -- {OSI} Reference Model -- Part 2: Security Architecture, International Standards Organization",
Institution= "ISO",
Number = "7498-2",
Year = "1989"}
511. @Technical Report {ISO90,
Author= "ISO",
Title= "{MD4} - Message Digest Algorithm",
Institution= "International Standards Organization",
Number = "ISO/IEC JTC1/SC27/WG20.2 N193",
month ="April",
Year = "1990"}
512. @Technical Report {Iso91a,
Author= "ISO",
Title= "Glossary of Information Technology Security Definitions",
Institution= "International Standards Organization Publication",
Number = "ISO/IEC JTC1/SC27 N270",
Year = "1991",
keyword = "glossary"}
513. @Technical Report {Iso91b,
Author= " ISO",
Title= "Telecommunications and Information Exchange Between Systems - Transport Layer Security Protocol",
Institution= "International Standards Organization Publication",
Number = "ISO/IEC JTC1/SC6 N6779",
Month = "October",
Year = "1991"}
514. @Technical Report {Iso91c,
Author= " ISO",
Title= "Telecommunications and Information Exchange Between Systems - Network Layer Security Protocol",
Institution= "International Standards Organization Publication",
Number = "ISO/IEC JTC1/SC6 N7053",
Month = "November",
Year = "1991"}
515. @Technical Report {Iso91d,
Author= " ISO",
Title= "Telecommunications and Information Exchange Between Systems - Transport Layer Security Protocol - Amendement 1: Security Association Establishment",
Institution= "International Standards Organization",
Number = "ISO/IEC JTC1/SC6 N6794",
Month = "December",
Year = "1991"}
516. @Technical Report {ITSEM92,
Author= " {Commision of the} {European} {³ommunities}",
Title= "Information Technology Security Evaluation Manual ({ITSEM})",
Institution= "CEC",
Year = "1992"}
517. @Technical Report {Jal.93a,
Author= " H.S. Javitz and A. Valdes and T.F. Lunt and A. Tamaru and M. Tyson and J. Lowrance",
Title= "Next Generation Intrusion Detection Expert System ({NIDES})",
Institution= "SRI",
Number = "A016-Rationales",
Year = "1993"}
518. @Technical Report {JM90,
Author= "P. Janson and R. Molva",
Title= "Network Security",
Institution= "IBM Zurich Research Laboratory",
Month = "May",
Year = "1990"}
519. @Technical Report {JMW96,
Author= "Nigel Jefferies a,d Chris Mitchell and Michael Walker",
Title= "Combining TTP-based key management with key escrow",
Institution= "Information Security Group, Royal Holloway, University of London",
Year = "1996",
Month = "April",
Keywords= "tiers de confiance key escrowing"}
520. @Technical Report {Jon??,
Author= " R. W. Jones",
Title= "A General Mechanism for Access Control: Its Relationship to Secure Systems Concepts",
Institution= "IBM",
Number = "LGE 08",
Pages = "45",
Year = "??"}
521. @Technical Report {JV94,
Author= "Abdelaziz Mounji and Baudouin Le Charlier and Denis Zampunieris and Naji Habra",
Title= "Distributed Audit trail Analysis",
Institution= "Facult\'{e} Universitaire Notre-Dame de la Paix",
Number = "RP-94-007",
Year = "1994"}
522. @Technical Report {JV94a,
Author= "Harold S. Javitz and Alfonso Valdes",
Title= "The {NIDES} Statistical Component Description and Justification",
Institution= "SRI",
Number = "A010",
Year = "1994"}
523. @Technical Report {JV94b,
Author= "Debra Anderson and Teresa Lunt and Harold Javitz and Ann Tamaru and Alfonso Valdes",
Title= "Safeguard Final Report: Detecting Unusual program Behavior Using the {NIDES} Statistical Component",
Institution= "SRI",
Number = "",
Year = "1994"}
524. @Technical Report {Kai??,
Author= " J. Kaiser",
Title= "An Object-Oriented Architecture to Support System Reliability and Security",
Institution= "IBM",
Number = "LGE 08",
Pages = "51",
year= "??"}
525. @Technical Report {KS94,
Author= "Sandeep Kumar and Eugene H. Spafford",
Title= "An Application of pattern Matching in Intrusion Detection",
Institution= "Purdue University",
Year = "1994",
Number = "CSD-TR-94-013",
Month = "June" }
526. @Technical Report {KSL??,
Author= " A. Kehne and J. Schönwälder and H. Langendörfer",
Title= "Multiple Authentications with a Nonce-Based Protocol Using Generalized Timestamps",
Institution= "Institut für Betriebssysteme und Rechnerverbund, TU Braunschweig, Bültenweg 74/75, D-3300 Braunschweig",
Year = "1991"}
527. @Technical Report {Lal.90a,
Author= " T.F. Lunt and A. Tamaru and F. Gilham and R. Jagannathan and C. Jalali and H.S. Javitz and A. Valdes and P.G. Neumann",
Title= "A real-Time Intrusion-Detection Expert System",
Institution= "SRI International",
Month = "June",
Year = "1990"}
528. @Technical Report {Lal.91,
Author= " Lassire and Reboulet and Ruggiu and Velin and Yazdanian",
Title= "Glossaire encyclop\'{e}dique de la s\'{e}curit\'{e} et qualit\'{e} des syst\`{e}mes d'information et informatiques",
Institution= "CT 'S\'{e}curit\'{e} et sûret\'{e} informatiques' de l'AFCET",
Month = "novembre",
Year = "1991",
keyword = "glossary"}
529. @Technical Report {LB91,
Author= " Linda Lankewicz and Mark Benard",
Title= "Real-Time Anomaly Detection Using a Nonparametric Pattern Recognition Approach",
Institution= "Tulane University, Department of Computer Science",
Number = "TUTR 91-106",
Year = "1991"}
530. @Technical Report {Lin96,
Author= "Ulf Lindqvist",
Title= "Observations on the Nature of Computer Security Intrusions",
Institution= "Chalmers university of technology",
Year = "1996",
Number = "253L",
Month = "December",
url= "",
Keywords= "intrusions detection"}
531. @Technical Report {MIC90a,
Author= " MICROSOFT",
Title= "L{AN} Manager : guide de l'administrateur",
Institution= "MICROSOFT",
Note = "Documentation technique",
Year = "1990"}
532. @Technical Report {MIC90b,
Author= " MICROSOFT",
Title= "{LAN} Manager : Manuel de reference de l'administrateur",
Institution= " MICROSOFT",
Note = "Documentation technique",
Year = "1990"}
533. @Technical Report {MNSS87,
Author= " S.P. Miller and B.C. Neuman and J.I. Schiller and J.H. Saltzer",
Title= "{K}erberos Authentication and Authorization System",
Institution= "MIT Proj. ATHENA, Technical Plan, Section E.2.1",
Month = "December",
Year = "1987"}
534. @Technical Report {MP94,
Author= "Manel Medina and Enric Peig",
Title= "Survey of Security Related Application Areas and Objects",
Institution= "Universitat Polit\`{e}cnica de Catalunya",
Number = "",
Year = "1994"}
535. @Technical Report {MV91,
Author= "Ludovic M\'e and Jos\'{e} Vazquez",
Title= "La s\'{e}curit\'{e} des syst\`{e}mes informatiques : \'{e}tude bibliographique",
Institution= "SUP\'ELEC/LM",
Number = "91-001",
Year = "1991"}
536. @Technical Report {NBS77,
Author= " National {Bureau of} Standards",
Title= "Data {E}ncryption {S}tandard",
Institution= "NBS",
Year = "1977"}
537. @Technical Report {NCSC87,
Author= " {National Computer Security Center} {NCSC}",
Title= "Trusted {N}etwork {I}nterpretation of the {TCSEC}",
Institution= "NCSC",
Number = "NCSC-TG-005",
Month = "July",
Year = "1987"}
538. @Technical Report {NCSC90,
Author= " {National Computer Security Center} {NCSC}",
Title= "Trusted {N}etwork {I}nterpretation environments guideline",
Institution= "NCSC",
Number = "NCSC-TG-011, vers.1",
Month = "August",
Year = "1990"}
539. @Technical Report {NF90,
Author= " Norme Fran\c{c}çaise",
Title= "Interconnexion des syst\`{e}mes ouverts : Architecture de s\'{e}curit\'{e}",
Institution= "ISO",
Number = "NF ISO 7498-2",
Month = "septembre",
Year = "1990"}
540. @Technical Report {PA??,
Author= " A. Pfitzmann and R. Assmann",
Title= "Efficient Software Implementations of (Generalized) {DES}",
Institution= "Univ. KARLSRUHE",
Year = "??"}
541. @Technical Report {Pel90,
Author= " Christian Pelissier",
Title= "Guide de s\'{e}curit\'{e} pour les administrateurs de syst\`{e}mes {UNIX}",
Institution= "ONERA : Rapport interne",
Year = "1990"}
542. @Technical Report {Per92b,
Author= " O. Perret",
Title= "La s\'{e}curit\'{e} certifi\'{e}e sous {UNIX}, \`{a} partir d'une exp\'{e}rience sur {S}un{OS MLS}",
Institution= "ENSTA : Rapport interne",
Year = "1991"}
543. @Technical Report {RSA78b,
Author= " R.L. Rivest and A. Shamir and L. Adleman",
Title= "Mental Poker",
Institution= "MIT",
Number = "TM-125",
Month = "November",
Year = "1978"}
544. @Technical Report {Sch91,
Author= " Herv\'{e} Schauer",
Title= "La s\'{e}curit\'{e} sous {UNIX}",
Institution= "CNES",
Year = "1991"}
545. @Technical Report {Sch92,
Author= " Herv\'{e} Schauer",
Title= "La s\'{e}curit\'{e} des r\'{e}seaux TCP/IP sous {UNIX}",
Institution= "Herv\'{e} Schauer Consultant",
Year = "1992"}
546. @Technical Report {Scs90a,
Author= " { Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes
d'information } SCSSI",
Title= "Crit\`{e}res d'\'{e}valuation de la s\'{e}curit\'{e} des
syst\`{e}mes informatiques ({ITSEC})",
Institution= "SCSSI",
Year = "1990"}
547. @Technical Report {Scs90b,
Author= " {Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes d'information} {SCSSI}",
Title= "Glossaire de la s\'{e}curit\'{e} des syst\`{e}mes d'information",
Institution= " SCSSI",
Number = "CNTI/CN 27, N23",
Month = "octobre",
Year = "1990",
keyword = "glossary"}
548. @Technical Report {Scs92,
Author= " {Service Central de la S\'{e}curit\'{e} des Syst\`{e}mes d'information} {SCSSI}",
Title= "D\'{e}veloppement de syst\`{e}mes d'information s\'{e}curis\'{e}s ({DSIS})",
Institution= "SCSSI",
Month = "septembre",
Year = "1992"}
549. @Technical Report {SD89,
Author= " Bruno Struif and G.M.D Darmstadt",
Title= "Concepts Applications Activities",
Institution= "TELETRUST International Publication",
Month = "March",
Year = "1989"}
550. @Technical Report {SUN90a,
Author= " SUN Microsystems",
Title= "{S}un{OS} {MLS} Programmer's Guide",
Institution= "Sun : documentation technique",
Month = "January",
Year = "1990"}
551. @Technical Report {SUN90b,
Author= " SUN Microsystems",
Title= "{S}un{OS} {MLS} System administrator",
Institution= "SUN",
Note = "Chapitre 17 : Auditing, Sun : documentation technique",
Month = "January",
Year = "1990"}
552. @Technical Report {Tsu88,
Author= "Gene Tsudik",
Title= "An Expert System for Security Auditing",
Institution= "IBM Los Angeles Scientific Software",
Year = "1988", }
553. @Technical Report {War70,
Author= " W.H. Ware",
Title= "Security Controls for Computer Systems",
BookTitle= "Report on Defense Science Board Task Force on Computer Security",
Number = "R-609-1",
Year = "1970"}
554. @Technical Report {WQ??,
Author= " D. de Waleffe and J. J. Quisquater",
Title= "Better Login Protocols for Computer Networks",
Institution= "IBM",
Number = "LGE 08",
Pages = "163",
Year = "??"}
555. @unpublished{Ben92b,
Author= "Marc Benveniste",
Title= "Mod\`{e}le formel de s\'{e}curit\'{e}",
Note = "Document AQL",
Month = "novembre",
Year = "1993" }
556. @unpublished{HA93,
Author= "Stephen E. Hansen and E. Todd Atkins",
Title= "Centralized System Monitoring With Swatch",
Note = "Stanford University",
Year = "1993" }
557. @unpublished{Nee92,
Author= "R.M. Needham",
Title= "Reasoning about Cryptographic Protocols",
Note = "Document distribu\'{e} lors de ESORICS'92",
Year = "1992" }
|