Relevant Papers for the Course: Information and System Seucrity
SECURITY FUNDAMENTALS
Protection, B. Lampson, Proc. 5th Princeton Conf. on Information Sciences and Systems, Princeton, 1971
Third Generation Computer Systems, D. Denning, Computing Surveys, 1971
Access control by Boolean expression evaluation, Miller and Baldwin, Proc. 5th Annual Computer Security Applications Conference, 1990
Secure databases: Protecion Against User Influence, Dobkin, Jones, Lipton, ACM TODS, 1979
On Protection in Operating Systems, Harrison, Ruzzo, Ullman, CACM, 1976
Providing Fine Grained Access Control for Java Programs via Binary Editing, Pandey and Hashii, Concurrency: Practice and Experience, 2000
Enforcement of Security Policies for Computation, Jones, Lipton, 5th Symposium on OS Principles, 1975
SECURITY POLICIES
Secure Computer System: Unified Exposition and Multics Interpretation, Bell and La-Padula, 1976
Secure Computer Systems: Mathematical Foundation, Bell and La-Padula, 1973
A Comparison of Commercial and Military Security Policies, Clark and Wilson, 1987
The Chinese Wall Security Policy, Brewer and Nash, 1989
AUTHENTICATION
Improving System Security Through Proactive Password Checking, Bishop and Klein, Computers and Security, 1995
Pass-algorithms - A user validation Scheme based on Knowledge of Secret Algorithms, Haskett, 1984
The SKEY One-Time Password System, Haller, 1994
Password Authentication with Insecure Communication, Lamport, CACM, 1981
Using Encryption for Authentication in Large Networks of Computers, Needham and Schroeder, CACM, 1978
Kerberos: An Authentication Service for Open Network Systems, Steiner, Neuman, Schiller, 1988
Designing an Authentication System: a Dialogue in Four Scenes, Bill Bryant, 1988
CRYPTOGRAPHY
Sample Simplified DES Encryption and
Sample Simplified DES Decryption
New Directions in Cryptography, Diffie and Hellman, 1976
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Rivest, Shamir, Adleman
SECURE SYSTEMS DESIGN AND EVALUATION
The Protection of Information in Computer Systems, Proc. IEEE, 1975
TCSEC
ITSEC
Common Criteria Version 2.1 - Part1
Common Criteria Version 2.1 - Part2
Common Criteria Version 2.1 - Part3
A process standard for system security engineering development experiences and pilot results, R. Hefner, 1997
The SSE-CMM Appraisal Method (SSAM)
SYSTEM COMPROMISE
Computer Viruses Theory and Experiments, Cohen, 1984
A penetration analysis of a Burroughs Large System, Univ. of Caterbury
The non-technical threats to computing systems, Winkler
A taxonomy of computer program security flaws, Landwehr et al