Relevant Papers for the Course: Information and System Seucrity
For Ashwani
SECURITY FUNDAMENTALS 
Protection, B. Lampson, Proc. 5th Princeton Conf. on Information Sciences and Systems, Princeton, 1971
Third Generation Computer Systems, D. Denning, Computing Surveys, 1971
Access control by Boolean expression evaluation, Miller and Baldwin, Proc. 5th Annual Computer Security Applications Conference, 1990
On Protection in Operating Systems, Harrison, Ruzzo, Ullman, CACM, 1976
A Linear Time Algorithm for Deciding Subject Security, Lipton and Snyder, JACM, 1977
SECURITY POLICIES 
Secure Computer System: Unified Exposition and Multics Interpretation, Bell and La-Padula, 1976
A Comparison of Commercial and Military Security Policies, Clark and Wilson, 1987
The Chinese Wall Security Policy, Brewer and Nash, 1989
Non-Discretionary Controls for Commercial Applications, Lipner, 1982
AUTHENTICATION 
Improving System Security Through Proactive Password Checking, Bishop and Klein, Computers and Security, 1995
Pass-algorithms - A user validation Scheme based on Knowledge of Secret Algorithms, Haskett, 1984
The SKEY One-Time Password System, Haller, 1994
Password Authentication with Insecure Communication, Lamport, CACM, 1981
Using Encryption for Authentication in Large Networks of Computers, Needham and Schroeder, CACM, 1978
Kerberos: An Authentication Service for Open Network Systems, Steiner, Neuman, Schiller, 1988
Designing an Authentication System: a Dialogue in Four Scenes, Bill Bryant, 1988
CRYPTOGRAPHY 
Sample Simplified DES Encryption  and 
Sample Simplified DES Decryption 
New Directions in Cryptography, Diffie and Hellman, 1976
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Rivest, Shamir, Adleman
SECURE SYSTEMS DESIGN AND EVALUATION 
 The Protection of Information in Computer Systems, Proc. IEEE, 1975  
 
TCSEC 
ITSEC
Common  Criteria  Version  2.1 - Part1
Common  Criteria  Version  2.1 - Part2
Common  Criteria  Version  2.1 - Part3
A process standard for system security engineering development experiences and pilot results, R. Hefner, 1997
The SSE-CMM Appraisal Method (SSAM)
SYSTEM COMPROMISE 
 Computer Viruses Theory and Experiments, Cohen, 1984  
 
A penetration analysis of a Burroughs Large System, Univ. of Caterbury 
The non-technical threats to computing systems, Winkler
A taxonomy of computer program security flaws, Landwehr et al