Internet Security Dictionary

Preface.- Using the Dictionary.- Acknowledgments.- Part I: Structure and Vulnerability of the Internet.- Part II: Taxonomies of Internet Security. Dictionary.- Part III: Abbreviations and Organizations.- Appendices.

[1]  Jennifer Seberry,et al.  Cryptography - an introduction to computer security , 1991, Advances in computer science series.

[2]  Roger M. Needham,et al.  Experience with Grapevine: the growth of a distributed system , 1984, TOCS.

[3]  " Cryptography : A New Dimension in Computer Data , 2022 .

[4]  Peter J. Denning,et al.  Computers under attack: intruders, worms, and viruses , 1991 .

[5]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[6]  Chris Mitchell,et al.  Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.

[7]  Hemma Prafullchandra,et al.  Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.

[8]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[9]  Stephen M. Matyas,et al.  Message Authentication with Manipulation Detection Code , 1983, 1983 IEEE Symposium on Security and Privacy.

[10]  G. T. Gangemi,et al.  Computer Security Basics , 2006 .

[11]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[12]  Ralph C. Merkle,et al.  A fast software one-way hash function , 1990, Journal of Cryptology.

[13]  Peter Williams,et al.  Digital Certificates: Applied Internet Security , 1998 .

[14]  Koral Ilgun,et al.  USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[17]  Morrie Gasser,et al.  The Digital Distributed System Security Architecture , 1989 .

[18]  Martin E. Hellman I. `DES will be totally insecure within ten years¿ , 1979, IEEE Spectrum.

[19]  Jerome H. Saltzer,et al.  Kerberos authentication and authorization system , 1987 .

[20]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[21]  Thomas Beth,et al.  Public-Key Cryptography: State of the Art and Future Directions , 1992, Lecture Notes in Computer Science.

[22]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[23]  Gunar E. Liepins,et al.  Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[24]  Harold S. Javitz,et al.  The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[25]  M. Rabin Probabilistic algorithm for testing primality , 1980 .

[26]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[27]  Carey Nachenberg,et al.  Computer virus-antivirus coevolution , 1997, Commun. ACM.

[28]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[29]  Uyless D. Black Internet Security Protocols: Protecting IP Traffic , 2000 .

[30]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[31]  Warwick Ford Advances in public-key certificate standards , 1995, SGSC.

[32]  W. Ford,et al.  Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2000 .

[33]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[34]  Yvo Desmedt,et al.  A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes , 1986, CRYPTO.

[35]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[36]  J. Linn Practical authentication for distributed computing , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[37]  Rolf Oppliger,et al.  Internet security: firewalls and beyond , 1997, CACM.

[38]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[39]  Bernhard Plattner,et al.  X400 message handling - standards, interworking, applications , 1992, Data communications and networks series.

[40]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[41]  Len LaPadula,et al.  Secure Computer Systems: A Mathematical Model , 1996 .

[42]  Burton S. Kaliski A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .

[43]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[44]  W. V. Eck Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .

[45]  S. Jajodia,et al.  Information Security: An Integrated Collection of Essays , 1994 .

[46]  Eli Biham,et al.  Differential Cryptanalysis of the Full 16-Round DES , 1992, Annual International Cryptology Conference.

[47]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[48]  Andrew M. Odlyzko,et al.  Computation of discrete logarithms in prime fields , 1991, Des. Codes Cryptogr..

[49]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[50]  Andrew Birrell Secure communication using remote procedure calls , 1985, TOCS.

[51]  Elizabeth D. Zwicky,et al.  Building internet firewalls , 1995 .

[52]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[53]  Shoji Miyaguchi,et al.  Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.

[54]  Hans Eberle,et al.  A High-Speed DES Implementation for Network Applications , 1992, CRYPTO.

[55]  Vincent Rijmen,et al.  The Block Cipher Rijndael , 1998, CARDIS.

[56]  Rita C. Summers Secure Computing: Threats and Safeguards , 1996 .

[57]  Ross Ihaka,et al.  Cryptographic Randomness from Air Turbulence in Disk Drives , 1994, CRYPTO.

[58]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[59]  Aviel D. Rubin An Experience Teaching a Graduate Course in Cryptography , 1997, Cryptologia.

[60]  Jean-Jacques Quisquater,et al.  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.

[61]  Vaughan Black,et al.  The Hacker Crackdown: Law and Disorder on the Electronic Frontier , 1994 .

[62]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.

[63]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[64]  Warwick Ford,et al.  Computer communication security - principles, standard protocols and techniques , 2008 .

[65]  Sallie M. Henry,et al.  Software Structure Metrics Based on Information Flow , 1981, IEEE Transactions on Software Engineering.

[66]  Gerald J. Popek,et al.  Encryption and Secure Computer Networks , 1979, CSUR.

[67]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[68]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[69]  Eugene H. Spafford,et al.  The COPS Security Checker System , 1990, USENIX Summer.

[70]  Dorothy E. Denning,et al.  The SeaView Security Model , 1990, IEEE Trans. Software Eng..

[71]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[72]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[73]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[74]  Gene Tsudik,et al.  KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.

[75]  Ravi S. Sandhu,et al.  A Kernelized Architecture for Multilevel Secure Object-Oriented Databases Supporting Write-Up , 1993, J. Comput. Secur..

[76]  Carl E. Landwehr,et al.  A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .

[77]  J.J. Tardo,et al.  SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[78]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[79]  Derrick Grover,et al.  Cryptography: A Primer , 1982 .

[80]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[81]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[82]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[83]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[84]  M Gasser,et al.  A Random Word Generator for Pronounceable Passwords , 1975 .

[85]  James Arlin Cooper Computer and communications security: strategies for the 1990s , 1989 .

[86]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[87]  Anas N. Al-Rabadi,et al.  A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .

[88]  John McLean,et al.  Reasoning About Security Models , 1987, 1987 IEEE Symposium on Security and Privacy.

[89]  Martin E. Hellman,et al.  On the security of multiple encryption , 1981, CACM.

[90]  Roger M. Needham,et al.  Grapevine: an exercise in distributed computing , 1982, CACM.

[91]  Antoon Bosselaers,et al.  An Attack on the Last Two Rounds of MD4 , 1991, CRYPTO.

[92]  Steve R. White,et al.  Fighting Computer Viruses , 1997 .

[93]  Baoqing Ye,et al.  Defeating Denial-of-Service Attacks on the Internet , 2001, ICICS.

[94]  W. Richard Stevens,et al.  TCP/IP Illustrated, Volume 1: The Protocols , 1994 .

[95]  S. Bradner,et al.  IPng: Internet protocol next generation , 1996 .

[96]  Moti Yung,et al.  Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..

[97]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[98]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[99]  Gene Tsudik,et al.  Robust and Secure Password and Key Change Method , 1994, ESORICS.

[100]  Rik Farrow Unix System Security: How to Protect Your Data and Prevent Intruders , 1991 .

[101]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[102]  Eli Biham,et al.  Differential Cryptanalysis of Lucifer , 1993, CRYPTO.

[103]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[104]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[105]  Adi Shamir,et al.  On the Generation of Cryptographically Strong Pseudo-Random Sequences , 1981, ICALP.

[106]  D. Elliott Bell Secure Computer Systems: A Refinement of the Mathematical Model , 1974 .

[107]  Selim G. Aki Digital signatures: A tutorial survey , 1983, Computer.

[108]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[109]  Radia Perlman Interconnections: Bridges and Routers , 1992 .

[110]  Butler W. Lampson,et al.  A Global Authentication Service without Global Trust , 1986, 1986 IEEE Symposium on Security and Privacy.

[111]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[112]  Morrie Gasser,et al.  An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[113]  Gilles Brassard,et al.  Sorting out Zero-Knowledge , 1990, EUROCRYPT.

[114]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[115]  Walter Fumy,et al.  Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..

[116]  D. Balenson Automated distribution of cryptographic keys using the financial institution key management standard , 1985, IEEE Communications Magazine.

[117]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[118]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[119]  Matt Blaze,et al.  Protocol failure in the escrowed encryption standard , 1994, CCS '94.

[120]  Virgil D. Gligor,et al.  On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[121]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[122]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[123]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[124]  Ronald L. Rivest,et al.  Is the Data Encryption Standard a group? (Results of cycling experiments on DES) , 1988, Journal of Cryptology.

[125]  Volker Strassen,et al.  A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..

[126]  A. Lyman Chapin,et al.  Open Systems Networking: Tcp/Ip and Osi , 1993 .

[127]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[128]  M.E. Hellman,et al.  An overview of public key cryptography , 1978, IEEE Communications Magazine.

[129]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[130]  Warren A. Harrison,et al.  A complexity measure based on nesting level , 1981, SIGP.

[131]  David Ferbrache,et al.  A pathology of computer viruses , 1991 .

[132]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[133]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[134]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[135]  David A. Bell,et al.  Secure computer systems: mathematical foundations and model , 1973 .