USC CSD Home
 

Reading List - CSCI 530, Spring 2004

 
(The paper list is subject to change! Please check regularly for additions/deletions during the semester.)
 
Papers
  • [Savage01a] S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network Support for IP Traceback. ACM/IEEE Transactions on Networking, 9(3), June 2001.

  • [Anderson95a] D. Anderson, T. Frivold, and A. Valdes. Next-generation Intrusion Detection Expert System (NIDES) -- A Summary. SRI-CSL-95-07, SRI International, Menlo Park, CA, May 1995.

  • [Barkley97a] J. Barkley. Comparing Simple Role Based Access Control Models and Access Control Lists. Proceedings of the 2nd ACM Workshop on Role-based Access Control, pages 127-132, Fairfax, VA, August 1997.

  • [Ko94a] C. Ko, G. Fink, K. Levitt. Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring. Proceedings of the 10th Annual Computer Security Applications Conference, pages 134-144, Orlando, FL, December 1994.

  • [Aslam96a] T. Aslam, I. Krsul, and E. Spafford. Use of a Taxonomy of Security Faults. Proceedings of the 19th NIST-NCSC National Information Systems Security Conference, September 1996.

  • [Xydis02a] T. G. Xydis and S. Blake-Wilson. Security Comparisons: Bluetooth Communications vs. 802.11. White paper, November 2001, February 2002 (revised).
 

[Last updated Mon Apr 12 2004]    [Please see copyright regarding copying.]