|
|
Reading List -
CSCI 530, Spring 2004
|
|
(The paper list is subject to change! Please check regularly for
additions/deletions during the semester.)
|
|
Papers
|
- [Savage01a]
S. Savage, D. Wetherall, A. Karlin, and T. Anderson.
Network Support for IP Traceback.
ACM/IEEE Transactions on Networking, 9(3), June 2001.
- [Anderson95a]
D. Anderson, T. Frivold, and A. Valdes.
Next-generation Intrusion Detection Expert System (NIDES) --
A Summary.
SRI-CSL-95-07, SRI International, Menlo Park, CA, May 1995.
- [Barkley97a]
J. Barkley.
Comparing Simple Role Based Access Control Models and Access
Control Lists.
Proceedings of the 2nd ACM Workshop on Role-based Access Control,
pages 127-132, Fairfax, VA, August 1997.
- [Ko94a]
C. Ko, G. Fink, K. Levitt.
Automated Detection of Vulnerabilities in Privileged Programs
by Execution Monitoring.
Proceedings of the 10th Annual Computer Security Applications Conference,
pages 134-144, Orlando, FL, December 1994.
- [Aslam96a]
T. Aslam, I. Krsul, and E. Spafford.
Use of a Taxonomy of Security Faults.
Proceedings of the 19th NIST-NCSC National Information Systems Security
Conference, September 1996.
- [Xydis02a]
T. G. Xydis and S. Blake-Wilson.
Security Comparisons: Bluetooth Communications vs. 802.11.
White paper, November 2001, February 2002 (revised).
| |
|