apa.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 1,435 行 · 第 1/5 页

HTM
1,435
字号
Dr. Dobb's Journal</I>. Volume 16, p. 49. January 1, 1991.</P><P><B>&quot;Dyad: A System for Using Physically Secure Coprocessors.&quot;</B> Dr.(Professor) J. Douglas Tygar and Bennet Yee, School of Computer Science at CarnegieMellon University.<UL>	<LI><A HREF="http://www.cni.org/docs/ima.ip-workshop/www/Tygar.Yee.html"><TT>http://www.cni.org/docs/ima.ip-workshop/www/Tygar.Yee.html</TT></A></UL><P><B>&quot;Evolution of a Trusted B3 Window System Prototype.&quot;</B> J. Epstein,J. McHugh, R. Psacle, C. Martin, D. Rothnie, H. Orman, A. Marmor-Squires, M. Branstad,and B. Danner. In proceedings of the 1992 IEEE Symposium on Security and Privacy,1992.</P><P><B>&quot;Features of the Centri Firewall.&quot;</B> Centri firewall information.<UL>	<LI><A HREF="http://www.gi.net/security/centrifirewall/features.html"><TT>http://www.gi.net/security/centrifirewall/features.html</TT></A></UL><P><B>&quot;Firewall Application Notes.&quot;</B> Good document that starts by describinghow to build a firewall. Also addresses application proxies, sendmail in relationto firewalls, and the characteristics of a bastion host. Livingston Enterprises,Inc.<UL>	<LI><A HREF="http://www.telstra.com.au/pub/docs/security/firewall-1.1.ps.Z"><TT>http://www.telstra.com.au/pub/docs/security/firewall-1.1.ps.Z</TT></A></UL><P><B>&quot;Firewall Performance Measurement Techniques: A Scientific Approach.&quot;</B>Marcus Ranum. February 4, 1996 (last known date of modification).<UL>	<LI><A HREF="http://www.v-one.com/pubs/perf/approaches.htm"><TT>http://www.v-one.com/pubs/perf/approaches.htm</TT></A></UL><P><B>Firewalls and Internet Security : Repelling the Wily Hacker.</B> William R.Cheswick and Steven M. Bellovin. Addison-Wesley Professional Computing. ISBN: 0-201-63357-4.1994.</P><P><B>Firewalls FAQ.</B> Marcus J. Ranum.<UL>	<LI><A HREF="http://www.cis.ohio-state.edu/hypertext/faq/usenet/firewalls-faq/faq.html"><TT>http://www.cis.ohio-state.edu/hypertext/faq/usenet/firewalls-faq/faq.html</TT></A></UL><P><B>&quot;Five Reasons Why an Application Gateway is the Most Secure Firewall.&quot;</B>Global Internet.<UL>	<LI><A HREF="http://www.gi.net/security/centrifirewall/fivereasons.html"><TT>http://www.gi.net/security/centrifirewall/fivereasons.html</TT></A></UL><P><B>&quot;Group of 15 Firewalls Hold Up Under Security Scrutiny.&quot;</B> StephenLawson. <I>InfoWorld</I>. June 1996.<UL>	<LI><A HREF="http://www.infoworld.com/cgi-bin/displayStory.pl?96067.firewall.htm"><TT>http://www.infoworld.com/cgi-bin/displayStory.pl?96067.firewall.htm</TT></A></UL><P><B>&quot;If You Can Reach Them, They Can Reach You.&quot;</B> William Dutcher.A PC Week Online Special Report. June 19, 1995.<UL>	<LI><A HREF="http://www.pcweek.com/sr/0619/tfire.html"><TT>http://www.pcweek.com/sr/0619/tfire.html</TT></A></UL><P><B>&quot;Improving the Security of Your Site by Breaking Into It.&quot;</B> DanFarmer and Wietse Venema. 1995.<UL>	<LI><A HREF="http://www.craftwork.com/papers/security.html"><TT>http://www.craftwork.com/papers/security.html</TT></A></UL><P><B>&quot;Improving X Windows Security.&quot; </B>Linda Mui. <I>UNIX World</I>.Volume IX, Number 12. December 1992.</P><P><B>&quot;Integrating Security in a Group Oriented Distributed System.&quot;</B>Michael K. Reiter, Kenneth P. Birman, and Li Gong. TR92-1269. February 1992.<UL>	<LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/Repository/2.0/Body/ncstrl.cornell%2fTR92-1269/postscript"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/Repository/2.0/Body/ncstrl.cornell%2fTR92-1269/postscript</TT></A></UL><P><B>&quot;Internet Firewalls: An Introduction.&quot;</B> Firewall white paper.NMI Internet Expert Services.<UL>	<LI><A HREF="http://www.netmaine.com/netmaine/whitepaper.html"><TT>http://www.netmaine.com/netmaine/whitepaper.html</TT></A></UL><P><B>Internet Firewalls and Network Security (Second Edition).</B> New Riders. ChrisHare and Karanjit Siyan. ISBN: 1-56205-632-8. 1996.</P><P><B>Internet Security Resource Library: Internet Firewalls and Network Security,Internet Security Techniques, Implementing Internet Security.</B> New Riders. ISBN:1-56205-506-2. 1995.</P><P><B>&quot;Intrusion Protection for Networks 171.&quot;</B> <I>Byte</I> <I>Magazine</I>.April, 1995.</P><P><B>&quot;IP v6 Release and Firewalls.&quot;</B> Uwe Ellermann. 14th WorldwideCongress on Computer and Communications Security Protection. pp. 341-354. June 1996.</P><P><B>&quot;Is Plan 9 Sci-Fi or UNIX for the Future?&quot;</B> Anke Goos. <I>UNIXWorld</I>. Volume 7, p. 61. October 1, 1990.</P><P><B>&quot;Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls.&quot;</B>John P. Wack and Lisa J. Carnahan. National Institute of Standards and Technology.February 9, 1995.<UL>	<LI><A HREF="http://csrc.ncsl.nist.gov/nistpubs/800-10/"><TT>http://csrc.ncsl.nist.gov/nistpubs/800-10/</TT></A></UL><P><B>&quot;Making Your Setup More Secure.&quot;</B> NCSA tutorial pages.<UL>	<LI><A HREF="http://hoohoo.ncsa.uiuc.edu/docs/tutorials/security.html"><TT>http://hoohoo.ncsa.uiuc.edu/docs/tutorials/security.html</TT></A></UL><P><B>&quot;Multilevel Security in the UNIX Tradition.&quot;</B> M. D. McIlroy andJ. A. Reeds. <I>SWPE</I>. 22(8), pp. 673-694. 1992.</P><P><B>&quot;NCSA Firewall Policy Guide.&quot;</B> Compiled by Stephen Cobb, Directorof Special Projects. National Computer Security Association.<UL>	<LI><A HREF="http://www.ncsa.com/fwpg_p1.html"><TT>http://www.ncsa.com/fwpg_p1.html</TT></A></UL><P><B>&quot;Network Firewalls.&quot;</B> Steven M. Bellovin and William R. Cheswick.IEEECM, 32(9), pp. 50-57. September 1994.</P><P><B>&quot;Networks Without User Observability: Design Options.&quot;</B> AndreasPfitzmann and Michael Waidner. Eurocrypt '85, LNCS 219, Springer-Verlag, Berlin 1986,245-253.<UL>	<LI><A HREF="http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/PfWa_86anonyNetze.html"><TT>http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/PfWa_86anonyNetze.html</TT></A></UL><P><B>&quot;On Access Checking in Capability-Based Systems.&quot;</B> Richard Y.Kain and C. E. Landwehr. IEEE Trans. on Software Engineering Volume SE-13, Number2 (Feb. 1987) pp. 202-207; reprinted from Proc. 1986 IEEE Symposium on Security andPrivacy, April, 1986, Oakland, CA.<UL>	<LI><A HREF="http://www.itd.nrl.navy.mil/ITD/5540/publications/CHACS/Before1990/1987landwehr-tse.ps"><TT>http://www.itd.nrl.navy.mil/ITD/5540/publications/CHACS/Before1990/1987landwehr-tse.ps</TT></A></UL><P><B>&quot;On the (In)Security of the Windowing System X.&quot;</B> Marc VanHeyningen.Indiana University. September 14, 1994.<UL>	<LI><A HREF="http://www.cs.indiana.edu/X/security/intro.html"><TT>http://www.cs.indiana.edu/X/security/intro.html</TT></A></UL><P><B>&quot;Packet Filtering for Firewall Systems.&quot;</B> February 1995. CERT(and Carnegie Mellon University).<UL>	<LI><A HREF="ftp://info.cert.org/pub/tech_tips/packet_filtering"><TT>ftp://info.cert.org/pub/tech_tips/packet_filtering</TT></A></UL><P><B>&quot;Packets Found on an Internet.&quot;</B> Steven M. Bellovin. Interestinganalysis of packets appearing at the application gateway of AT&amp;T. Lambda. August23, 1993.<UL>	<LI><A HREF="ftp://ftp.research.att.com/dist/smb/packets.ps"><TT>ftp://ftp.research.att.com/dist/smb/packets.ps</TT></A></UL><P><B>&quot;Password Security: A Case History.&quot;</B> Robert Morris and Ken Thompson.<UL>	<LI><A HREF="http://www.sevenlocks.com/papers/password/pwstudy.ps"><TT>http://www.sevenlocks.com/papers/password/pwstudy.ps</TT></A></UL><P><B>PCWEEK Intranet and Internet Firewall Strategies.</B> Ed Amoroso and Ron Sharp.Ziff-Davis Press. ISBN: 1562764225. 1996.</P><P><B>&quot;Plan 9.&quot;</B> Sean Dorward, Rob Pike, and Dave Presotto. <I>UNIXReview</I>. Volume 10, p. 28. April 1, 1992.</P><P><B>&quot;Plan 9: Feature Film to Feature-Rich OS.&quot;</B> Paul Fillinich. <I>Byte</I><I>Magazine</I>. Volume 21, p. 143. March 1, 1996.</P><P><B>&quot;Plan 9 from AT&amp;T.&quot;</B> David Bailey. <I>UNIX Review</I>. Volume1, p. 27. January 1, 1996.</P><P><B>&quot;Plan 9 from Bell Labs.&quot;</B> Rob Pike, Dave Presotto, and Phil Winterbottom.<I>Computing Systems Journal</I>. Volume 8, p. 221. Summer, 1995.</P><P><B>&quot;Plan 9: Son of UNIX.&quot;</B> Robert Richardson. <I>LAN Magazine</I>.Volume 11, p. 41. August 1, 1996.</P><P><B>&quot;Private Communication Technology Protocol.&quot;</B> Daniel Simon. April1996.</P><P><B>&quot;Product Overview for IBM Internet Connection Secured Network Gatewayfor AIX, Version 2.2.&quot;</B> IBM firewall information.<UL>	<LI><A HREF="http://www.ics.raleigh.ibm.com/firewall/overview.htm"><TT>http://www.ics.raleigh.ibm.com/firewall/overview.htm</TT></A></UL><P><B>&quot;Program Predictability and Data Security.&quot;</B> Charles G. MooreIII and Richard W. Conway. TR74-212.<UL>	<LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Describe/ncstrl.cornell%2fTR74-212?abstract=Security"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Describe/ncstrl.cornell%2fTR74-212?abstract=Security</TT></A></UL><P><B>&quot;Protecting the Fortress From Within and Without.&quot;</B> R. Scott Raynovich.<I>LAN Times</I>. April 1996.<UL>	<LI><A HREF="http://www.wcmh.com/lantimes/96apr/604c051a.html"><TT>http://www.wcmh.com/lantimes/96apr/604c051a.html</TT></A></UL><P><B>&quot;Rating of Application Layer Proxies.&quot;</B> Michael Richardson. November13, 1996.<UL>	<LI><A HREF="http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyrating.html"><TT>http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyrating.html</TT></A></UL><P><B>&quot;Reducing the Proliferation of Passwords in Distributed Systems InformationProcessing.&quot;</B> <I>Education and Society</I>. Volume II, pp. 525-531. ElsevierScience Publishers B.V. (North Holland). 1992.</P><P><B>&quot;Robust and Secure Password/Key Change Method Proceedings of the ThirdEuropean Symposium on Research in Computer Security (ESORICS).&quot;</B> Ralf Hauser,Phil Janson, Refik Molva, Gene Tsudik, and Els Van Herreweghen. LNCS, pp. 107-122,SV, November 1994.</P><P><B>&quot;Secure Computing Firewall for NT.&quot;</B> Overview. Secure Computing.<UL>	<LI><A HREF="http://www.sctc.com/NT/HTML/overview.html"><TT>http://www.sctc.com/NT/HTML/overview.html</TT></A></UL><P><B>&quot;Security and the X Window System.&quot;</B> Dennis Sheldrick. <I>UNIXWorld</I>. 9(1), p. 103. January 1992.<UL>	<LI><A HREF="http://ftp.digital.com/pub/Digital/info/SPD/46-21-XX.txt"><TT>http://ftp.digital.com/pub/Digital/info/SPD/46-21-XX.txt</TT></A></UL><P><B>&quot;Security in Public Mobile Communication Networks.&quot;</B> Hannes Federrath,Anja Jerichow, Dogan Kesdogan, and Andreas Pfitzmann. Proceedings of the IFIP TC6 International Workshop on Personal Wireless Communications, Prague 1995, pp. 105-116.<UL>	<LI><A HREF="http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/FJKP_95FunkEngl.ps.gz"><TT>http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/FJKP_95FunkEngl.ps.gz</TT></A></UL><P><B>&quot;Security in Open Systems.&quot;</B> (NIST) John Barkley, editor (withLisa Carnahan, Richard Kuhn, Robert Bagwill, Anastase Nakassis, Michael Ransom, JohnWack, Karen Olsen, Paul Markovitz, and Shu-Jen Chang). U.S. Department of Commerce.Section: The X Window System: Bagwill, Robert.<UL>	<LI><A HREF="http://csrc.ncsl.nist.gov/nistpubs/800-7/node62.html#SECTION06200000000000000000"><TT>http://csrc.ncsl.nist.gov/nistpubs/800-7/node62.html#SECTION06200000000000000000</TT></A></UL><P><B>&quot;Security in the X11 Environment.&quot;</B> Pangolin. University of Bristol,UK. January, 1995.<UL>	<LI><A HREF="http://sw.cse.bris.ac.uk/public/Xsecurity.html"><TT>http://sw.cse.bris.ac.uk/public/Xsecurity.html</TT></A></UL><P><B>&quot;Selective Security Capabilities in ASAP--A File Management System.&quot;</B>Richard W. Conway, W. L. Maxwell, and Howard L. Morgan. TR70-62. June 1970.<UL>	<LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Print/ncstrl.cornell%2fTR70-62"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Print/ncstrl.cornell%2fTR70-62</TT></A></UL><P><B>&quot;Session-Layer Encryption.&quot;</B> Matt Blaze and Steve Bellovin. Proceedingsof the Usenix Security Workshop, June 1995.</P><P><B>&quot;Site Security Handbook.&quot;</B> Update and Idraft version; June 1996,CMU. Draft-ietf-ssh-handbook-03.txt. Barbara Fraser.<UL>	<LI><A HREF="http://www.internic.net/internet-drafts/draft-ietf-ssh-handbook-03.txt"><TT>http://www.internic.net/internet-drafts/draft-ietf-ssh-handbook-03.txt</TT></A></UL><P><B>&quot;SQL*Net and Firewalls.&quot;</B> David Sidwell and Oracle Corporation.<UL>	<LI><A HREF="http://www.zeuros.co.uk/firewall/library/oracle-and-fw.pdf"><TT>http://www.zeuros.co.uk/firewall/library/oracle-and-fw.pdf</TT></A></UL><P><B>&quot;Talking Securely.&quot;</B> Mark Arnold, Anthony Boyd, Susan Dalton,Flora Lo, Adam Millard, and Shalini Shah.1994.<UL>	<LI><A HREF="http://julmara.ce.chalmers.se/Security/sectalk.ps.Z"><TT>http://julmara.ce.chalmers.se/Security/sectalk.ps.Z</TT></A></UL><P><B>&quot;TCP WRAPPER: Network Monitoring, Access Control, and Booby Traps.&quot;</B>Wietse Venema. Proceedings of the Third Usenix UNIX Security Symposium, p. 85-92,Baltimore, MD. September 1

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?