13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

328 BIBLIOGRAFÍA[BCOW94] John Barkley, Lisa Carnahan, Karen Olsen, and John Wack. Improving security in anetwork environment. In John Barkley, editor, Security in Open Systems, chapter 10.National Institute of Standards and Technology (nist), Julio 1994. Special Publication800-7.[BD96][Bel92]Matt Bishop and Michael Dilger. Checking for race conditions in file accesses. ComputingSystem, 9(2):131–152, Primavera 1996.Steven M. Bellovin. There be dragons. In Proceedings of the Third usenix SecuritySymposium, pages 1–16. The usenix Association, Septiembre 1992.[Bel93a] Walter Belgers. Unix password security, 1993.[Bel93b][BF99]Steven M. Bellovin. Packets found on an internet. Computer Communications Review,23(3):26–31, Julio 1993.Dirk Balfanz and Edward W. Felten. Hand-held computers can be better smart cards.In Proceedings of the 8th usenix Security Symposium. The usenix Association, Agosto1999.[BGML96] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBMSystems Journal, 35(3,4), 1996.[Bis86] Matt Bishop. How to write a setuid program. ;login:, 12(1), Enero 1986.[Bis90] Matt Bishop. A Security Analysis of the NTP Protocol, 1990.[Bis91][Bis92][Bis95][BK95][Bla93][BM91]Matt Bishop. A proactive password checker. In D.T. Lindsay and W.L. Price, editors,Proceedings of the 7th International Conference on Information Security, pages 150–158, Mayo 1991.Matt Bishop. Anatomy of a proactive password changer. In Proceedings of usenixUnix Security III. The usenix Association, 1992.Matt Bishop. Race conditions, files and security flaws; or the tortoise and the hareredux. Technical Report CSE-95-8, University of California at Davis, 1995.Matt Bishop and Daniel V. Klein. Improving system security via proactive passwordchecking. Computers & Security, 14(3):233–249, 1995.Matt Blaze. A Cryptographic File System for Unix. In Proceedings of the 1st ACMConference on Computer and Communications Security, pages 9–16. ACM, Noviembre1993.Steven M. Bellovin and Michael Merritt. Limitations of the Kerberos AuthenticationSystem. In Proceedings of the Winter 1991 usenix Conference, pages 253–267. Theusenix Association, Enero 1991.[C + 91] Dave Curry et al. RFC1244: Site Security Handbook. Internet Activities Board, Julio1991.[C + 98] Crispin Cowan et al. StackGuard: automatic adaptative detection and prevention ofbuffer–overflow attacks. In Proceedings of the 7th usenix Security Symposium. Theusenix Association, Enero 1998.[CA97a][CA97b]Bryan Costales and Eric Allman. Sendmail. O´Reilly & Associates, 2nd edition, Enero1997.Bryan Costales and Eric Allman. Sendmail Desktop Reference. O´Reilly & Associates,Marzo 1997.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!