13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAFÍA 333[Lam81]Leslie Lamport. Password authentication with insecure communication. Communicationsof the ACM, 24(11):770–772, Noviembre 1981.[Lap91] J.C. Laprie. Dependability: Basic concepts and terminology. Springer-Verlag, 1991.[LBMC94] Carl E. Landwher, Alan R. Bull, John P. McDermott, and William S. Choi. A taxonomyof computer program security flaws, with examples. ACM Computing Surveys, 3(26),Septiembre 1994.[Lip75]Steven B. Lipner. A note on the Confinement Problem. Operating Systems Review,9(5):192–196, Noviembre 1975.[MA94] Roger Merckling and Anne Anderson. RFC 57.0: Smart Card Introduction, Marzo1994.[Man91] Jason Manger. Unix: The complete book. Sigma Press, 1991.[Man96][Mar88a][Mar88b][McH95]U. Manber. A simple scheme to make passwords based on One-Way functions muchharder to crack. Computers & Security, 15(2):171–176, 1996.John Markhoff. Author of computer ‘virus’ is son of U.S. electronic security expert.The New York Times, 5 Noviembre 1988.John Markhoff. A family´s passion for computers, gone sour. The New York Times,11 Noviembre 1988.John McHugh. Covert channel analysis. In Handbook for the Computer Security Certificationof Trusted Systems. Naval Research Laboratory, Enero 1995.[McI89] M. Douglas McIlroy. Virology 101. In usenix Computing Systems, volume 2, 1989.[McM97]Dave McMordie. Texture analysis of the human iris for high security authentication.Technical Report Image Processing 304-529, Department of Electrical Engineering, Mc-Gill University, Diciembre 1997.[Mel97] Mark K. Mellis. Surprises in the DMZ. ;login:, 22(1), Febrero 1997.[Men98] Phunda Menta. Linux and random source bleaching. Phrack Magazine, 8(54), 1998.[Mey89][MF96][MFS90][MK94][MK99]Gordon R. Meyer. The Social Organization of the Computer Underground. PhD thesis,Northern Illinois University, 1989.Gary McGraw and Edward Felten. Java Security: Hostile Applets, Holes and Antidotes.John Wiley and Sons, 1996.Barton P. Miller, Lars Fredriksen, and Bryan So. An empirical study of the reliabilityof Unix utilities. Communications of the ACM, 33(12):32–44, Diciembre 1990.Ira S. Moskowitz and Myong H. Kang. Covert Channels – Here to Stay? In Proceedingsof COMPASS´94, pages 235–243. ieee Press, Junio 1994.Andrew D. McDonald and Markus G. Kuhn. StegFS: A Steganographic File Systemfor Linux. In Andreas Pfitzmann, editor, Information Hiding, pages 461–475. Springer-Verlag, 1999.[MKL + 95] Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi Murthy,Ajitkumar Natarajan, and Jeff Steidl. Fuzz revisited: A re-examination of the reliabilityof Unix utilities and services. ftp://grilled.cs.wisc.edu/technical papers/fuzzrevisited.ps,1995.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!