Next: About this document ...
Up: Piranha Audit: A Kernel
Previous: 7 Acknowledgements
- 1
- Department of Defense Trusted Computer Systems Evalutation Criteria.
DoD 5200.28-STD, December 1985.
- 2
- D. Farmer and W. Venema, Improving the Security of Your Site by Breaking
Into It, USENET posting, December 1993.
- 3
- James P. Anderson, Computer Security Threat Monitoring and Surveillance,
James P. Anderson Co. , Fort Washington, PA (1980).
- 4
- David Bonyun, The Role of a Well-Defined Auditing Process in the Enforcement
of Privacy and Data Security, Proceedings of the 1989 IEEE Symposium on Security
and Privacy, pp. 206-214 (1989).
- 5
- J. Picciotto, The design of an Effective Auditing Subsystem, Proceedigns
of 1987 IEEE Symposium on Security and Privacy, pp. 2-10 (1982.
- 6
- R. L. Rivest, The MD5 Message Digest Algorithm, MIT Laboratory for Computer
Science and RSA Data Security, Inc., Request for Comments nr. 1321, April 1992.
- 7
- Axent Technologies, Guide to Intrusion Detection, 1995.
- 8
- COAST, Computer Operations, Audit and Security Technology, www.cs.purdue.edu/ar97/research/coast.html.
- 9
- Todd Atkins, Simple Watcher, Todd.Atkins@CAST.Stanford.edu, Stanford
University.
2000-08-07