Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Piranha Audit: A Kernel Previous: 7 Acknowledgements

Bibliography

1
Department of Defense Trusted Computer Systems Evalutation Criteria. DoD 5200.28-STD, December 1985.

2
D. Farmer and W. Venema, Improving the Security of Your Site by Breaking Into It, USENET posting, December 1993.

3
James P. Anderson, Computer Security Threat Monitoring and Surveillance, James P. Anderson Co. , Fort Washington, PA (1980).

4
David Bonyun, The Role of a Well-Defined Auditing Process in the Enforcement of Privacy and Data Security, Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206-214 (1989).

5
J. Picciotto, The design of an Effective Auditing Subsystem, Proceedigns of 1987 IEEE Symposium on Security and Privacy, pp. 2-10 (1982.

6
R. L. Rivest, The MD5 Message Digest Algorithm, MIT Laboratory for Computer Science and RSA Data Security, Inc., Request for Comments nr. 1321, April 1992.

7
Axent Technologies, Guide to Intrusion Detection, 1995.

8
COAST, Computer Operations, Audit and Security Technology, www.cs.purdue.edu/ar97/research/coast.html.

9
Todd Atkins, Simple Watcher, Todd.Atkins@CAST.Stanford.edu, Stanford University.


2000-08-07