💾 Archived View for spam.works › mirrors › textfiles › virus › virusbib.txt captured on 2023-06-16 at 21:05:55.

View Raw

More Information

-=-=-=-=-=-=-

                                                     Ted Landberg
                                                         02/24/88

                          Bibliography
                               for
                        Computer Viruses


Boebert, W. E., Kain, R.Y.; A Practical Alternative to
Hierarchical Integrity Policies; Proceeding of the 8th National
Computer Security Conference, Gaithersburg MD, Oct 1985

Boebert, W. E., Ferguson, C.T.; A Partial Solution to the
Discretionary Trojan Horse Problem; Proceeding of the 8th
National Computer Security Conference, Gaithersburg MD, Oct 1985

Cohen, Fred; Computer Viruses, Theory and Experiments; 7th
Security Conference, DOD/NBS Sept 1984.

Denning D. E.; Cyptography and Data Security; Addison Wesley,
1982

Denning, D. E.; An Intrusion-Detection Model; IEEE Symposium on
Security and Privacy, April 1986.

Dewdney, A. K.; Computer Recreations - In the game called Core
War hostile programs engage in a battle of bits; Scientific
American; Mar 1984.

Dewdney, A. K.; Computer Recreations - A Core War bestiary of
viruses, worms and other threats to computer memories; Scientific
American; Mar 1985.

Dvorak, John; Virus Wars: A Serious Warning; PC Magazine; Feb 29,
1988.

Gilgor, V.D.; On the Design and the Implementation of Secure
Xenix Workstation; IEEE Symposium on Security and Privacy, April
1987.

Grampp, F.T. and Morris, R. H.; UNIX Operating System Security;
AT&T Bell Laboroatories Technical Journal, Oct 1984.

Harrison, M.A. and Ruzzo, W.L.; Protection in Operating Systems;
Comm of the ACM, Aug 1976.

Highland, Harold J.; From the Editor -- Computer Viruses;
Computers & Security; Aug 1987.

Israel, Howard; Computer Viruses: Myth or Reality ?; Proceeding
of the 10th National Computer Security Conference, Gaithersburg
MD, Sept 1987.
                                                  Computer Virus
                                                     Bibliography

Joseph, Mark K.; Toward the Elimination of the Effects of
Malicious Logic: Fault Tolerance Approaches; Proceeding of the
10th National Computer Security Conference, Gaithersburg MD, Sept
1987

Karser, Paul A.; Limiting the Damage Potential of Discretionary
Trojan Horses; Proceedings of the Symposium on Security and
Privacy 1987; Oakland CA, Published by the IEEE. 

Lapid, Ahituv, and Newmann; Approaches to Handing 'Trojan Horse'
Threats; Computer & Security; Sept 1986.

McLellan, Vin; Computer Systems Under Siege; The New York Times,
January 31, 1988.

Novitski, P.;  Trojan horses (telecommunicating data files inside
documents); Access 86; Oct 86. [not available]

Parker, T.; Public domain software review: Trojans revisited,
CROBOTS, and ATC; Computer Language; April 1987.

Pozzo, M.M., Gray, T.E.; An approach to containing computer
viruses; Computer & Security, Aug 1987.

Pozza, M.M., Gray, T.E.; Managing Exposure to Potentially
Malicious Rograms; Proceeding of the 9th National Computer
Security Conference, Gaithersburg MD, Sept 1986.

Reeds, J. A. and Weinberger, P. J.; File Security and the UNIX
Systems Crypt Command; AT&T Bell Laboratories Journal, Oct 1984

Reid, T. R.; Fending Off a 'Computer Virus' Means Taking Only a
Few Precautions; Washington Post, Feb 15, 1988.

Rivers, Angel; Collection of published and unpublished newspaper
articles and reference materials about Computer Viruses; IRS,
1987.

Rutz, Frank; DOD Fights Off Computer Virus; Government Computer
News; Feb 5, 1988.

Shoch, J.F and Hupp, J.A.; The 'Worm' Programs: Early Experience
with a Distributed Computation. Comm of ACM, Mar 1982.

Stoll, Cliff; What do you Reed a Trojan Horse; Proceeding of the
10th National Computer Security Conference, Gaithersburg MD, Sept
1985
                                                  Computer Virus
                                                     Bibliography

Thompson, K.; Reflections on Trusting Trust (Deliberate Software
Bugs); Communications of the ACM, Aug 1984.

Witten, I. H.; Computer (In)security: infiltrating open systems;
Abacus (USA) Summer 1987.

Young, Catherine L.; Taxonomy of Computer Virus Defense
Mechanisms; Proceeding of the 10th National Computer Security
Conference, Gaithersburg MD, Sept 1987.

2600 Magazine; Series of Articles on Computer Penetration
techniques.

. ... ...-....1200 N81N         ......................... ... ...-....