Information Technology Reference
In-Depth Information
M S D N Te c h n i c a l L i b r a r y, I n t e r a c t i v e A u t h e n t i c a -
tion (GINA). Retrieved on December 21, 2004
from http://msdn.microsoft.com/library/default.
asp?url=/library/en-us/secauthn/security/interac-
tive_authentication.asp
Saltzer, J. H., & Schroeder, M. D. (1975). The
protection of information in computer systems.
Proceedings of the IEEE, 63 , 1278-1308.
Samar, V. & Schemers, R. (1995). Unified Login
with Pluggable Authentication Modules (PAM ).
Request For Comments: 86.0, Open Software
Foundation (October 1995).
NT Security (2005). Network strategy report: Win-
dows NT security. Retrieved on January 5, 2005
from http://www.secinf.net/windows_security/
Network_Strategy_Report_Windows_NT_Se-
cu r it y.ht m l
Staniford, S., Paxson, V., & Weaver, N. (2002).
How to own the Internet in your spare time. Pro-
ceedings of the 11 th Usenix Security Symposium ,
149-167.
Red Hat-1, Red Hat Linux Reference Guide,
Shadow Passwords. Retrieved January 6, 2005
from http://www.redhat.com/docs/manuals/
linux/RHL-9-Manual/ref-guide/s1-users-groups-
shadow-utilities.html
Thompson, K. (1984). Reflections on trusting trust.
Communication of the ACM, 27 , 761-763.
Wright C., Cowan C., Morris J., Smalley S. &
Kroah-Hartman G. (2002). Linux security mod-
ules: General security support for the Linux kernel.
Proceedings of Usenix 2002.
Ritchie, D. M. & Thompson, K. (1978). The UNIX
time-sharing system. The Bell System Technical
Journal, 57 , 1905-1920.
Yee, K. User Interaction Design for Secure Sys-
tems 2002
Ritchie, D. M. (1979). On the Security of UNIX ,
in UNIX SUPPLEMENTARY DOCUMENTS,
AT & T.
Yegneswaran, V., Barford, P. & Ullrich, J. (2003).
Internet intrusions: Global characteristics and
prevalence, 138-147. New York: ACM Press.
Saltzer, J. H., Reed, D. P., & Clark, D. D. (1984).
End-to-end arguments in system design. ACM
Transactions on Computer Systems, 2 , 277-
288.
This work was previously published in the Handbook of Research on Information Security and Assurance, edited by J. Gupta
and S. Sharma, pp. 518-528, copyright 2009 by Information Science Reference (an imprint of IGI Global).
Search WWH ::




Custom Search