|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T b
Length: 4004 (0xfa4)
Types: TextFile
Names: »bib.latex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦f36518b41⟧ »./worm/mit.tex.tar.z«
└─⟦87f8973c9⟧
└─⟦this⟧ »bib.latex«
%%%%
%%%% The Internet Virus of November 3, 1988
%%%% Mark W. Eichin, MIT Project Athena
%%%%
%%%% $Header: bib.latex,v 1.8 88/11/28 22:15:20 jon Locked $
%%%% $Log: bib.latex,v $
%%%% Revision 1.8 88/11/28 22:15:20 jon
%%%% *** empty log message ***
%%%%
%%%% Revision 1.7 88/11/22 11:05:20 eichin
%%%% added spaf2
%%%%
%%%% Revision 1.6 88/11/22 04:20:56 jon
%%%% add telnet ref
%%%%
%%%% Revision 1.5 88/11/22 03:25:03 jon
%%%% add quarterman ref and fake internet ref
%%%%
%%%% Revision 1.4 88/11/22 01:17:03 eichin
%%%% added spaf1 (pleasequit) and rfc950
%%%%
%%%%
\begin{thebibliography}{99}
\bibitem{saltzer}
Saltzer, J. and Schroeder, M. The protection of information in
computer systems. Proc. IEEE 63, 9 (Sep. 1975), 1278-1308
\bibitem{kerberos}
Jennifer Steiner, Clifford Neuman, and Jeffrey Schiller.
{Kerberos: An Authentication Service for Open Network Systems}.
In {\it USENIX Association Winter Conference 1988 Proceedings},
pages~191--202, February 1988.
\bibitem{geoff}
Jeff Collyer. Risks of unchecked input in C programs. {\it Forum on
Risks to the Public in Computers and Related Systems}, ACM Committee
on Computers and Public Policy, Volume 7, Issue 74 (10 Nov 1988),
lines~200--231.
\bibitem{smb}
Steven Bellovin. The worm and the debug option. {\it Forum on Risks
to the Public in Computers and Related Systems}, ACM Committee on
Computers and Public Policy, Volume 7, Issue 74 (10 Nov 1988),
lines~180--197.
\bibitem{ncsc}
L. Castor, et. al. {\it Post Mortem of 3 November ARPANET/MILNET
Attack}, unpublished notes, 8 November 1988.
\bibitem{baldwin}
Robert W. Baldwin. {\it Rule Based Analysis of Computer Security}. MIT EE
PhD. Thesis. 93pp, June 1987.
\bibitem{mockapetris}
P. Mockapetris. {\it Domain Names - Concepts And Facilities}. Request
For Comments 1034, Network Working Group, November 1987, page 16.
\bibitem{nyt}
John Markoff. Computer Snarl: A `Back Door' Ajar. {\it New York
Times}, Vol CXXXVIII, No. 47682 (7 Nov 1988) p. B10.
\bibitem{nyt1111}
John Markoff. U.S. Is Moving to Restrict Access To Facts About Computer Virus.
{\it New York Times}, Vol CXXXVIII, No. 47686 (11 Nov 1988) p. A28.
\bibitem{herald}
College Whiz ``Put Virus in Comptuers''. {\it Boston Herald}, 5 Nov 1988, p. 1.
\bibitem{athena}
G.~Winfield Treese.
\newblock {Berkeley UNIX on 1000 Workstations: Athena Changes to 4.3BSD}.
\newblock In {\it USENIX Association Winter Conference 1988 Proceedings},
pages~175--182, February 1988.
\bibitem{smtp}
J.~B. Postel.
\newblock {\it {Simple Mail Transfer Protocol}}.
\newblock Technical Report~NIC/RFC 821, Network Working Group, USC ISI, August
1982.
\bibitem{netnews}
Mark~R. Horton.
\newblock {How to Read the Network News}.
\newblock {\it UNIX User's Supplementary Documents}, April 1986.
\bibitem{risks1}
{\it Forum on Risks to the Public in Computers and Related Systems},
ACM Committee on Computers and Public Policy, Volume 7, Issue 69 (3
Nov 1988).
\bibitem{spaf1}
Gene Spafford. A cure!!!!!. {\it Forum on Risks
to the Public in Computers and Related Systems}, ACM Committee on
Computers and Public Policy, Volume 7, Issue 70 (3 Nov 1988),
lines~170--210.
\bibitem{spaf2}
Gene Spafford. A worm ``condom''. {\it Forum on Risks
to the Public in Computers and Related Systems}, ACM Committee on
Computers and Public Policy, Volume 7, Issue 70 (3 Nov 1988),
lines~149--168.
\bibitem{rfc950}
J. Mogul, J.~B. Postel.
\newblock {\it {Internet Standard Subnetting Procedure}}.
\newblock Technical Report~NIC/RFC 950, Network Working Group, August
1985.
\bibitem{telnet}
J. Postel, J. Reynolds.
\newblock {\it {Telnet Protocol Specification}}.
\newblock Technical Report~NIC/RFC854, Network Working Group, May 1983.
\bibitem{internet}
Need a good reference here. Find Postel's paper.
\bibitem{notablenets}
J.~S. Quarterman and J.~C. Hoskins.
\newblock Notable Computer Networks.
\newblock {\it Communications of the ACM}, Volume 29, Number 10 (Oct 1986),
pp. 932-971.
\end{thebibliography}