|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T b
Length: 4004 (0xfa4) Types: TextFile Names: »bib.latex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« └─⟦87f8973c9⟧ └─⟦this⟧ »bib.latex«
%%%% %%%% The Internet Virus of November 3, 1988 %%%% Mark W. Eichin, MIT Project Athena %%%% %%%% $Header: bib.latex,v 1.8 88/11/28 22:15:20 jon Locked $ %%%% $Log: bib.latex,v $ %%%% Revision 1.8 88/11/28 22:15:20 jon %%%% *** empty log message *** %%%% %%%% Revision 1.7 88/11/22 11:05:20 eichin %%%% added spaf2 %%%% %%%% Revision 1.6 88/11/22 04:20:56 jon %%%% add telnet ref %%%% %%%% Revision 1.5 88/11/22 03:25:03 jon %%%% add quarterman ref and fake internet ref %%%% %%%% Revision 1.4 88/11/22 01:17:03 eichin %%%% added spaf1 (pleasequit) and rfc950 %%%% %%%% \begin{thebibliography}{99} \bibitem{saltzer} Saltzer, J. and Schroeder, M. The protection of information in computer systems. Proc. IEEE 63, 9 (Sep. 1975), 1278-1308 \bibitem{kerberos} Jennifer Steiner, Clifford Neuman, and Jeffrey Schiller. {Kerberos: An Authentication Service for Open Network Systems}. In {\it USENIX Association Winter Conference 1988 Proceedings}, pages~191--202, February 1988. \bibitem{geoff} Jeff Collyer. Risks of unchecked input in C programs. {\it Forum on Risks to the Public in Computers and Related Systems}, ACM Committee on Computers and Public Policy, Volume 7, Issue 74 (10 Nov 1988), lines~200--231. \bibitem{smb} Steven Bellovin. The worm and the debug option. {\it Forum on Risks to the Public in Computers and Related Systems}, ACM Committee on Computers and Public Policy, Volume 7, Issue 74 (10 Nov 1988), lines~180--197. \bibitem{ncsc} L. Castor, et. al. {\it Post Mortem of 3 November ARPANET/MILNET Attack}, unpublished notes, 8 November 1988. \bibitem{baldwin} Robert W. Baldwin. {\it Rule Based Analysis of Computer Security}. MIT EE PhD. Thesis. 93pp, June 1987. \bibitem{mockapetris} P. Mockapetris. {\it Domain Names - Concepts And Facilities}. Request For Comments 1034, Network Working Group, November 1987, page 16. \bibitem{nyt} John Markoff. Computer Snarl: A `Back Door' Ajar. {\it New York Times}, Vol CXXXVIII, No. 47682 (7 Nov 1988) p. B10. \bibitem{nyt1111} John Markoff. U.S. Is Moving to Restrict Access To Facts About Computer Virus. {\it New York Times}, Vol CXXXVIII, No. 47686 (11 Nov 1988) p. A28. \bibitem{herald} College Whiz ``Put Virus in Comptuers''. {\it Boston Herald}, 5 Nov 1988, p. 1. \bibitem{athena} G.~Winfield Treese. \newblock {Berkeley UNIX on 1000 Workstations: Athena Changes to 4.3BSD}. \newblock In {\it USENIX Association Winter Conference 1988 Proceedings}, pages~175--182, February 1988. \bibitem{smtp} J.~B. Postel. \newblock {\it {Simple Mail Transfer Protocol}}. \newblock Technical Report~NIC/RFC 821, Network Working Group, USC ISI, August 1982. \bibitem{netnews} Mark~R. Horton. \newblock {How to Read the Network News}. \newblock {\it UNIX User's Supplementary Documents}, April 1986. \bibitem{risks1} {\it Forum on Risks to the Public in Computers and Related Systems}, ACM Committee on Computers and Public Policy, Volume 7, Issue 69 (3 Nov 1988). \bibitem{spaf1} Gene Spafford. A cure!!!!!. {\it Forum on Risks to the Public in Computers and Related Systems}, ACM Committee on Computers and Public Policy, Volume 7, Issue 70 (3 Nov 1988), lines~170--210. \bibitem{spaf2} Gene Spafford. A worm ``condom''. {\it Forum on Risks to the Public in Computers and Related Systems}, ACM Committee on Computers and Public Policy, Volume 7, Issue 70 (3 Nov 1988), lines~149--168. \bibitem{rfc950} J. Mogul, J.~B. Postel. \newblock {\it {Internet Standard Subnetting Procedure}}. \newblock Technical Report~NIC/RFC 950, Network Working Group, August 1985. \bibitem{telnet} J. Postel, J. Reynolds. \newblock {\it {Telnet Protocol Specification}}. \newblock Technical Report~NIC/RFC854, Network Working Group, May 1983. \bibitem{internet} Need a good reference here. Find Postel's paper. \bibitem{notablenets} J.~S. Quarterman and J.~C. Hoskins. \newblock Notable Computer Networks. \newblock {\it Communications of the ACM}, Volume 29, Number 10 (Oct 1986), pp. 932-971. \end{thebibliography}