DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T b

⟦9ef26dfb3⟧ TextFile

    Length: 4004 (0xfa4)
    Types: TextFile
    Names: »bib.latex«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« 
        └─⟦87f8973c9⟧ 
            └─⟦this⟧ »bib.latex« 

TextFile

%%%%
%%%% The Internet Virus of November 3, 1988
%%%% Mark W. Eichin, MIT Project Athena
%%%% 
%%%% $Header: bib.latex,v 1.8 88/11/28 22:15:20 jon Locked $
%%%% $Log:	bib.latex,v $
%%%% Revision 1.8  88/11/28  22:15:20  jon
%%%% *** empty log message ***
%%%% 
%%%% Revision 1.7  88/11/22  11:05:20  eichin
%%%% added spaf2
%%%% 
%%%% Revision 1.6  88/11/22  04:20:56  jon
%%%% add telnet ref
%%%% 
%%%% Revision 1.5  88/11/22  03:25:03  jon
%%%% add quarterman ref and fake internet ref
%%%% 
%%%% Revision 1.4  88/11/22  01:17:03  eichin
%%%% added spaf1 (pleasequit) and rfc950
%%%% 
%%%%
\begin{thebibliography}{99}

\bibitem{saltzer}
Saltzer, J. and Schroeder, M. The protection of information in
computer systems. Proc. IEEE 63, 9 (Sep. 1975), 1278-1308

\bibitem{kerberos}
Jennifer Steiner, Clifford Neuman, and Jeffrey Schiller.
{Kerberos: An Authentication Service for Open Network Systems}.
In {\it USENIX Association Winter Conference 1988 Proceedings},
pages~191--202, February 1988.

\bibitem{geoff}
Jeff Collyer. Risks of unchecked input in C programs. {\it Forum on
Risks to the Public in Computers and Related Systems}, ACM Committee
on Computers and Public Policy, Volume 7, Issue 74 (10 Nov 1988),
lines~200--231.

\bibitem{smb}
Steven Bellovin. The worm and the debug option.  {\it Forum on Risks
to the Public in Computers and Related Systems}, ACM Committee on
Computers and Public Policy, Volume 7, Issue 74 (10 Nov 1988),
lines~180--197.

\bibitem{ncsc}
L. Castor, et. al. {\it Post Mortem of 3 November ARPANET/MILNET
Attack}, unpublished notes, 8 November 1988.

\bibitem{baldwin}
Robert W. Baldwin. {\it Rule Based Analysis of Computer Security}. MIT EE
PhD. Thesis. 93pp, June 1987.

\bibitem{mockapetris}
P. Mockapetris. {\it Domain Names - Concepts And Facilities}.  Request
For Comments 1034, Network Working Group, November 1987, page 16.

\bibitem{nyt}
John Markoff. Computer Snarl: A `Back Door' Ajar. {\it New York
Times}, Vol CXXXVIII, No. 47682 (7 Nov 1988) p. B10.

\bibitem{nyt1111}
John Markoff. U.S. Is Moving to Restrict Access To Facts About Computer Virus.
{\it New York Times}, Vol CXXXVIII, No. 47686 (11 Nov 1988) p. A28.

\bibitem{herald}
College Whiz ``Put Virus in Comptuers''. {\it Boston Herald}, 5 Nov 1988, p. 1.

\bibitem{athena}
G.~Winfield Treese.
\newblock {Berkeley UNIX on 1000 Workstations: Athena Changes to 4.3BSD}.
\newblock In {\it USENIX Association Winter Conference 1988 Proceedings},
  pages~175--182, February 1988.

\bibitem{smtp}
J.~B. Postel.
\newblock {\it {Simple Mail Transfer Protocol}}.
\newblock Technical Report~NIC/RFC 821, Network Working Group, USC ISI, August
  1982.

\bibitem{netnews}
Mark~R. Horton.
\newblock {How to Read the Network News}.
\newblock {\it UNIX User's Supplementary Documents}, April 1986.

\bibitem{risks1}
{\it Forum on Risks to the Public in Computers and Related Systems},
ACM Committee on Computers and Public Policy, Volume 7, Issue 69 (3
Nov 1988).

\bibitem{spaf1}
Gene Spafford. A cure!!!!!.  {\it Forum on Risks
to the Public in Computers and Related Systems}, ACM Committee on
Computers and Public Policy, Volume 7, Issue 70 (3 Nov 1988),
lines~170--210.

\bibitem{spaf2}
Gene Spafford. A worm ``condom''.  {\it Forum on Risks
to the Public in Computers and Related Systems}, ACM Committee on
Computers and Public Policy, Volume 7, Issue 70 (3 Nov 1988),
lines~149--168.

\bibitem{rfc950}
J. Mogul, J.~B. Postel.
\newblock {\it {Internet Standard Subnetting Procedure}}.
\newblock Technical Report~NIC/RFC 950, Network Working Group, August
  1985.

\bibitem{telnet}
J. Postel, J. Reynolds.
\newblock {\it {Telnet Protocol Specification}}.
\newblock Technical Report~NIC/RFC854, Network Working Group, May 1983.

\bibitem{internet}
Need a good reference here.  Find Postel's paper.

\bibitem{notablenets}
J.~S. Quarterman and J.~C. Hoskins.
\newblock Notable Computer Networks.
\newblock {\it Communications of the ACM}, Volume 29, Number 10 (Oct 1986),
pp. 932-971.
\end{thebibliography}