Bibliography of Selected Computer Security Publications January 1980- October 1989
Total Page:16
File Type:pdf, Size:1020Kb
NIST Special Publication 800-1 Bibliography of U.S. DEPARTMENT OF Selected Computer COMMERCE National Institute of Standards Security Publications and Technology January 1980- NAT L INST OF STAND 4 October 1989 l^l^j""' l l A111D3 MbEl^lb Rein Turn Lawrence E. Bassham III NIST PUBLICATIONS COMPUTER SECURITY 100 .U57 800-1 _ 1990 C.2 NIST Special Publication 800-1 Bibliography of Selected Computer Security Publications January 1980- October 1989 Rein TUm, Compiler Rein Tlim Associates Pacific Palisades, CA 90727 Lawrence E. Bassham III, Editor COMPUTER SECURITY National Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 December 1990 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Reports on Computer Systems Technology The National Institute of Standards and Technology (NIST) has a unique responsibility for computer systems technology within the Federal Government. NIST's National Computer Systems Laboratory (NCSL) develops standards and guidelines, provides technical assistance, and conducts research for comput- ers and related telecommunications systems to achieve more effective utilization of Federal information technology resources. NCSL's responsibilities include development of technical, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. NCSL assists agencies in developing security plans and in improving computer security awareness training. This Special Publication 800 series reports NCSL research and guidelines to Federal agencies as well as to organizations in industry, government, and academia. National Institute of Standards and Technology Special Publication 800-1 Natl. Inst. Stand. Technol. Spec. Publ. 800-1, 200 pages (Dec. 1990) CODEN: NSPUE2 U.S. GOVERNMENT PRINTING OFFICE WASHINGTON: 1990 For sale by the Superintendent of Documents, U.S. Government Printing Office, Washington, DC 20402 ABSTRACT This bibliography cites selected books and articles on computer security published from January 1980 through October 1989. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. English language articles from foreign journals were included as available. The citations are listed under nine categories. A tenth category of pre- 1980 publications is also provided, as well as an appendix containing addresses of all journals and magazines referenced in the bibliography. Key Words: access controls; auditing; communications security; computer crime; computer security; confidentiality; cryptography; disaster recovery; integrity; privacy; risk management; trusted computing base. iii Contents Introduction 1 1. General 1-1 2. Management 2-1 3. Foundations 3-1 4. Access Control 4-1 5. Trusted Systems 5-1 6. Database Security 6-1 7. Communication and Network Security 7-1 8. Cryptography 8-1 9. Privacy 9-1 10. Pre- 1980 Publications 10-1 A. Security Environment 10-1 B. Security Models and Database Security 10-3 C. Communications Security 10-10 D. Privacy 10-13 Appendix A: Periodicals A-1 Appendix B: List of Key Words B-1 V INTRODUCTION In recognition of the critical need for better dissemination of computer security information throughout government and industry, the National Institute of Standards and Technology (NIST) has produced this selected bibliography of key computer security literature published from January 1980 through October 1989. This bibHography was compiled by Rein Turn of Rein Turn Associates under contract to NIST. The bibliography is organized into the following 10 sections and 2 appendices: 1. General 2. Management 3. Foundations 4. Access Control 5. Trusted Systems 6. Database Security 7. Communication and Network Security 8. Cryptography 9. Privacy 10. Pre- 1980 Publications Appendix A: Periodicals Appendix B: List of Key Words Citations in sections 1 through 9 are organized by subject matter; section 10 is a listing of pre- 1980 publications. To have been selected, an article had to be substantial in content and have been published in professional or technical journals, magazines, or conference proceedings. Only very substantial articles from the popular or trade press were included. EngHsh language articles from foreign journals were included as available. The individual citations have the following structure (an example is shown at the right): Identifier AAL-83 Author Aalders, J.C.H. Title "Towards Standards in Computer Security," Proc. '83 Journal title (or publishing house) inP/Sec. Stockholm, 1983, (2: FAK-83), Date and page (or location and year) pp. 5-13. Key words (two or three) Key Words: guidelines, policy. Each citation is uniquely identified by the first letters of the principal author's last name (or the publishing organization's acronym, if no author is identified or listing by organization is more meaningful) and the last two digits of the year of publication. A lowercase letter following the year serves to distinguish otherwise identical citation identifiers. 1 Section numbers are used to distinguish identical citations identifiers from different sections and multiple citations from the same publication [e.g. (2: NBS-81) and (7: NBS-81)], Appendix A contains a list of the periodicals from which citations in this bibliography have been taken. The list contains publisher and editor information where appropriate in order to assist the user of this bibliography to obtain more information about documents cited. Appendix B contains a list of all the key words used in each of the 10 sections. This list will assist the reader who would like information on a topic that spans more than one section. As an example, information on viruses can been found in each of the first three sections (General, Management, and Foundations). 2 1. General This section cites general, mostly nontechnical publications on computer threats and vulnerabilities (including the hacker and computer viruses), the need for computer security, and other aspects of computer security. AAL-83 ALA-86 ASS-81 Aalders, J.C.H. Alagar, V.S. "An Atlas of Terrorism," 'Towards Standards in "A Human Approach to the Protection Assets , March/April Computer Security," Proc. Technological Challenges in 1981, pp. 26-36. '83 IFIP/Sec. Stockholm, Data Security," Computers & 1983. (2: FAK-83), pp. 5-13. Security . December 1986. pp. Key Words: crime, hackers. 328-335. Key Words: guidelines, ATK-85 policy. Key Words: awareness, Atkins, W. policy. "Jesse James at the Terminal," AAL-85 Harvard Business Review , Aalders, J.C.H., ALL-85 July/August 1985 I.S. Herschberg, and Allen, R.J. A. Van Zanten "Data Security: Problems and Key Words: crime, hackers. Handbook for Information Remedies," Today's Office , Security , North- April 1985, pp. 26-27. BAC-83 Holland/Elsevier Science Backwith, N. Publishing Co., New York, Key Words: crime, threats, "Unique Approach to Security 1985. general, techniques. Evaluation," Computers & Security , January 1982, pp. 35- Key Words: book, general, APR-81 40. policy, guidelines, techniques. Crime Investigation Manual . Assets Protection Publishing, Key Words: guidelines, policy. ABA-84 Madison, WI, 1981 Report on Crime, American BAI-84 Bar Association. Section on Key Words: book, crime. Bailey. D. Criminal Justice, Washington, "Attacks on Computers: DC, 1984. ARD-85 Congressional Hearings and Ardis, P.M., and Pending Legislation," Proc. Key Words: book, crime, R.M. Johnson 1984 IEEE Symp. on Sec. & laws, policy. "Electronic and Crime Privacy (5: IEE-84). pp. 180- Insurance in the US and UK," 187. AGR-83 Computer Fraud & Security 1- Agranoff, M.H. Bulletin , August 1985. pp. Key Words: crime, hackers, "Achieving Security 6. legislation. Awareness: Tips and Techniques." Computer Key Words: crime, policy, BAI-87 Security Journal , Spring international. Baird, B.J., L.L. Baird, and 1983. pp. 7-17. R.P. Ranauro, ARN-83 'The Moral Cracker?," Key Words: awareness, Amell, A. Computers & Security , guidelines. "On-Site Hazards, Off-Site December 1987, pp. 471-478. Safety," Computerworld, December 12, 1983, pp. Key Words: crime, hackers. ID/13-24. Key Words: threats, physical. 1-1 BAI-89 BEA-84 BEE-84 Bainbridge, D.I. Beane. W.F., E.R. Hilton, and Beebe, C.A. "Hacking - The B. Goldstein "Plarming for Access Control," Unauthorized Access of "Computer Security: Who Is Security Management, January 77-1-. Computer Systems: The in Charge?" Security World , 1984, pp. Legal Implications," Modem October 1984, pp. 42-46. Law Review . March 1989, Key Words: guidelines, policy. pp. 236-245. Key Words: general, policy. BEL-87 Key Words: crime, hackers, BEC-80 Belford, P.. and J. Quann legislation. Becker, J. 'The Hack Attack Increasing "Rifkin - A Documentary Computer System Awareness BAK-85 History," Computer/Laws of Vulnerability Threats," Baker, R.H. Journal . Summer 1980, pp. AL\A 87-3093, Proc. 3d The Computer Security 472-720. Aerosp. Comp. Sec. Conf. (5: Handbook , TAB Books, Inc., IEE-87b), 1987, pp. 155-157. Blue Ridge Summit, PA, Key Words: crime. 1985 Key Words: awareness, BEC-83 hackers, threats, vulnerabilities. Key Words: book, general, Becker, L.G. policy, guidelines, techniques. Computer Security: An BEQ-83 Overview of National Bequai, A. BAL-82 Concerns and Challenges , How to Prevent Crime