Attention, cette bibliographie n'est plus mise à jour depuis 1998.
Nous la laissons en ligne car elle reste consultée régulièrement.

@Manual{green89,
  title =        "{IT} Security Evaluation Criteria, Bundesanzeiger",
  organization = "German Information Security Agency (GISA)",
  year =         "1989",
}

@Article{Aal.91,
  author =       "T. Araki and T. Morizumi and H. Nagase and T. Takenaka
                 and K. Yamashita",
  title =        "Security level assignment by graph analysis",
  journal =      "IEICE Transactions",
  volume =       "E74",
  number =       "8",
  pages =        "2166--2175",
  month =        aug,
  year =         "1991",
}

@InProceedings{AB90,
  author =       "I. F. Akyildiz and G. S. Benson",
  title =        "A Security Reclassifier for a Local Area Network",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "85--96",
  year =         "1990",
}

@InProceedings{ABJ93,
  author =       "V. Atluri and E. Bertino and S. Jajodia",
  title =        "Achieving Stricter Correctness Requirements in
                 Multilevel Secure Databases",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "135--149",
  year =         "1993",
}

@TechReport{ABKL90,
  author =       "M. Abadi and M. Burrows and C. Kaufman and B.
                 Lampson",
  title =        "Authentication and Delegation with Smart-cards",
  institution =  "DIGITAL, Systems Research Center",
  number =       "67",
  month =        oct,
  year =         "1990",
}

@TechReport{AFN90,
  author =       "AFNOR",
  title =        "Pour une approche m\'{e}thodique de la
                 s\'{e}curit\'{e} des syst\`{e}mes d'information ({LES}
                 {METHODES} {MARION} {ET} {MELISA})",
  institution =  "CNTI/CN27/GE1",
  number =       "4",
  month =        "novembre",
  year =         "1990",
}

@Article{AGS83,
  author =       "S. R. Ames and M. Gasser and R. R. Schell",
  title =        "Security Kernel Design and Implementation : An
                 Introduction",
  journal =      "Computer",
  volume =       "16",
  number =       "7",
  month =        jul,
  year =         "1983",
}

@Article{AJ87,
  author =       "M. D. Abrams and A. B. Jeng",
  title =        "Network Security Protocol Reference Model and the
                 Trusted Computer System Evaluation Criteria",
  journal =      "IEEE Network Magazine",
  pages =        "24--33",
  month =        apr,
  year =         "1987",
}

@InProceedings{AJJ92,
  author =       "P. Ammann and F. Jaeckle and S. Jajodia",
  title =        "A Two Snapshot Algorithm for Concurrency Control in
                 Multi- Level Secure Databases",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "204--215",
  year =         "1992",
}

@Article{AL91,
  author =       "J. Alves-Foss and K. Levitt",
  title =        "The Verification of Secure Distributed Systems",
  journal =      "IEEE, COMPCON",
  year =         "1991",
}

@InProceedings{AL92,
  author =       "Bruno d' Ausbourg and Jean-Henri Llareus",
  title =        "{M2}{S} : {A} Machine for Multilevel Security",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "373--392",
  year =         "1992",
}

@TechReport{Amb91,
  author =       "O. Ambrois",
  title =        "Aspects of security, integrity and privacy in the
                 telecommunication network",
  institution =  "CSELT",
  volume =       "XIX",
  number =       "2",
  month =        "avril",
  year =         "1991",
}

@Article{Ams88,
  author =       "CISA Ellen Amsel",
  title =        "Network Security and Access Controls",
  journal =      "Computers and Security",
  volume =       "7",
  month =        feb,
  year =         "1988",
}

@TechReport{And72,
  author =       "J. P. Anderson",
  title =        "Computer Security Technology Planning Study",
  institution =  "ESD-TR-73-51",
  volume =       "1",
  month =        oct,
  year =         "1972",
}

@TechReport{And80,
  author =       "J. P. Anderson",
  title =        "Computer Security Threat Monitoring and Surveillance",
  institution =  "James P. Anderson Company, Fort Washington,
                 Pennsylvania",
  month =        apr,
  year =         "1980",
}

@InProceedings{And85,
  author =       "J. P. Anderson",
  title =        "A Unification of Computer and Network Security and
                 Privacy Concepts",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  year =         "1985",
}

@InProceedings{And92,
  author =       "Ross J. Anderson",
  title =        "{UEPS} - {A} Second Generation Electronic Wallet",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "411--418",
  year =         "1992",
}

@Article{AP87a,
  author =       "M. D. Abrams and H. J. Podell",
  title =        "Network Security Overview",
  journal =      "Computer and Networks Security",
  year =         "1987",
}

@Article{AP87b,
  author =       "M. D. Abrams and H. J. Podell",
  title =        "Society and policy issues",
  journal =      "Computer and Networks Security",
  year =         "1987",
}

@Article{AP87c,
  author =       "M. D. Abrams and H. J. Podell",
  title =        "Management Issues",
  journal =      "Computer and Networks Security",
  year =         "1987",
}

@Article{AP87d,
  author =       "M. D. Abrams and H. J. Podell",
  title =        "Formal Models",
  journal =      "Computer and Networks Security",
  year =         "1987",
}

@Article{AP87e,
  author =       "M. D. Abrams and H. J. Podell",
  title =        "Protocols",
  journal =      "Computer and Networks Security",
  year =         "1987",
}

@InProceedings{Bad91,
  author =       "Lee Badger",
  title =        "{Covert Channel Analysis Planning for Large Systems}",
  pages =        "120--136",
  year =         "1991",
  booktitle =    "{Proceedings of the 14th National Computer Security
                 Conference}",
  address =      "Washington, DC",
  month =        oct,
}

@Article{Bai82,
  author =       "S. C. Bailin",
  title =        "Distribution of Access Control Functions in a Local
                 Area Networks",
  journal =      "IEEE CH1811-9/82/0000/0118\$00.75",
  year =         "1982",
}

@InProceedings{Bai90,
  author =       "D. J. Bailey",
  title =        "Managing Computer Security : How Can Research Help ?",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "235--242",
  year =         "1990",
}

@InProceedings{Bak91,
  author =       "B. C. Baker",
  title =        "Les enjeux des bases de donn\'{e}es {SQL}
                 s\'{e}curis\'{e}es",
  booktitle =    "Convention {UNIX} 91",
  year =         "1991",
}

@TechReport{BAN89,
  author =       "M. Burrows and M. Abadi and R. Needham",
  title =        "A Logic of Authentication",
  institution =  "DIGITAL, Systems Research Center, N 39",
  month =        feb,
  year =         "1989",
  keywords =     "authentication logic",
}

@Article{BD87,
  author =       "S. Budkowski and P. Dembinski",
  title =        "An Introduction to Estelle : {A} Specification
                 language for Distributed Systems",
  journal =      "Computer Networks and ISDN systems",
  volume =       "3",
  number =       "3",
  year =         "1987",
}

@InProceedings{BD90,
  author =       "L. Blain and Y. Deswarte",
  title =        "An Intrusion-Tolerant Security Server for an Open
                 Distributed System",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "97--104",
  year =         "1990",
}

@InProceedings{Ben92,
  author =       "G. Benson",
  title =        "An Optimal Solution to the Secure Reader-Writer
                 Problem",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "251--259",
  year =         "1992",
}

@Article{Ber87,
  author =       "D. M. Berry",
  title =        "Towards a Formal Basis for the Formal Development
                 Method and the Ina Jo Specification Language",
  journal =      "IEEE transaction on software Engineering",
  volume =       "13",
  number =       "2",
  month =        feb,
  year =         "1987",
}

@InProceedings{BGS92,
  author =       "John A. Bull and Li Gong and Karen R. Sollins",
  title =        "Towards Security in an Open Systems Federation",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "3--20",
  year =         "1992",
}

@TechReport{Bib77,
  author =       "K. J. Biba",
  title =        "Integrity consideration for secure computer systems",
  institution =  "MITRE Corp., MTR-2997",
  year =         "1977",
}

@PhdThesis{Bie89,
  author =       "P. Bieber",
  title =        "Aspects epist\'{e}miques des protocoles
                 cryptographiques",
  school =       "Universit\'{e} Paul-Sabatier - TOULOUSE N d'ordre
                 531",
  year =         "1989",
}

@InProceedings{Bie90,
  author =       "P. Bieber",
  title =        "Epistemic Verification of Cryptographic Protocols",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "211--222",
  year =         "1990",
}

@InProceedings{Bis90,
  author =       "J. Biskup",
  title =        "A General Framework for Database Security",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "35--44",
  year =         "1990",
}

@InProceedings{BJMN93,
  author =       "B. T. Blaustein and S. Jajodia and C. D. McCollum and
                 L. Notargiacomo",
  title =        "A Model of Atomicity for Multilevel Transactions",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "120--134",
  year =         "1993",
}

@InProceedings{BK88,
  author =       "D. S. Bauer and M. E. Koblentz",
  title =        "{NIDX}, a Real-Time Intrusion Detection Expert
                 System",
  booktitle =    "Proceedings of the USENIX'88 Conference",
  pages =        "261--272",
  month =        jun,
  year =         "1988",
}

@Article{BKY85,
  author =       "W. E. Boebert and R. Y. Kain and W. D. Young",
  title =        "Secure Computing : The Secure {ADA} Target Aproach",
  journal =      "Scientific Honeyweller, Vol. 6, N 2",
  month =        jul,
  year =         "1985",
}

@TechReport{BLP73,
  author =       "D. E. Bell and L. J. La Padula",
  title =        "Security computer systems : mathematical foundations",
  institution =  "Hanscom AFB. Bedford. MA. Rep. FSD-TR-73-278.,
                 ESD/AFSC",
  volume =       "1",
  year =         "1973",
}

@TechReport{BLP74,
  author =       "D. E. Bell and L. J. LaPadula",
  title =        "Security Computer Systems: Mathematical foundations
                 and model",
  institution =  "MITRE Corp., Bedford, Mass.",
  year =         "1974",
}

@TechReport{BLP75,
  author =       "D. E. Bell and L. J. La Padula",
  title =        "Secure Computer Systems: Unified Exposition and
                 Multics Interpretation",
  institution =  "MTR-2997, MITRE Corp., Bedford, Mass.",
  month =        jul,
  year =         "1975",
}

@Article{BM90,
  author =       "S. M. Bellovin and M. Merritt",
  title =        "Limitations of the {K}erberos Authentication System",
  journal =      "Computer Communications Review",
  month =        "octobre",
  year =         "1990",
}

@InProceedings{BM92,
  author =       "S. M. Bellovin and M. Merritt",
  title =        "Encrypted Key Exchange : Password-Based Protocols
                 Secure Against Dictionary Attacks",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "72--84",
  year =         "1992",
}

@InProceedings{BN89,
  author =       "D. F. C. Brewer and M. J. Nash",
  title =        "The Chinese Wall Security Policy",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  year =         "1989",
}

@Article{Boc90,
  author =       "G. V. Bochman",
  title =        "Protocol specification for {OSI}",
  journal =      "Computer networks and ISDN systems",
  volume =       "18",
  pages =        "167--184",
  year =         "1990",
}

@Article{Bok81a,
  author =       "S. H. Bokhari",
  title =        "On the Mapping Problem",
  journal =      "IEEE Transaction on Computers",
  volume =       "C-30",
  number =       "3",
  year =         "1981",
}

@Article{Bok81b,
  author =       "S. H. Bokhari",
  title =        "The Role of a Well Defined Auditing Process in the
                 Enforcement of Privacy Policy and Data Security",
  journal =      "IEEE",
  year =         "1981",
}

@InProceedings{Boy92,
  author =       "Colin Boyd",
  title =        "A Formal Framework for Authentication",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "273--292",
  year =         "1992",
}

@Article{BP92,
  author =       "J. B. Bowles and C. E. Pelaez",
  title =        "Data security-bad code",
  journal =      "IEEE Spectrum",
  month =        aug,
  year =         "1992",
  keywords =     "hacking",
}

@Article{Bra87,
  author =       "D. K. Branstad",
  title =        "Considerations for Security in the {OSI}
                 Architecture",
  journal =      "IEEE Network Magazine",
  pages =        "34--39",
  month =        apr,
  year =         "1987",
}

@InProceedings{Bro79,
  author =       "P. Browne",
  title =        "The Security Audit",
  booktitle =    "Checklist For Computer Security Center Self-Audits",
  pages =        "173--184",
  year =         "1979",
}

@Article{BS79,
  author =       "M. Bishop and L. Snyder",
  title =        "The Transfert of Information and Authority in a
                 Protection System",
  journal =      "ACM 0-89791-009-5/79/1200/0045",
  year =         "1979",
}

@Article{BS80,
  author =       "G. V. Bochmann and C. A. Sunshine",
  title =        "Formal Methods in Communication Protocol Design",
  journal =      "IEEE Transactions on Communications",
  volume =       "28",
  number =       "4",
  month =        apr,
  year =         "1980",
}

@InProceedings{Cal92,
  author =       "Christel Calas",
  title =        "{GD}o{M} : a Multilevel Document Manager",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "393--410",
  year =         "1992",
}

@InProceedings{Cal.90,
  author =       "P. Casey and A. Brouwer and D. Herson and J. F.
                 Pacault and F. Taal and U. Van Essen",
  title =        "Harmonised Criteria for the Security Evaluation of its
                 Systems and Products",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "243--",
  year =         "1990",
}

@Article{Car93,
  author =       "Ulf Carlsen",
  title =        "Using Logics to detect Implementation-Dependent
                 Flaws",
  year =         "1993",
  keywords =     "authentication logic",
}

@Misc{CCI88,
  author =       "CCITT",
  title =        "{X509}, The directory - Authentication framework",
  month =        nov,
  year =         "1987",
  keywords =     "authentication X509",
}

@InProceedings{CD92,
  author =       "O. Costich and J. McDermott",
  title =        "A Multilevel Transaction Problem for Multilevel Secure
                 Database Systems and Its Solution for the Replicated
                 Architecture",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "192--203",
  year =         "1992",
}

@Misc{Cen90,
  author =       "{Security Group} {CEN/CENELEC}",
  title =        "Taxonomie for security standardisation",
  howpublished = "doc. de travail",
  month =        sep,
  year =         "1990",
}

@Article{CGHM81,
  author =       "M. H. Cheheyl and M. Gasser and G. A. Huff and J. K.
                 Millen",
  title =        "Verifying Security",
  journal =      "Computing Surveys",
  volume =       "13",
  number =       "3",
  month =        sep,
  year =         "1981",
}

@InProceedings{Cha86,
  author =       "B. G. Matley",
  title =        "An Analysis of the Differences between the computer
                 Security Practices in the Military and Private
                 Sectors",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "71--74",
  year =         "1986",
}

@Misc{CJ90,
  author =       "K. Cutler and F. Jones",
  title =        "{CISR} Commercial International Security
                 Requirements",
  howpublished = "CISR DRAFT",
  month =        aug,
  year =         "1990",
}

@Article{CLT88,
  author =       "A. C. Capel and C. Lafierre and K. C. Toth",
  title =        "Protecting the security of {X}.25 Communications",
  journal =      "Data Communication",
  month =        nov,
  year =         "1988",
}

@Article{Col90,
  author =       "Robert Cole",
  title =        "A Model for Security Distributed Systems",
  journal =      "Computers and Security",
  volume =       "9",
  month =        jun,
  year =         "1990",
}

@Article{Coo71,
  author =       "S. A. Cook",
  title =        "The Complexity of Theorem Proving Procedures",
  journal =      "ACM Symposium on Theory of Computing",
  year =         "1971",
}

@TechReport{Cra91,
  author =       "R. E. Crandall",
  title =        "Fast Elliptic Encryption",
  institution =  "NeXT, Scientific Computation Group",
  number =       "91.04.07",
  year =         "1991",
}

@Misc{Cup90a,
  author =       "F. Cuppens",
  title =        "Une logique \'{e}pist\'{e}mique et d\'{e}ontique pour
                 raisonner sur la s\'{e}curit\'{e} des syst\`{e}mes
                 informatiques",
  howpublished = "ONERA-CERT doc. interne",
  month =        "mars",
  year =         "1990",
}

@InProceedings{Cup90b,
  author =       "F. Cuppens",
  title =        "An Epistemic and deontic Logic for Reasoning about
                 Computer Security",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "135--146",
  year =         "1990",
}

@InProceedings{Cup93,
  author =       "F. Cuppens",
  title =        "A Logical Analysis of Authorized and Prohibited
                 Information Flows",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "100--109",
  year =         "1993",
}

@Article{CW87,
  author =       "D. D. Clark and D. R. Wilson",
  title =        "A Comparison of Commercial and Military Computer
                 Security Policies",
  journal =      "IEEE",
  year =         "1987",
}

@InProceedings{CY92,
  author =       "F. Cuppens and K. Yazdanian",
  title =        "A 'Natural' Decomposition of Multi-level Relations",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "273--285",
  year =         "1992",
}

@Article{Dav81,
  author =       "D. W. Davies",
  title =        "Ciphers and the Application of the Data Encryption
                 Standard",
  journal =      "Computer IEEE",
  year =         "1981",
}

@Article{Dav83,
  author =       "D. W. Davies",
  title =        "Applying the {RSA} Digital Signature to Electronic
                 Mail",
  journal =      "Computer",
  month =        feb,
  year =         "1983",
}

@TechReport{Dav85,
  author =       "W. L. Davis Jr",
  title =        "Synopsis of {U.S.} Department of Defense Evaluation
                 Criteria",
  institution =  "IBM",
  number =       "85212PUR0233",
  month =        jul,
  year =         "1985",
}

@InProceedings{DBS92,
  author =       "Herv\'{e} Debar and Monique Becker and Didier Siboni",
  title =        "A Neural Network Component for an Intrusion Detection
                 System",
  booktitle =    "Proceedings of the IEEE Symposium of Research in
                 Computer Security and Privacy",
  pages =        "240--250",
  month =        may,
  year =         "1992",
}

@Article{Deh89,
  author =       "Khosrow Dehnad",
  title =        "A Simple Way of Improving the Login Security",
  journal =      "Computers and Security",
  volume =       "8",
  month =        nov,
  year =         "1989",
}

@Article{Den76,
  author =       "Dorothy E. Denning",
  title =        "A Lattice Model of Secure Information Flow",
  journal =      "ACM",
  volume =       "19",
  number =       "5",
  month =        may,
  year =         "1976",
}

@Book{Den82,
  author =       "Dorothy E. Denning",
  title =        "Cryptography and Data Security",
  publisher =    "Addison-Wesley Publishing Company",
  year =         "1982",
}

@Article{Den87,
  author =       "D. E. Denning",
  title =        "An Intrusion-Detection Model",
  journal =      "IEEE transaction on Software Engineering",
  pages =        "222--232",
  volume =       "13",
  number =       "2",
  year =         "1987",
}

@InProceedings{Des92,
  author =       "Yvo Desmedt",
  title =        "Breaking the Traditional Computer Security Barriers",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "125--140",
  year =         "1992",
}

@InProceedings{DGV92,
  author =       "Joan Daemen and Ren\'{e} Govaerts and Joos
                 Vandewalle",
  title =        "A Hardware Design Model for Cryptographic Algorithms",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "419--434",
  year =         "1992",
}

@Article{DH76,
  author =       "W. Diffie and M. E. Hellam",
  title =        "New Directions in Cryptography",
  journal =      "IEEE Transactions on Information Theory",
  volume =       "IT-22",
  number =       "6",
  month =        nov,
  year =         "1976",
}

@Article{DH77,
  author =       "W. Diffie and M. E. Hellam",
  title =        "Exhaustive Cryptanalysis of the {NBS} {DES}",
  journal =      "Computer",
  volume =       "10",
  number =       "6",
  month =        jun,
  year =         "1977",
}

@InProceedings{DHN88,
  author =       "A. L. Donaldson and J. McHugh and K. A. Nyberg",
  title =        "Covert Channels in Trusted {LAN}'s",
  booktitle =    "Proceedings of the 11th National Computer Security
                 Conference",
  year =         "1988",
}

@TechReport{DKD92,
  author =       "Marc Dacier and Mohamed Kaâniche and Yves Deswarte",
  title =        "A Framework for Operational Security Assessment of
                 Computing Systems",
  institution =  "LAAS",
  number =       "92-434",
  year =         "1992",
}

@TechReport{DM??,
  author =       "E. Deberdt and S. Martin",
  title =        "{M}\'{e}thodologie '{MINERVE SECURITE}' demarche
                 d'\'{e}valuation de la s\'{e}curit\'{e} des logiciels",
  institution =  "IBM",
  number =       "LGE 08",
  pages =        "223",
  year =         "??",
}

@Article{DM83,
  author =       "R. DeMillo and M. Merritt",
  title =        "Protocol for Data Security",
  journal =      "Computer",
  month =        feb,
  year =         "1983",
}

@InProceedings{DM90,
  author =       "E. Deberdt and S. Martin",
  title =        "Methodology 'Minerve Security' Evaluation Process of
                 Software Security",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "223--234",
  year =         "1990",
}

@Proceedings{DNAC91,
  institution =  "DNAC",
  title =        "De nouvelles architecture pour les communications~:
                 les r\'{e}seaux informatiques, qualit\'{e} de service,
                 s\'{e}curit\'{e} et performances",
  editor =       "Eyrolles",
  year =         "1991",
}

@Misc{DOD85,
  author =       "{U.S. Defense Department}",
  title =        "Trusted Computer System Evaluation Criteria",
  institution =  "DoD",
  number =       "5200.28-STD",
  year =         "1985",
}

@Book{DP89,
  author =       "D. W. Davies and W. L. Price",
  title =        "Security for Computer Networks",
  publisher =    "John Willey and Sons Publications",
  edition =      "2nd",
  year =         "1989",
}

@InProceedings{DR91,
  author =       "Marc Dacier and Michel Rutsaert",
  title =        "Comment g\'{e}rer la transitivit\'{e} en
                 s\'{e}curit\'{e}",
  booktitle =    "Actes de la convention {UNIX}'91",
  pages =        "205--217",
  year =         "1991",
}

@InProceedings{Eal.92,
  author =       "J. Epstein and J. McHugh and R. Pascale and C. Martin
                 and D. Rothnie and H. Orman and A. Marmor-Squires and
                 M. Branstad and B. Danner",
  title =        "Evolution of a Trusted {B}3 Window System Prototype",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "226--239",
  year =         "1992",
}

@Misc{ECMA88,
  author =       "ECMA",
  title =        "Security In Open Systems: {A} Security Framework",
  institution =  "ECMA",
  number =       "TR/46",
  year =         "1988",
}

@TechReport{ECMA89,
  author =       "ECMA",
  title =        "Security In Open Systems : Data Elements and Service
                 Definitions",
  institution =  "ECMA",
  number =       "138",
  note =         "Standard",
  year =         "1989",
}

@Article{ET91,
  author =       "D. Estrin and G. Tsudik",
  title =        "Secure Control of Transit internetwork traffic",
  journal =      "Elsevier Science Publishers B.V. Ed.",
  year =         "1991",
}

@InProceedings{FS91,
  author =       "Dan Farmer and E. H. Spafford",
  title =        "The {COPS} Security Checker System",
  booktitle =    "Proceedings of the 14th National Computer Security
                 Conference",
  pages =        "372--385",
  month =        oct,
  year =         "1991",
}

@Misc{FB90,
  author =       "Dan Farmer and Robert Baldwin",
  title =        "Computer Oracle and Password System ({COPS})",
  howpublished = "Newsgroup comp.sources.unix",
  year =         "1990",
}

@TechReport{Fei80,
  author =       "R. J. Feiertag",
  title =        "A technique for Proving Specification Are multilevel
                 Secure",
  jinstitution = "Computer Science Lab SRI International. Menlo Park,
                 Cal.",
  number =       "CSL-109",
  year =         "1980",
}

@Article{Fen74,
  author =       "J. S. Fenton",
  title =        "Memoryless Subsystems",
  journal =      "The computer journal",
  volume =       "17",
  number =       "2",
  year =         "1974",
}

@Article{Fer90,
  author =       "R. Ferreira",
  title =        "The Practical Application of State of The Art Security
                 in Real Environments",
  journal =      "Lecture Notes in Computer Science",
  volume =       "453",
  year =         "1990",
}

@Article{Fer91,
  author =       "Josep Domingo-Ferrer",
  title =        "Algorithm-Sequenced Access Control",
  journal =      "Computers and Security",
  volume =       "10",
  month =        oct,
  year =         "1991",
}

@InProceedings{FLR77,
  author =       "R. J. Feiertag and K. N. Levitt and L. Robinson",
  title =        "Proving Multilevel Security of a System Design",
  booktitle =    "6th ACM symposium on operating system principles",
  pages =        "57--65",
  month =        nov,
  year =         "1977",
}

@InProceedings{FM93,
  author =       "T. Fine and S. E. Minear",
  title =        "Assuring Distributed Trusted Mach",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "206--218",
  year =         "1993",
}

@InProceedings{FN79,
  author =       "R. J. Feiertag and P. G. Neumann",
  title =        "The Foundation of a Provably Secure Operating System
                 ({PSOS})",
  booktitle =    "NCC",
  volume =       "47",
  editor =       "AFIPS Press",
  year =         "1979",
}

@InProceedings{FR92,
  author =       "Jean-Charles Fabre and Brian Randell",
  title =        "An Object-Oriented View of Fragmented Data Processing
                 for Fault and Intrusion Tolerance in Distributed
                 Systems",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "193--208",
  year =         "1992",
}

@Article{Fra83,
  author =       "L. J. Fraim",
  title =        "Scomp: {A} Solution to the Multilevel Security
                 Problem",
  journal =      "Computer",
  volume =       "16",
  number =       "7",
  month =        jul,
  year =         "1983",
}

@InProceedings{FZ92,
  author =       "G. P. Ford and Jun Zhang",
  title =        "A structural graph matching approach to image
                 understanding",
  booktitle =    "SPIE - The International Society for Optical
                 Engineering",
  volume =       "1607",
  pages =        "559--69",
  year =         "1992",
}

@Book{Gas88,
  author =       "M. Gasser",
  title =        "Building a secure computer system",
  publisher =    "Van Hoostrand and Reinhold",
  year =         "1988",
}

@InProceedings{Gau91,
  author =       "G. Gaudin",
  title =        "Gestion de s\'{e}curit\'{e} en environnement
                 h\'{e}t\'{e}rog\`{e}ne",
  booktitle =    "De nouvelles architectures pour les communications~:
                 les r\'{e}seaux informatiques, qualit\'{e} de service,
                 s\'{e}curit\'{e} et performances",
  year =         "1991",
  pages =        "73--80",
  month =        "octobre",
}

@Book{GJ79,
  author =       "M. R. Garey and D. S. Johnson",
  title =        "Computers and Intractability : {A} Guide to the Theory
                 of {NP}-Completeness",
  publisher =    "W.H. Freeman and Company",
  year =         "1979",
}

@InProceedings{GL91,
  author =       "T. D. Garvey and T. F. Lunt",
  title =        "Model-based Intrusion Detection",
  booktitle =    "Proceedings of the 14th National Computer Security
                 Conference",
  month =        oct,
  year =         "1991",
}

@InProceedings{GLP92,
  author =       "V. D. Gligor and S.-W. Luan and J. N. Pato",
  title =        "On Inter-Realm Authentification in Large Distributed
                 Systems",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "2--17",
  year =         "1992",
}

@InProceedings{GM82,
  author =       "J. A. Goguen and J. Meseguer",
  title =        "Security Policies and Security Models",
  booktitle =    "IEEE Symp. Security and Privacy",
  year =         "1982",
}

@InProceedings{GM89,
  author =       "J. Glasgow and G. MacEwen",
  title =        "Obligation as the Basis of Integrity Specification",
  booktitle =    "Computer Security Foundations Workshop, Franconia,
                 N.H.",
  month =        jun,
  year =         "1989",
}

@Article{GMP92,
  author =       "J. Glasgow and G. MacEwen and P. Panangaden",
  title =        "A logic for Reasoning About Security",
  journal =      "ACM Transactions on Computer Systems",
  volume =       "10",
  number =       "3",
  month =        aug,
  year =         "1992",
  keywords =     "authentication logic",
}

@InProceedings{GP90,
  author =       "M. Girault and J. C. Pailles",
  title =        "An Identity-Based Scheme Providing Zero-Knowledge
                 Authentication and Authenticated Key Exchange",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "173--184",
  year =         "1990",
}

@InProceedings{GPP90,
  author =       "D. Graft and M. Pabrai and U. Pabrai",
  title =        "Methodology for Network Security Design",
  booktitle =    "IEEE Symp. Security and Privacy",
  pages =        "675--682",
  year =         "1990",
}

@InProceedings{Gra87,
  author =       "C. Gray Girling",
  title =        "Covert Channels in {LAN}'s",
  booktitle =    "IEEE Symp. Security and Privacy",
  year =         "1987",
}

@InProceedings{Gra93,
  author =       "{J. W.} {Gray III}",
  title =        "On Introducing Noise into the Bus-Contention Channel",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "90--99",
  year =         "1993",
}

@Book{Gri81,
  author =       "David Gries",
  title =        "The Science of Programming",
  publisher =    "Springer-Verlag, New York",
  year =         "1981",
}

@InProceedings{GS92,
  author =       "{J. W.} {Gray III} and P. F. Syverson",
  title =        "A Logical Approach to Multilevel Security of
                 Probabilistic Systems",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "164--176",
  year =         "1992",
}

@Article{Gus88,
  author =       "D. Gusfield",
  title =        "A Graph Theoric Approach to Statistical Data
                 Security",
  journal =      "SIAM J. Computer",
  volume =       "17",
  number =       "3",
  year =         "1988",
}

@InProceedings{Hal.93,
  author =       "J. D. Horton and R. Harland and E. Ashby and R. H.
                 Cooper and W. F. Hyslop and B. G. Nickerson and W. M.
                 Stewart and O. K. Ward",
  title =        "The Cascade Vulnerability Problem",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "110--119",
  year =         "1993",
}

@Article{HA??,
  author =       "Stephen E. Hansen and E. Todd Atkins",
  title =        "Centralized System Monitoring With Swatch",
  journal =      "Proceedings of the the USENIX Conference",
  year =         "??",
}

@InProceedings{HA92,
  author =       "H. Hosmer and M. D. Abrams",
  title =        "MultiPolicy Machine: {A} New Security Paradigm",
  booktitle =    "IEEE Simposium on Security and Privacy",
  note =         "Poster Session Abstract",
  year =         "1992",
}

@Article{Har89,
  author =       "C. L. Harrold",
  title =        "An Introduction to the {SMITE} Approach to Secure
                 Computing",
  journal =      "Computers and Security",
  volume =       "8",
  month =        oct,
  year =         "1989",
}

@Article{Has91,
  author =       "J. Hastwell",
  title =        "Measuring User Accountability in an Integrated Network
                 Environment",
  year =         "1991",
}

@Article{Her87,
  author =       "I. S. Herschberg",
  title =        "The Hackers' Comfort",
  journal =      "Computers and Security",
  volume =       "6",
  number =       "2",
  pages =        "133--138",
  year =         "1987",
  keywords =     "hacking",
}

@InProceedings{HG92,
  author =       "Jingsha He and Virgil D. Gligor",
  title =        "Formal Methods and Automated Tool for Timing-Channel
                 Identification in {TCB} Source Code",
  booktitle =    "proceedings of the European Symposium on Research in
                 Computer Security (ESORICS)",
  pages =        "57--76",
  year =         "1992",
}

@InProceedings{HH86,
  author =       "L. R. Halme and J. Van Horne",
  title =        "Automated Analysis of Computer System Audit Trails for
                 Security Purposes",
  booktitle =    "Computer Security Conference",
  pages =        "71--74",
  year =         "1986",
}

@InProceedings{HK91,
  author =       "I. Houston and S. King",
  title =        "{CICS} project report - Experiences and Results from
                 the Use of {Z} in {IBM}",
  booktitle =    "Formal Software Development Methods: International
                 Symposium of VDM Europe",
  volume =       "2-4",
  editor =       "Springer Verlag",
  address =      "Berlin",
  year =         "1991",
}

@InProceedings{HL92,
  author =       "Ralf C. Hauser and E. Stewart Lee",
  title =        "Verification and Modelling of Authentification
                 Protocols",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "141--154",
  year =         "1992",
}

@InProceedings{HLLS90,
  author =       "G. Hoffmann and S. Lechner and M. Leclerca and F.
                 Steiner",
  title =        "Authentification and Access Control in a Distributed
                 System",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "71--84",
  year =         "1990",
}

@InProceedings{HLMM92,
  author =       "Naji Habra and Baudouin Le Charlier and Abdelaziz
                 Mounji and Isabelle Mathieu",
  title =        "{ASAX} : Software Architecture and Rule- Based
                 Language for Universal Audit Trail Analysis",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "435--450",
  year =         "1992",
}

@InProceedings{HM90,
  author =       "E. S. Hocking and J. A. McDermid",
  title =        "Towards on Object-Oriented Development Environment for
                 Secure Applications",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "191--200",
  year =         "1990",
}

@InProceedings{Hos91a,
  author =       "H. H. Hosmer",
  title =        "Integrating Security Policies",
  booktitle =    "Proceedings of the Third RADC Workshop of Multilevel
                 Database Security, Castile, NY, MITRE MTP 385",
  month =        may,
  year =         "1991",
}

@InProceedings{Hos91b,
  author =       "H. H. Hosmer",
  title =        "Shared Sensitivity Labels",
  booktitle =    "Data Security IV, Status and Prospects, North Holand",
  year =         "1991",
}

@InProceedings{Hos91c,
  author =       "H. H. Hosmer",
  title =        "The Multipolicy Machine: {A} New Paradigm for
                 Multilevel Secure Systems",
  booktitle =    "National Institute of Standards and Technology
                 Workshop on Secure Labels",
  month =        jun,
  year =         "1991",
}

@InProceedings{Hos91d,
  author =       "H. H. Hosmer",
  title =        "A Multipolicy Model: {A} Working Paper",
  booktitle =    "Fourth RADC Multilevel Database Security Workshop",
  month =        apr,
  year =         "1991",
}

@InProceedings{Hos91e,
  author =       "H. H. Hosmer",
  title =        "Metapolicies {I}",
  booktitle =    "ACM SIGSAC Data Management Workshop, San Antonio, TX",
  month =        dec,
  year =         "1991",
}

@InProceedings{Hos92,
  author =       "H. H. Hosmer",
  title =        "Metapolicies {II}",
  booktitle =    "Proceedings of the 15th National Computer Security
                 Conference, Baltimore, MD",
  month =        oct,
  year =         "1992",
}

@Article{HRU76,
  author =       "M. A. Harrison and W. L. Ruzzo and J. D. Ullman",
  title =        "Protection in operating systems",
  journal =      "ACM",
  volume =       "19",
  number =       "8",
  pages =        "461--471",
  month =        aug,
  year =         "1976",
}

@Article{Hru88,
  author =       "J. Hruska",
  title =        "Data viruses, Trojan horses and logic bombs-how to
                 combat them?",
  journal =      "Computer Fraud and Security Bulletin",
  volume =       "10",
  number =       "6",
  month =        apr,
  year =         "1988",
  keywords =     "hacking",
}

@Misc{HS88,
  author =       "J. Henshall and S. Shaw",
  title =        "{O}{SI} Explained End to End Computer Communication
                 Standards",
  editor =       "U. K.: Ellis Horwood Limited Chichester",
  year =         "1988",
}

@InProceedings{Hu92,
  author =       "W. M. Hu",
  title =        "Lattice Scheduling and Covert Channels",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "53--61",
  year =         "1992",
}

@TechReport{IBM90a,
  author =       "IBM",
  title =        "{AIX} version 3.1 for {RISC} System/6000{TM} : General
                 Concepts and Procedures",
  institution =  "IBM : documentation technique",
  year =         "1990",
}

@TechReport{IBM91,
  author =       "IBM",
  title =        "Elements of {AIX} Security",
  institution =  "IBM : documentation technique",
  number =       "GG24-3622-01",
  year =         "1991",
}

@Misc{IEE89,
  author =       "{IEEE LAN Secutity Working Group}",
  title =        "Standard for Interoperable Local Area Network ({LAN})
                 Security ({SILS}), {IEEE} 802.10",
  month =        dec,
  year =         "1989",
}

@InProceedings{Ilg93,
  author =       "K. Ilgun",
  title =        "{USTAT} : {A} Real-Time Intrusion Detection System for
                 {UNIX}",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "16--29",
  year =         "1993",
}

@TechReport{ISO84,
  author =       "ISO",
  title =        "Information Processing Systems -- {OSI} Reference
                 Model, International Standards Organization",
  institution =  "ISO",
  number =       "7498",
  month =        oct,
  year =         "1984",
}

@TechReport{ISO89,
  author =       "ISO",
  title =        "Information Processing Systems -- {OSI} Reference
                 Model -- Part 2: Security Architecture, International
                 Standards Organization",
  institution =  "ISO",
  number =       "7498-2",
  year =         "1989",
}

@TechReport{ISO90,
  author =       "ISO",
  title =        "{MD4} - Message Digest Algorithm",
  institution =  "International Standards Organization",
  number =       "ISO/IEC JTC1/SC27/WG20.2 N193",
  month =        apr,
  year =         "1990",
}

@TechReport{Iso91a,
  author =       "ISO",
  title =        "Glossary of Information Technology Security
                 Definitions",
  institution =  "International Standards Organization Publication",
  number =       "ISO/IEC JTC1/SC27 N270",
  year =         "1991",
  keyword =      "glossary",
}

@TechReport{Iso91b,
  author =       "ISO",
  title =        "Telecommunications and Information Exchange Between
                 Systems - Transport Layer Security Protocol",
  institution =  "International Standards Organization Publication",
  number =       "ISO/IEC JTC1/SC6 N6779",
  month =        oct,
  year =         "1991",
}

@TechReport{Iso91c,
  author =       "ISO",
  title =        "Telecommunications and Information Exchange Between
                 Systems - Network Layer Security Protocol",
  institution =  "International Standards Organization Publication",
  number =       "ISO/IEC JTC1/SC6 N7053",
  month =        nov,
  year =         "1991",
}

@TechReport{Iso91d,
  author =       "ISO",
  title =        "Telecommunications and Information Exchange Between
                 Systems - Transport Layer Security Protocol -
                 Amendement 1: Security Association Establishment",
  institution =  "International Standards Organization",
  number =       "ISO/IEC JTC1/SC6 N6794",
  month =        dec,
  year =         "1991",
}

@TechReport{ITSEM92,
  author =       "{Commision of the} {European} {³ommunities}",
  title =        "Information Technology Security Evaluation Manual
                 ({ITSEM})",
  institution =  "CEC",
  year =         "1992",
}

@InProceedings{JA92,
  author =       "S. Jajodia and V. Atluri",
  title =        "Alternative Correctness Criteria for Concurrent
                 Execution of Transactions",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "216--225",
  year =         "1992",
}

@InBook{Jac91,
  author =       "J. L. Jacob",
  title =        "Specifying security properties",
  publisher =    "??",
  chapter =      "??",
  year =         "1991",
}

@TechReport{Jal.93a,
  author =       "H. S. Javitz and A. Valdes and T. F. Lunt and A.
                 Tamaru and M. Tyson and J. Lowrance",
  title =        "Next Generation Intrusion Detection Expert System
                 ({NIDES})",
  institution =  "SRI",
  number =       "A016-Rationales",
  year =         "1993",
}

@Article{Jan92,
  author =       "Janus Associates",
  title =        "Information Security Administration Model : {A}
                 Management Model to Help Identify the Best Practices of
                 the Administration Function within the Security Group",
  journal =      "Computer and Security",
  volume =       "11",
  pages =        "327--340",
  year =         "1992",
}

@InProceedings{JDS91,
  author =       "Kathleen A. Jackson and David H. Dubois and Cathy A.
                 Stalling",
  title =        "An Expert System Application for Network Intrusion
                 Detection",
  booktitle =    "Proceedings of the 14th National Computer Security
                 Conference",
  year =         "1991",
}

@InProceedings{JLS76,
  author =       "A. K. Jones and R. J. Lipton and L. Snyder",
  title =        "A Linear Time Algorithm for Deciding Security",
  booktitle =    "17th Annual Symp. on Foundations of Computer Science",
  year =         "1976",
}

@TechReport{JM90,
  author =       "P. Janson and R. Molva",
  title =        "Network Security",
  institution =  "IBM Zurich Research Laboratory",
  month =        may,
  year =         "1990",
}

@Misc{JM91,
  author =       "P. Janson and R. Molva",
  title =        "Security in Open Networks and Distributed Systems",
  howpublished = "Elsevier Science Publishers",
  year =         "1991",
}

@Article{JMG88,
  author =       "C. Jard and J. F. Monin and R. Groz",
  title =        "Development of {V}\'{e}da, a Prototyping Tool for
                 Distributed Algorithms",
  journal =      "IEEE Transactions on software ingineering",
  volume =       "14",
  number =       "3",
  month =        mar,
  year =         "1988",
}

@TechReport{Jon??,
  author =       "R. W. Jones",
  title =        "A General Mechanism for Access Control: Its
                 Relationship to Secure Systems Concepts",
  institution =  "IBM",
  number =       "LGE 08",
  pages =        "45",
  year =         "??",
}

@InProceedings{Jon90,
  author =       "R. W. Jones",
  title =        "A General Mechanism for Access Control : Its
                 Relationship to Secure System Concepts",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "45--50",
  year =         "1990",
}

@InProceedings{JS92,
  author =       "Andrew J. I. Jones and Marek Sergot",
  title =        "Formal Specification of Security Requirements using
                 the Theory of Normative Positions",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "103--124",
  year =         "1992",
}

@TechReport{Kai??,
  author =       "J. Kaiser",
  title =        "An Object-Oriented Architecture to Support System
                 Reliability and Security",
  institution =  "IBM",
  number =       "LGE 08",
  pages =        "51",
  year =         "??",
}

@InProceedings{Kai90,
  author =       "J. Kaiser",
  title =        "An Object-Oriented Architecture to Support System
                 Reliability and Security",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "51--60",
  year =         "1990",
}

@Article{Kak83,
  author =       "S. C. Kak",
  title =        "Data Security in Computer Networks",
  journal =      "Computer IEEE",
  pages =        "8--10",
  year =         "1983",
}

@Article{Kak88,
  author =       "Viiveke Fak",
  title =        "Are we vulnerable to a virus attack? {A} report from
                 Sweden",
  journal =      "Computers and Security",
  volume =       "7",
  month =        apr,
  year =         "1988",
  keywords =     "hacking",
}

@InProceedings{Kal.92,
  author =       "Y. Klein and E. Roche and F. Taal and M. Van Dulm and
                 U. Van Essen and P. Wolf and J. Yates",
  title =        "The {IT} Security Evaluation Manuel ({ITSEM})",
  booktitle =    "Proceedings of the 15th NCSC Conference",
  year =         "1992",
}

@InProceedings{Kan80,
  author =       "A. Kandel",
  title =        "Fuzzy statistics and systems security",
  booktitle =    "Conference : Security Through Science and
                 Engineering",
  month =        sep,
  year =         "1980",
}

@InProceedings{Kar78,
  author =       "P. A. Karger",
  title =        "The Lattice Model in a Public Computing network",
  booktitle =    "ACM Annual Conference",
  volume =       "1",
  year =         "1978",
}

@Article{KBN88,
  author =       "B. C. Karp and L. K. Barker and L. D. Nelson",
  title =        "The Secure Data Network System",
  journal =      "ATT Technical Journal",
  pages =        "19--27",
  month =        may,
  year =         "1988",
}

@InProceedings{KC90,
  author =       "R. Kaplan and R. J. M. Clyde",
  title =        "Viruses, worms, and Trojan horses. {VI} The war
                 continues",
  booktitle =    "Digital Equipment Computer Users Society. Fall",
  pages =        "119--137",
  year =         "1990",
  keywords =     "hacking",
}

@InProceedings{Kel90,
  author =       "U. Kelter",
  title =        "Group-Oriented Discretionary Access Controls for
                 Distributed Structurally Object-Oriented Database
                 Systems",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "23--34",
  year =         "1990",
}

@InProceedings{Kel92,
  author =       "Udo Kelter",
  title =        "Type-Level Access Controls for Distributed
                 Structurally Object- Oriented Database Systems",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "21--40",
  year =         "1992",
}

@Article{Kem82a,
  author =       "R. A. Kemmerer",
  title =        "Formal Verification of an Operating System Kernel",
  journal =      "Communication of the ACM",
  volume =       "12",
  number =       "10",
  pages =        "576--581",
  year =         "1982",
}

@InProceedings{Kem82b,
  author =       "R. A. Kemmerer",
  title =        "A Practical Approach to Identifying Storage and Timing
                 Channels",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  year =         "1982",
}

@InProceedings{Kes92,
  author =       "Volker Kessler",
  title =        "On the Chinese Wall Model",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "41--56",
  year =         "1992",
}

@Misc{Kie89,
  author =       "M. Kielsky",
  title =        "Security and Access Control Features of the {VAX/VMS}
                 Operating System",
  howpublished = "??",
  year =         "1989",
}

@InProceedings{Kim91,
  author =       "J. Kimmins",
  title =        "Developing a Network Security Architecture : Concepts
                 and Issues",
  booktitle =    "Proceedings of the SECURICOM'91 Conference",
  month =        mar,
  year =         "1991",
}

@InProceedings{KK92,
  author =       "Iwen E. Kang and Thomas F. Keefe",
  title =        "On Transaction Processing for Multilevel Secure
                 Replicated Databases",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "329--348",
  year =         "1992",
}

@InProceedings{Klu89,
  author =       "H. M. Kluepfel",
  title =        "Foiling the wily hacker: more than analysis and
                 containment",
  booktitle =    "International Carnahan Conference on Security
                 Technology",
  pages =        "15--21",
  year =         "1989",
  keywords =     "hacking",
}

@Article{Klu91,
  author =       "H. M. Kluepfel",
  title =        "In search of the cuckoo's nest - an auditing framework
                 for evaluating the security of open networks",
  journal =      "EDP Auditor Journal",
  volume =       "3",
  pages =        "36--48",
  year =         "1991",
  keywords =     "hacking",
}

@InProceedings{Koh91,
  author =       "J. T. Kohl",
  title =        "The evolution of the {K}erberos Authentication
                 Service",
  booktitle =    "Acte de EurOpen 91",
  pages =        "295--313",
  year =         "1991",
}

@Article{KP91,
  author =       "R. A. Kemmerer and P. A. Porras",
  title =        "Covert Flow Trees: {A} Visual Approach to Analyzing
                 Covert Storage Channels",
  journal =      "IEEE Transaction on Software Engineering",
  volume =       "17",
  number =       "11",
  month =        nov,
  year =         "1991",
}

@Article{Kru89,
  author =       "Jan P. Kruys",
  title =        "Security of Open Systems",
  journal =      "Computers and Security",
  volume =       "8",
  month =        apr,
  year =         "1989",
}

@Article{Kru91,
  author =       "Jan P. Kruys",
  title =        "Progress in Secure Distributed Systems",
  journal =      "Computers and Security",
  volume =       "10",
  month =        aug,
  year =         "1991",
}

@TechReport{KSL??,
  author =       "A. Kehne and J. Sch{\"o}nw{\"a}lder and H.
                 Langend{\"o}rfer",
  title =        "Multiple Authentications with a Nonce-Based Protocol
                 Using Generalized Timestamps",
  institution =  "Institut f{\"u}r Betriebssysteme und Rechnerverbund,
                 TU Braunschweig, B{\"u}ltenweg 74/75, D-3300
                 Braunschweig",
  year =         "1991",
}

@InProceedings{Kun86,
  author =       "J. D. Kuhn",
  title =        "Research Toward Intrusion Detection Through Automated
                 Abstraction of Audit Data",
  booktitle =    "Computer Security Conference",
  pages =        "204--208",
  year =         "1986",
}

@Misc{KW91,
  author =       "J. O. Kephart and S. R. White",
  title =        "Directed-Graph Epidemiological Models of Computer
                 Viruses",
  editor =       "IEEE",
  year =         "1991",
}

@InProceedings{KW93,
  author =       "J. O. Kephart and S. R. White",
  title =        "Measuring and Modeling Computer Virus Prevalence",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "2--15",
  year =         "1993",
}

@Article{Lac74,
  author =       "R. D. Lackey",
  title =        "Penetration of computer systems an overview",
  journal =      "Honeywell Computer Journal",
  year =         "1974",
  keywords =     "hacking",
}

@TechReport{Lal.90a,
  author =       "T. F. Lunt and A. Tamaru and F. Gilham and R.
                 Jagannathan and C. Jalali and H. S. Javitz and A.
                 Valdes and P. G. Neumann",
  title =        "A real-Time Intrusion-Detection Expert System",
  institution =  "SRI International",
  month =        jun,
  year =         "1990",
}

@InProceedings{Lal.90b,
  author =       "T. F. Lunt and A. Tamaru and F. Gilham and R.
                 Jagannathan and P. G. Neumann and C. Jalali",
  title =        "{IDES}: {A} Progress Report",
  booktitle =    "Proceedings of the Computer Security Application
                 Conference",
  pages =        "273--285",
  year =         "1990",
}

@Article{Lal.90c,
  author =       "T. F. Lunt and D. Denning and R. Schell and M. Heckman
                 and W. Shockley",
  title =        "The SeaView Security Model",
  journal =      "IEEE Trans. on Soft. Engineering",
  volume =       "16",
  number =       "6",
  month =        jun,
  year =         "1990",
}

@TechReport{Lal.91,
  author =       "Lassire and Reboulet and Ruggiu and Velin and
                 Yazdanian",
  title =        "Glossaire encyclop\'{e}dique de la s\'{e}curit\'{e} et
                 qualit\'{e} des syst\`{e}mes d'information et
                 informatiques",
  institution =  "CT 'S\'{e}curit\'{e} et sûret\'{e} informatiques' de
                 l'AFCET",
  month =        "novembre",
  year =         "1991",
  keyword =      "glossary",
}

@Article{Lam73,
  author =       "B. W. Lampson",
  title =        "A Note on the Confinement Problem",
  journal =      "ACM",
  volume =       "16",
  number =       "10",
  pages =        "613--615",
  month =        oct,
  year =         "1973",
}

@Article{Lam74,
  author =       "B. W. Lampson",
  title =        "Protection",
  journal =      "ACM",
  volume =       "8",
  number =       "1",
  pages =        "18--24",
  month =        jan,
  year =         "1974",
}

@Article{Lan81,
  author =       "C. E. Landwerh",
  title =        "Formal Models for Computer Security",
  journal =      "Computer Surveys",
  volume =       "13",
  pages =        "247--275",
  year =         "1981",
}

@Article{LAN86,
  author =       "Y. Lapid and N. Ahituv and S. Neumann",
  title =        "Approaches to handling 'Trojan Horse' threats",
  journal =      "Computer and security",
  volume =       "5",
  month =        sep,
  year =         "1986",
  keywords =     "hacking",
}

@Article{LAN89,
  author =       "{European Institute for System Security} {EISS}",
  title =        "Local Area Network Security",
  journal =      "Lecture Notes in Computer Science",
  volume =       "396",
  year =         "1989",
}

@InProceedings{Lap90,
  author =       "L. La Padula",
  title =        "Formal Modeling in a Generalized Framework for Access
                 Control",
  booktitle =    "Computer Security Foundation Workshop III",
  month =        jun,
  year =         "1990",
}

@Article{Lat90,
  author =       "David L. Lathrop",
  title =        "Perestroika and its implications for Computer Security
                 in the {U.S.S.R.}",
  journal =      "Computers and Security",
  volume =       "9",
  month =        dec,
  year =         "1990",
}

@TechReport{LB91,
  author =       "Linda Lankewicz and Mark Benard",
  title =        "Real-Time Anomaly Detection Using a Nonparametric
                 Pattern Recognition Approach",
  institution =  "Tulane University, Department of Computer Science",
  number =       "TUTR 91-106",
  year =         "1991",
}

@InProceedings{LB92,
  author =       "Kwok-Yan Lam and Thomas Beth",
  title =        "Timely Authentication in Distributed Systems",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "293--306",
  year =         "1992",
}

@Article{Lee90,
  author =       "P. J. Lee",
  title =        "Secure User Access Control for Public Networks",
  journal =      "Lecture Notes in Computer Science",
  volume =       "453",
  year =         "1990",
}

@InProceedings{LG92,
  author =       "Kwok-Yan Lam and Dieter Gollmann",
  title =        "Freshness Assurance of Authentication Protocols",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "261--272",
  year =         "1992",
}

@InProceedings{LH90,
  author =       "T. F. Lunt and D. Hsieh",
  title =        "The SeaView Secure Database System : {A} Progress
                 Report",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "3--14",
  year =         "1990",
}

@Article{LHM84,
  author =       "C. E. Landwehr and C. L. Heitmeyer and J. McLean",
  title =        "A Security Model for Military Message System",
  journal =      "ACM Trans. Comput. Syst.",
  volume =       "2",
  pages =        "198--222",
  year =         "1984",
}

@Misc{Lin90,
  author =       "T. Y. Lin",
  title =        "Probalistic Measure on Aggregations",
  editor =       "IEEE",
  year =         "1990",
}

@InProceedings{LJ88,
  author =       "T. F. Lunt and R. Jagannathan",
  title =        "A Prototype Real-Time Intrusion-Detection Expert
                 System",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "59--66",
  year =         "1988",
}

@InProceedings{LK89,
  author =       "Z. L. Lichtman and J. F. Kimmins",
  title =        "An Audit Trail Reduction Paradigm Based on Trusted
                 Processes",
  booktitle =    "Proceedings of the 13th National Computer Security
                 Conference",
  year =         "1989",
}

@Article{Llo90,
  author =       "Ivor Lloyd",
  title =        "Software Evaluation in High Integrity Systems",
  journal =      "Computers and Security",
  volume =       "9",
  month =        aug,
  year =         "1990",
}

@Book{LLT87,
  author =       "J. M. Lamere and Y. Leroux and J. Tourly",
  title =        "La s\'{e}curit\'{e} des r\'{e}seaux : {M}\'{e}thodes
                 et techniques",
  publisher =    "DUNOD",
  year =         "1987",
}

@Article{LR92,
  author =       "D. Longley and S. Rigby",
  title =        "An Automatic Search for Security Flaws in Key
                 Management Schemes",
  journal =      "Computer and Security",
  volume =       "11",
  number =       "1",
  pages =        "75--89",
  month =        may,
  year =         "1992",
}

@Article{LS90,
  author =       "W. P. Lu and M. K. Sundareshan",
  title =        "A Model for Multilevel Security in Computer Networks",
  journal =      "IEEE trans. on software",
  volume =       "16",
  number =       "6",
  month =        jun,
  year =         "1990",
}

@InProceedings{LTBS90,
  author =       "E. S. Lee and B. Thomson and P. I. P. Boulton and M.
                 Stumm",
  title =        "An Architecture for a Trusted Network",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "105--116",
  year =         "1990",
}

@Article{Lun89,
  author =       "Teresa F. Lunt",
  title =        "Access Control Policies : Some unanswered Questions",
  journal =      "Computers and Security",
  volume =       "8",
  month =        feb,
  year =         "1989",
}

@Article{Lun93,
  author =       "Teresa F. Lunt",
  title =        "A Survey of Intrusion Detection techniques",
  journal =      "Computers and Security",
  volume =       "12",
  year =         "1993",
}

@Article{LV92,
  author =       "G. E. Liepins and H. S. Vaccaro",
  title =        "Intrusion Detection: Its Role and Validation",
  journal =      "Computers and Security",
  volume =       "11",
  pages =        "347--355",
  year =         "1992",
}

@InProceedings{Mal.90,
  author =       "N. McAuliffe and D. Wolcott and L. Schaefer and N.
                 Kelem and B. Hubbard and T. Haluey",
  title =        "Is your Computer Being Misused? {A} Survey of Current
                 Intrusion Detection System Technology",
  booktitle =    "Proceedings of the IEEE Computer Security Applications
                 Conference",
  pages =        "260--272",
  year =         "1990",
}

@InProceedings{Mat85,
  author =       "B. G. Matley",
  title =        "Computer Privacy in America: Conflicting Practices and
                 Policy Choises",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "219--223",
  year =         "1985",
}

@Article{Mcc90,
  author =       "D. MC. Cullough",
  title =        "A Hookup Theorem for Multilevel Security",
  journal =      "IEEE Trans. on Soft. Engineering",
  volume =       "16",
  number =       "6",
  month =        jun,
  year =         "1990",
}

@InProceedings{Mcl88,
  author =       "J. McLean",
  title =        "The Algebra of Security",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  month =        apr,
  year =         "1988",
}

@InProceedings{Me93b,
  author =       "Ludovic M\'e",
  title =        "Security Audit Trail Analysis Using Genetic
                 Algorithms",
  booktitle =    "Proceedings of the 12th International Conference on
                 Computer Safety, Reliability and Security",
  pages =        "329--340",
  month =        oct,
  year =         "1993",
}

@InProceedings{Mea92,
  author =       "C. Meadows",
  title =        "Using Traces of Procedure Calls to Reason About
                 Composability",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "177--191",
  year =         "1992",
}

@Article{Men90,
  author =       "Belden Menkus",
  title =        "How an 'Audit Trail' Aids in Maintaining Information
                 Integrity...as Illustrated in Retailing",
  journal =      "Computers and Security",
  volume =       "9",
  number =       "2",
  month =        apr,
  year =         "1990",
}

@Article{Men91,
  author =       "B. Menkus",
  title =        "'Hackers': know the adversary",
  journal =      "Computers and Security",
  volume =       "10",
  number =       "5",
  pages =        "405--409",
  month =        aug,
  year =         "1991",
  keywords =     "hacking",
}

@Article{Mer79,
  author =       "P. M. Merlin",
  title =        "Specification and Validation of Protocols",
  journal =      "IEEE Transactions on Communications",
  volume =       "27",
  number =       "11",
  month =        nov,
  year =         "1979",
}

@Article{Mer90a,
  author =       "Lindsay C. J. Mercer",
  title =        "Tailor-made Auditing of Information Systems for the
                 Detection of Fraud",
  journal =      "Computers and Security",
  volume =       "9",
  number =       "1",
  month =        feb,
  year =         "1990",
}

@Article{Mer90b,
  author =       "Lindsay C. J. Mercer",
  title =        "Fraud Detection via Regression Analysis",
  journal =      "Computers and Security",
  volume =       "9",
  number =       "5",
  month =        jun,
  year =         "1990",
}

@Article{MF90,
  author =       "A. M. Myong and K. A. Forcht",
  title =        "The computer hacker: friend or foe?",
  journal =      "Journal of Computer Information Systems",
  volume =       "31",
  number =       "2",
  pages =        "47--49",
  year =         "1990",
  keywords =     "hacking",
}

@Book{MG87,
  author =       "C. Macchi and J. F. {Guilbert and 13 Co-auteurs}",
  title =        "{T}\'{e}l\'{e}informatique",
  publisher =    "DUNOD",
  edition =      "2",
  year =         "1987",
}

@TechReport{MIC90a,
  author =       "MICROSOFT",
  title =        "{L}{AN} Manager : guide de l'administrateur",
  institution =  "MICROSOFT",
  note =         "Documentation technique",
  year =         "1990",
}

@TechReport{MIC90b,
  author =       "MICROSOFT",
  title =        "{LAN} Manager : Manuel de reference de
                 l'administrateur",
  institution =  "MICROSOFT",
  note =         "Documentation technique",
  year =         "1990",
}

@InProceedings{Mic91,
  author =       "Z. Michalewicz",
  title =        "A step towards optimal topology of 'Communication
                 networks'",
  booktitle =    "SPIE - The International Society for Optical
                 Engineering",
  volume =       "1470",
  pages =        "112--22",
  year =         "1991",
}

@PhdThesis{Mic93,
  author =       "J. B. Michael",
  title =        "A Formal Process for Testing the Consistency of
                 Composed Security Policies",
  school =       "George Mason University",
  month =        aug,
  year =         "1993",
}

@Article{Mil89,
  author =       "J. K. Millen",
  title =        "Models of Multilevel Computer Security",
  journal =      "Advance in Computers",
  volume =       "29",
  year =         "1989",
}

@InProceedings{Mil92,
  author =       "J. K. Millen",
  title =        "A Resource Allocation Model for Denial of Service",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "137--147",
  year =         "1992",
}

@Article{ML91,
  author =       "M. Masmoudi and D. E. Lafaye de Micheaux",
  title =        "Les lignes priv\'{e}es virtuelles",
  journal =      "T.S.I.",
  volume =       "10",
  number =       "2",
  year =         "1991",
}

@InProceedings{ML92,
  author =       "J. K. Millen and T. F. Lunt",
  title =        "Security for Object-Oriented Database Systems",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "260--272",
  year =         "1992",
}

@Book{MM82,
  author =       "C. H. Meyer and S. M. Matyas",
  title =        "Cryptography: {A} Guide for the Design and
                 Implementation of Secure Systems",
  publisher =    "John Willey and Sons Publications",
  year =         "1982",
}

@InProceedings{MM92,
  author =       "U. S. Moskowitz and A. R. Miller",
  title =        "The Influence of Delay Upon an Idealized Channel's
                 Bandwidth",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "92--71",
  year =         "1992",
}

@TechReport{MNSS87,
  author =       "S. P. Miller and B. C. Neuman and J. I. Schiller and
                 J. H. Saltzer",
  title =        "{K}erberos Authentication and Authorization System",
  institution =  "MIT Proj. ATHENA, Technical Plan, Section E.2.1",
  month =        dec,
  year =         "1987",
}

@InProceedings{Mos87,
  author =       "L. E. Moser",
  title =        "Graph homomorphisms and the design of secure computer
                 systems",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "88--96",
  year =         "1997",
}

@Article{MS90,
  author =       "Robert A. McKosky and Sajjan G. Shiva",
  title =        "A File Integrity Checking System to Detect and Recover
                 from Program Modification Attacks in Multi-User
                 Computer Systems",
  journal =      "Computers and Security",
  volume =       "9",
  number =       "4",
  month =        may,
  year =         "1990",
}

@Misc{MJM93,
  author =       "J. D. Moffett and D. Jonscher and J. A. McDermid",
  title =        "The Policy Obstacle Course",
  howpublished = "SCHEMA/York/93/1 version 1",
  month =        jul,
  year =         "1993",
}

@InProceedings{MS91,
  author =       "J. B. Michael and E. H. Sibley et al.",
  title =        "A Modeling Paradigm for Representing Intentions in
                 Information Systemes Policy.",
  booktitle =    "First Workshop on Information Technologies and
                 Systems",
  year =         "1991",
}

@InProceedings{MT93,
  author =       "R. Molva and G. Tsudik",
  title =        "Authentication Method with Impersonal Token Cards",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "56--65",
  year =         "1993",
}

@InProceedings{MTVZ92,
  author =       "Refik Molva and Gene Tsudik and Els Van Herreweghen
                 and Stefano Zatti",
  title =        "KryptoKnight Authentication and Key Distribution
                 System",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "155--174",
  year =         "1992",
}

@TechReport{NBS77,
  author =       "National {Bureau of} Standards",
  title =        "Data {E}ncryption {S}tandard",
  institution =  "NBS",
  year =         "1977",
}

@TechReport{NCSC87,
  author =       "{National Computer Security Center} {NCSC}",
  title =        "Trusted {N}etwork {I}nterpretation of the {TCSEC}",
  institution =  "NCSC",
  number =       "NCSC-TG-005",
  month =        jul,
  year =         "1987",
}

@TechReport{NCSC90,
  author =       "{National Computer Security Center} {NCSC}",
  title =        "Trusted {N}etwork {I}nterpretation environments
                 guideline",
  institution =  "NCSC",
  number =       "NCSC-TG-011, vers.1",
  month =        aug,
  year =         "1990",
}

@InProceedings{Nes78,
  author =       "P. G. Nessett",
  title =        "Computer Security Evaluation",
  booktitle =    "Proc. NCC",
  volume =       "47",
  editor =       "AFIPS Press",
  year =         "1978",
}

@Article{Nes87,
  author =       "D. M. Nessett",
  title =        "Factors Affecting Distributed System Security",
  journal =      "IEEE TOSE",
  month =        feb,
  year =         "1987",
}

@Article{NF89,
  author =       "Norme Fran\c{c}çaise",
  title =        "Interconnexion des syst\`{e}mes ouverts",
  journal =      "NF EN 27498 (ISO 7498-1)",
  month =        "ao\^{u}t",
  year =         "1989",
}

@TechReport{NF90,
  author =       "Norme Fran\c{c}çaise",
  title =        "Interconnexion des syst\`{e}mes ouverts : Architecture
                 de s\'{e}curit\'{e}",
  institution =  "ISO",
  number =       "NF ISO 7498-2",
  month =        "septembre",
  year =         "1990",
}

@Article{NOP87,
  author =       "D. B. Newman and J. K. Omura and R. L. Pickholtz",
  title =        "Public Key Management for Network Security",
  journal =      "IEEE Network Magazine",
  volume =       "1",
  number =       "2",
  month =        apr,
  year =         "1987",
}

@Article{NS78,
  author =       "R. M. Needham and M. D. Schroeder",
  title =        "Using encryption for authentication in large networks
                 of computers",
  journal =      "ACM",
  volume =       "21",
  number =       "12",
  year =         "1978",
}

@Article{OA90,
  author =       "Ingrid M. Olson and Marshall D. Abrams",
  title =        "Computer Access Control Policy Choices",
  journal =      "Computers and Security",
  volume =       "9",
  month =        dec,
  year =         "1990",
}

@InProceedings{Oha90,
  author =       "C. O'halloran",
  title =        "A Calculus of Information Flow",
  booktitle =    "Acte de ESORICS 90, Toulouse",
  pages =        "147--159",
  month =        oct,
  year =         "1990",
}

@Article{OT89,
  author =       "E. Okamoto and K. Tanaka",
  title =        "Identity-Based Information Security Management System
                 for Personal Computer Networks",
  journal =      "IEEE Journal on Selected Areas in Communications",
  volume =       "7",
  number =       "2",
  month =        feb,
  year =         "1989",
}

@TechReport{PA??,
  author =       "A. Pfitzmann and R. Assmann",
  title =        "Efficient Software Implementations of (Generalized)
                 {DES}",
  institution =  "Univ. KARLSRUHE",
  year =         "??",
}

@InProceedings{Pat90,
  author =       "J. Patarin",
  title =        "Pseudorandom Permutations based on the {D.E.S.}
                 Scheme",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "185--190",
  year =         "1990",
}

@InProceedings{PDJ93,
  author =       "F. Piessens and B. De Decker and P. Janson",
  title =        "Interconnecting Domains with Heterogeneous Key
                 Distribution",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "66--81",
  year =         "1993",
}

@TechReport{Pel90,
  author =       "Christian Pelissier",
  title =        "Guide de s\'{e}curit\'{e} pour les administrateurs de
                 syst\`{e}mes {UNIX}",
  institution =  "ONERA : Rapport interne",
  year =         "1990",
}

@Misc{Pel92,
  author =       "Christian Pelissier",
  title =        "Guide de s\'{e}curit\'{e} pour des syst\`{e}mes
                 {UNIX}",
  howpublished = "Draft, 22 juillet, 1992",
  month =        "juillet",
  year =         "1992",
}

@InProceedings{Per92a,
  author =       "G{\"u}nther Pernul",
  title =        "Security Constraint Processing in Multilevel Secure
                 {AMAC} Schemata",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "349--372",
  year =         "1992",
}

@TechReport{Per92b,
  author =       "O. Perret",
  title =        "La s\'{e}curit\'{e} certifi\'{e}e sous {UNIX}, \`{a}
                 partir d'une exp\'{e}rience sur {S}un{OS MLS}",
  institution =  "ENSTA : Rapport interne",
  year =         "1991",
}

@Misc{PG??,
  author =       "J. C. Pailles and M. Girault",
  title =        "A Public Key Based Solution for Secured Data",
  howpublished = "Communications",
  year =         "??",
}

@Article{PH90,
  author =       "R. Paans and I. S. Herschberg",
  title =        "Auditing the Change Management Process",
  journal =      "Computers and Security",
  volume =       "9",
  number =       "2",
  month =        apr,
  year =         "1990",
}

@Article{Pic87,
  author =       "J. Picciotto",
  title =        "The Design of an Effective Auditing Subsystem",
  journal =      "IEEE",
  year =         "1987",
}

@Article{Pre89,
  author =       "C. M. Preston",
  title =        "Artificial Intelligence Applied to Information System
                 Security",
  journal =      "Information Age (Guildford)",
  volume =       "11",
  number =       "411",
  pages =        "217--224",
  year =         "1989",
}

@Article{PS91,
  author =       "D. Pottas and S. H. von Solms",
  title =        "A Computerized Management Reporting Aid for a
                 Mainframe Security System",
  journal =      "Computers and Security",
  volume =       "10",
  month =        oct,
  year =         "1991",
}

@Book{PSRH85,
  author =       "G. Pujolle and D. Serret and D. Dromard and E.
                 Horlait",
  title =        "{R}\'{e}seaux et {T}\'{e}l\'{e}matique, Tomes 1 et 2",
  publisher =    "EYROLLES",
  year =         "1985",
}

@Article{PW88,
  author =       "L. G. Pierson and E. L. Witzke",
  title =        "A Security Methodology for Computer Networks",
  journal =      "ATT Technical Journal",
  pages =        "28--36",
  month =        may,
  year =         "1988",
}

@InProceedings{QSKLG93,
  author =       "X. Qian and M. Sticket and P. D. Karp and T. F. Lunt
                 and T. D. Garvey",
  title =        "Relational Database Systems",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "196--205",
  year =         "1993",
}

@Article{Ram90,
  author =       "Raju Ramaswamy",
  title =        "A key Management Algorithm for Secure Communication in
                 Open Systems Interconnection Architecture",
  journal =      "Computers and Security",
  volume =       "9",
  month =        feb,
  year =         "1990",
}

@InProceedings{Ran90,
  author =       "G. Randell",
  title =        "A Case Study in the Formal Rafinement of a Distributed
                 Secure System",
  booktitle =    "Acte de ESORICS 90, Toulouse",
  pages =        "201--208",
  month =        oct,
  year =         "1990",
}

@InProceedings{RBG92,
  author =       "M. Reiter and K. Birman and L. Gong",
  title =        "Integrating Security in a Group Oriented Distributed
                 System",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "18--32",
  year =         "1992",
}

@Article{RC77,
  author =       "R. C. Read and D. G. Corneil",
  title =        "The Graph Isomorphism Disease",
  journal =      "Journal of Graph Theory",
  volume =       "1",
  year =         "1977",
}

@Misc{Rey91,
  author =       "J. K. Reynolds",
  title =        "The helminthiasis of the Internet",
  howpublished = "Elsevier Science Publishers B.V. Ed.",
  year =         "1991",
}

@InProceedings{RG93,
  author =       "M. Reiter and L. Gong",
  title =        "Preventing Denial and Forgery of Causal Relationships
                 in Distributed Systems",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "30--40",
  year =         "1993",
}

@Article{RMS89,
  author =       "Bruce L. Riddle and Murray S. Miron and Judith A.
                 Semo",
  title =        "Passwords in Use in a University Timesharing
                 Environment",
  journal =      "Computers and Security",
  volume =       "8",
  month =        nov,
  year =         "1989",
}

@Article{RMV94,
  author =       "Pierre Rolin and Ludovic M\'{e} and Jos\'{e} Vazquez",
  title =        "{S}\'{e}curit\'{e} des syst\`{e}mes informatiques",
  journal =      "R\'{e}seaux et Informatique Repartie",
  year =         "1994",
  pages =        "31--74",
}

@Book{Rol89,
  author =       "Pierre Rolin",
  title =        "{R}\'{e}seaux locaux : Normes et protocoles",
  publisher =    "HERMES",
  edition =      "2",
  year =         "1989",
}

@InProceedings{Rol91,
  author =       "Pierre Rolin",
  title =        "Architecture d'un r\'{e}seau de confiance",
  booktitle =    "CFIP 91",
  year =         "1991",
}

@Article{Rou85,
  author =       "C. C. Rous",
  title =        "What makes hackers tick? {A} computer owner's guide",
  journal =      "CIPS Review",
  volume =       "9",
  number =       "4",
  pages =        "14--15",
  month =        jul,
  year =         "1985",
  keywords =     "hacking",
}

@Article{RR83,
  author =       "J. Rushby and B. Randell",
  title =        "A Distributed Secure System",
  journal =      "Computer",
  volume =       "16",
  number =       "7",
  pages =        "5--67",
  year =         "1983",
}

@Article{RSA78a,
  author =       "R. L. Rivest and A. Shamir and L. Adleman",
  title =        "A Mothod for Obtaining Digital Signatures and
                 Public-key Cryptosystems",
  journal =      "ACM",
  volume =       "2",
  number =       "2",
  month =        feb,
  year =         "1978",
}

@TechReport{RSA78b,
  author =       "R. L. Rivest and A. Shamir and L. Adleman",
  title =        "Mental Poker",
  institution =  "MIT",
  number =       "TM-125",
  month =        nov,
  year =         "1978",
}

@InProceedings{RT92,
  author =       "P. Rolin and L. Toutain",
  title =        "Analyseur de s\'{e}curit\'{e} du r\'{e}seau",
  booktitle =    "Actes du congr\`{e}s De nouvelles architecture pour
                 les communications",
  year =         "1992",
}

@Article{Rus81,
  author =       "J. Rushby",
  title =        "Design and Verification of Secure Systems",
  journal =      "ACM",
  volume =       "15",
  number =       "5",
  pages =        "12--21",
  month =        dec,
  year =         "1981",
}

@InProceedings{Rus85,
  author =       "J. Rushby",
  title =        "Networks are Systems",
  booktitle =    "DOD Computer Security Workshop",
  year =         "1985",
}

@Article{Rus90,
  author =       "D. Russel",
  title =        "High-level Security Architecture and the {K}erberos
                 System",
  journal =      "Computer Networks and ISDN Systems",
  volume =       "19",
  pages =        "201--214",
  year =         "1990",
}

@Misc{Sam85,
  author =       "M. Samociuk",
  title =        "Hacking, or the Art of Armchair Espionage",
  howpublished = "Computer Fraud and Security Bulletin (Amsterdam)
                 Supplement",
  volume =       "7",
  number =       "9",
  year =         "1985",
  keywords =     "hacking",
}

@Article{San88,
  author =       "R. S. Sandhu",
  title =        "The Schematic Protection Model: Its Definition and
                 Analysis for Acyclic Attenuating Schemes",
  journal =      "Association for Computing Machinery",
  volume =       "35",
  number =       "2",
  month =        apr,
  year =         "1988",
}

@InProceedings{San92,
  author =       "R. S. Sandhu",
  title =        "The Typed Access Matrix Model",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "122--136",
  year =         "1992",
}

@Article{Sat89,
  author =       "M. Satyanarayanan",
  title =        "Integrating Security in a Large Distributed System",
  journal =      "ACM TOCS",
  volume =       "7",
  number =       "3",
  pages =        "247--280",
  month =        aug,
  year =         "1989",
}

@Book{SB86,
  author =       "B. Sarikaya and G. Bochmann",
  title =        "Protocol Specification, Testing and Verification,
                 {VI}",
  publisher =    "NORTH-HOLLAND",
  year =         "1986",
}

@InProceedings{Sch85,
  author =       "D. D. Schnackenberg",
  title =        "Development of a Multilevel Secure Local Area
                 Network",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "97--104",
  year =         "1985",
}

@TechReport{Sch91,
  author =       "Herv\'{e} Schauer",
  title =        "La s\'{e}curit\'{e} sous {UNIX}",
  institution =  "CNES",
  year =         "1991",
}

@TechReport{Sch92,
  author =       "Herv\'{e} Schauer",
  title =        "La s\'{e}curit\'{e} des r\'{e}seaux {TCP}/{IP} sous
                 {UNIX}",
  institution =  "Herv\'{e} Schauer Consultant",
  year =         "1992",
}

@TechReport{Scs90a,
  author =       "{ Service Central de la S\'{e}curit\'{e} des
                 Syst\`{e}mes d'information } SCSSI",
  title =        "Crit\`{e}res d'\'{e}valuation de la s\'{e}curit\'{e}
                 des syst\`{e}mes informatiques ({ITSEC})",
  institution =  "SCSSI",
  year =         "1990",
}

@TechReport{Scs90b,
  author =       "{Service Central de la S\'{e}curit\'{e} des
                 Syst\`{e}mes d'information} {SCSSI}",
  title =        "Glossaire de la s\'{e}curit\'{e} des syst\`{e}mes
                 d'information",
  institution =  "SCSSI",
  number =       "CNTI/CN 27, N23",
  month =        "octobre",
  year =         "1990",
  keyword =      "glossary",
}

@Misc{Cec91,
  author =       "{ Commission of the European Communities }",
  title =        "Information Technology Security Evaluation Criteria
                 ({ITSEC}), version 1.2",
  month =        jun,
  year =         "1991",
}

@TechReport{Scs92,
  author =       "{Service Central de la S\'{e}curit\'{e} des
                 Syst\`{e}mes d'information} {SCSSI}",
  title =        "{D}\'{e}veloppement de syst\`{e}mes d'information
                 s\'{e}curis\'{e}s ({DSIS})",
  institution =  "SCSSI",
  month =        "septembre",
  year =         "1992",
}

@TechReport{SD89,
  author =       "Bruno Struif and G. M. D Darmstadt",
  title =        "Concepts Applications Activities",
  institution =  "TELETRUST International Publication",
  month =        mar,
  year =         "1989",
}

@Misc{Sec91,
  title =        "Actes de {SECURICOM}'91",
  howpublished = "SECURICOM",
  year =         "1991",
}

@Misc{SF89,
  author =       "J. E. Shimp and J. Filsinger",
  title =        "Implementation of a Capabilities Knowledge Base for
                 Data Integrity",
  howpublished = "IEEE CH2674-5/89/0000-0283",
  year =         "1989",
}

@InProceedings{SG82,
  author =       "D. P. Sidhu and M. Gasser",
  title =        "A Multilevel Secure Local Area Network",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 privacy",
  year =         "1982",
}

@InProceedings{SG90,
  author =       "S. W. Shieh and V. D. Gligor",
  title =        "Auditing the Use of Covert Storage Channels in Secure
                 Systems",
  booktitle =    "Proceedings of the IEEE Symposium on Research in
                 Security and Privacy, Oakland, CA",
  month =        may,
  year =         "1990",
}

@Article{SG91,
  author =       "S. W. Shieh and V. D. Gligor",
  title =        "A Pattern-Oriented Intrusion-Detection Model and its
                 Applications",
  journal =      "IEEE",
  year =         "1991",
}

@InProceedings{SG92,
  author =       "S. G. Stubblebine and V. D. Gligor",
  title =        "On Message Integrity in Cryptographic Protocols",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "85--104",
  year =         "1992",
}

@InProceedings{SG93,
  author =       "S. G. Stubblebine and V. D. Gligor",
  title =        "Protocol Design for Integrity Protection",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "41--55",
  year =         "1993",
}

@Article{Sha49,
  author =       "C. E. Shannon",
  title =        "Communication Theory of Secure Systems",
  journal =      "Bell System Technical Journal",
  volume =       "28",
  year =         "1949",
}

@Misc{Shi82,
  author =       "R. W. Shirey",
  title =        "Security in Local Area Networks",
  howpublished = "IEEE CH1811-9/82/0000/0028\$00.75",
  year =         "1982",
}

@Misc{Shi89,
  author =       "R. W. Shirey",
  title =        "Security in Local Area Networks",
  howpublished = "??",
  year =         "1989",
}

@Article{Sim89,
  author =       "G. J. Simmons",
  title =        "A Protocol to Provide Verifiable Proof of Identity and
                 Unforgeable transaction Receipts",
  journal =      "IEEE Journal on Selected Areas in Communications",
  volume =       "7",
  number =       "4",
  month =        may,
  year =         "1989",
}

@InProceedings{SJ92,
  author =       "Ravi S. Sandhu and Sushil Jajodia",
  title =        "Polyinstantiation for Cover Stories",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "307--328",
  year =         "1992",
}

@InProceedings{SK90,
  author =       "Z. Savic and M. Komocar",
  title =        "Security Kernel Design and Implementation in the {IBM}
                 {PC} Environment",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "61--70",
  year =         "1990",
}

@InProceedings{SM93,
  author =       "P. Syverson and C. Meadows",
  title =        "A Logical Language for Specifying Cryptographic
                 Protocol Requirements",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "165--177",
  year =         "1993",
}

@InProceedings{Sma88,
  author =       "S. E. Smaha",
  title =        "Haystack: An Intrusion Detection System",
  booktitle =    "Proceedings of the 4th Aerospace Computer Security
                 Application Conference",
  pages =        "37--44",
  month =        dec,
  year =         "1988",
}

@InProceedings{Sne92,
  author =       "E. Snekkenes",
  title =        "Roles in Cryptographic Protocols",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "105--121",
  year =         "1992",
}

@Article{Sny81,
  author =       "L. Snyder",
  title =        "Formal Models of Capability-Based Protection
                 Stystems",
  journal =      "IEEE trans. comput",
  volume =       "C30",
  number =       "3",
  year =         "1981",
}

@Book{Spi89,
  author =       "J. M. Spivey",
  title =        "The {Z} Notation : a reference Manual",
  publisher =    "C.A.R. Hoare Series Editor",
  year =         "1989",
}

@InProceedings{SS92,
  author =       "R. S. Sandhu and G. S. Suri",
  title =        "Non-Monotonic Transformation of Access Rights",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "148--163",
  year =         "1992",
}

@Misc{Ste??,
  author =       "Jacques Stern",
  title =        "La complexit\'{e} comme fondement de la cryptographie
                 moderne",
  howpublished = "S\'{e}minaire : la cryptographie, fondements,
                 applications, perspectives",
  year =         "??",
}

@InProceedings{STH85,
  author =       "R. Schell and T. F. Tao and M. Heckman",
  title =        "Disingning the {GEMSOS} Security Kernel for Security
                 and Performance",
  booktitle =    "8th NCSC",
  pages =        "108--119",
  year =         "1985",
}

@Misc{Sto81,
  author =       "A. Stoughton",
  title =        "Acces Flow : {A} Protection Model Which Integrates
                 Access Control and Information Flow",
  howpublished = "IEEE CH1629-5/81/0000/0009\$00.75",
  year =         "1981",
}

@Article{Sto88,
  author =       "C. Stoll",
  title =        "Stalking the wily hacker",
  journal =      "Communications of the ACM",
  volume =       "31",
  number =       "5",
  pages =        "484--97",
  month =        may,
  year =         "1988",
  keywords =     "hacking",
}

@TechReport{SUN90a,
  author =       "SUN Microsystems",
  title =        "{S}un{OS} {MLS} Programmer's Guide",
  institution =  "Sun : documentation technique",
  month =        jan,
  year =         "1990",
}

@TechReport{SUN90b,
  author =       "SUN Microsystems",
  title =        "{S}un{OS} {MLS} System administrator",
  instituion =   "SUN",
  note =         "Chapitre 17 : Auditing, Sun : documentation
                 technique",
  month =        jan,
  year =         "1990",
}

@InProceedings{Sut86,
  author =       "D. Sutherland",
  title =        "A Model of Information",
  booktitle =    "9th National Computer Security Conference.",
  year =         "1986",
}

@InProceedings{TA91,
  author =       "J. J. Tardo and K. Alagappan",
  title =        "{SPX} - Global Authentication Using Public-Key
                 Certificates",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  year =         "1991",
}

@InProceedings{TCL90,
  author =       "H. S. Teng and K. Chen and S. C.-Y. Lu",
  title =        "Adaptive Real-Time Anomaly Detection using Inductively
                 Generated Sequential Patterns",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  month =        may,
  year =         "1990",
}

@Article{TGC90,
  author =       "C. Tsai and V. D. Gligor and C. S. Chandersekaran",
  title =        "On the Identification of Covert Storage Channels in
                 Secure Systems",
  journal =      "IEEE Transactions on Software Engineering",
  month =        jun,
  year =         "1990",
}

@InProceedings{TH90,
  author =       "A. Tarah and C. Huitema",
  title =        "{CHIMAERA} : {A} Network Security Model",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "127--134",
  year =         "1990",
}

@InProceedings{TH92,
  author =       "Anas Tarah and Christian Huitema",
  title =        "Associating Metrics to Certification Paths",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "175--192",
  year =         "1992",
}

@Article{TI89,
  author =       "S. Tsujii and T. Itoh",
  title =        "An {ID}-Based Cryptosystem Based on the Discrete
                 Logarithm Problem",
  journal =      "IEEE Journal on Selected Areas in Communications",
  volume =       "7",
  number =       "4",
  month =        may,
  year =         "1989",
}

@InProceedings{TLBL90,
  author =       "B. Thomson and E. S. Lee and P. I. P. Boulton and D.
                 M. Lewis",
  title =        "Using Deducibility in Secure Network Modelling",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "117--124",
  year =         "1990",
}

@InProceedings{Tou92,
  author =       "Marie-Jeanne Toussaint",
  title =        "Separating the Specification and Implementation Phases
                 in Cryptology",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "77--102",
  year =         "1992",
}

@InProceedings{TR92,
  author =       "K. Tibourtine and P. Rolin",
  title =        "Distribution de cl\'{e}s pour s\'{e}curiser les
                 Communications des {RPC}",
  booktitle =    "Actes de la convention {UNIX} 92",
  month =        "mars",
  year =         "1992",
}

@Misc{Tribunix8-42-43,
  title =        "Tribunix, No 42 et 43",
  howpublished = "AFUU",
  year =         "1992",
  note =         "contient article LM/VA sur audit AIX",
}

@InProceedings{Tro93,
  author =       "J. T. Trostle",
  title =        "Modelling a Fuzzy Time System",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "82--89",
  year =         "1993",
}

@InProceedings{TS90,
  author =       "Gene Tsudik and R. Summers",
  title =        "Aud{ES}: An Expert System for Security Auditing",
  booktitle =    "Proceedings of the AAAI Conference on Innovative
                 Application in Artificial Intelligence",
  month =        may,
  year =         "1990",
}

@TechReport{Tsu88,
  author =       "Gene Tsudik",
  title =        "An Expert System for Security Auditing",
  institution =  "IBM Los Angeles Scientific Software",
  year =         "1988",
}

@InProceedings{Tsu92,
  author =       "Gene Tsudik",
  title =        "Policy Enforcement in Stub Autonomous Domains",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "229--260",
  year =         "1992",
}

@InProceedings{TY90,
  author =       "LC. N. Tseung and K. C. Yu",
  title =        "Guaranteed, Reliable, Secure Broadcast Networks",
  booktitle =    "proceedings of the IEEE",
  pages =        "576--583",
  year =         "1990",
}

@Article{Var89,
  author =       "Vijay Varadharajan",
  title =        "Verification of Network Security Protocols",
  journal =      "Computers and Security",
  volume =       "8",
  month =        dec,
  year =         "1989",
}

@Article{Var90a,
  author =       "Vijay Varadharajan",
  title =        "Network Security Policy Models",
  journal =      "Lecture Notes in Computer Science",
  volume =       "453",
  pages =        "74--95",
  year =         "1990",
}

@Misc{Var90b,
  author =       "Vijay Varadharajan",
  title =        "Petri Net Based Modelling of Information Flow Security
                 Requirements",
  howpublished = "IEEE Catalog Number 90TH0315-2",
  year =         "1990",
}

@InProceedings{Var90c,
  author =       "Vijay Varadharajan",
  title =        "A Petri Net Framework for Modelling Information Flow
                 Security Policies",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "125--126",
  year =         "1990",
}

@InProceedings{Vaz93,
  author =       "J. Vazquez-Gomez",
  title =        "Modelling Multidomain Security",
  booktitle =    "The New Security Paradigms Workshop II",
  year =         "1993",
}

@Article{VK83,
  author =       "V. L. Voydock and S. T. Kent",
  title =        "Security Mechanisms in High Level Network Protocols",
  journal =      "ACM Computing Surveys",
  pages =        "135--171",
  month =        jun,
  year =         "1983",
}

@Article{VK84,
  author =       "V. L. Voydock and S. T. Kent",
  title =        "Security Mechanisms in a Transport Layer Protocol",
  journal =      "Computer Networks",
  volume =       "8",
  pages =        "433--450",
  year =         "1984",
}

@Article{VK85,
  author =       "V. L. Voydock and S. T. Kent",
  title =        "Security in High Level Network Protocols",
  journal =      "IEEE Comm.",
  pages =        "12--24",
  month =        jul,
  year =         "1985",
}

@InProceedings{VL89,
  author =       "H. S. Vaccaro and G. E. Liepins",
  title =        "Detection of Anomalous Computer Session Activity",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  month =        may,
  year =         "1989",
}

@InProceedings{Wal85,
  author =       "S. T. Walker",
  title =        "Network Security Overview",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "62--76",
  year =         "1985",
}

@TechReport{War70,
  author =       "W. H. Ware",
  title =        "Security Controls for Computer Systems",
  booktitle =    "Report on Defense Science Board Task Force on Compter
                 Security",
  number =       "R-609-1",
  year =         "1970",
}

@InProceedings{WB90,
  author =       "W. R. E. Weiss and A. Bauer",
  title =        "Analysis of Audit and protocol Data using Methods from
                 Artificial Intelligence",
  booktitle =    "Proceedings of the 13th National Computer Security
                 Conference",
  month =        oct,
  year =         "1990",
}

@Article{WC90,
  author =       "S. R. White and L. Comerford",
  title =        "{ABYSS}: An Architecture for Software Protection",
  journal =      "IEEE Trans. on Soft. Engineering",
  volume =       "16",
  number =       "6",
  month =        jun,
  year =         "1990",
}

@InProceedings{WD87,
  author =       "J. C. Williams and S G. W. Dinolt",
  title =        "A graph-theoretic formulation of multilevel secure
                 distributed systems: an overview",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "97--103",
  year =         "1987",
}

@InProceedings{Wei69,
  author =       "C. Weissman",
  title =        "Security controls in the {ADEPT} 50 time system",
  booktitle =    "AFIPS fall joint computer conference",
  year =         "1969",
}

@InProceedings{Wei92,
  author =       "C. Weissman",
  title =        "{BLACKER} : security for the {DDN}, Examples of {A1}
                 Security Engineering Trades",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "286--292",
  year =         "1992",
}

@Article{WFZ92,
  author =       "J. Wu and E. B. Fernandez and R. Zhang",
  title =        "Some Extensions to the Lattice Model for Computer
                 Security",
  journal =      "Computer and Security",
  volume =       "11",
  year =         "1992",
}

@InProceedings{WG92,
  author =       "Michael Wang and Andrzej Goscinski",
  title =        "The Development and Testing of the Identity-Based
                 Conference Key Distribution System for the {RHODOS}
                 Distributed System",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "209--228",
  year =         "1992",
}

@Article{Whi89,
  author =       "C. E. White",
  title =        "Viruses and worms: a campus under attack",
  journal =      "Computer and security",
  volume =       "8",
  month =        jun,
  year =         "1989",
  keywords =     "hacking",
}

@Article{Wing90,
  author =       "J. M. Wing",
  title =        "A Specifier's Introduction to Formal Methods",
  journal =      "IEEE Computer",
  year =         "1990",
}

@InProceedings{Win90,
  author =       "J. R. Winkler",
  title =        "A {UNIX} Prototype for Intrusion Detection and Anomaly
                 Detection in Secure Networks",
  booktitle =    "Proceedings of the 13th National Computer Security
                 Conference",
  year =         "1990",
}

@InProceedings{Win92,
  author =       "J. R. Winkler",
  title =        "Intrusion and Anomaly Detection; {ISOA} Update",
  booktitle =    "Proceedings of the 15th National Computer Security
                 Conference",
  year =         "1992",
}

@Article{Wit87,
  author =       "I. H. Witten",
  title =        "Computer (In)security : Infiltrating Open Systems",
  journal =      "Abacus",
  address =      "New York",
  volume =       "4",
  number =       "4",
  pages =        "7--25",
  year =         "1987",
  keywords =     "hacking",
}

@Article{WL92a,
  author =       "Y. C. Win and S. Lam",
  title =        "Authentication for Distributed Systems",
  journal =      "Computer",
  month =        jan,
  year =         "1992",
}

@InProceedings{WL92b,
  author =       "T. Y. C. Woo and S. S Lam",
  title =        "Authorization in Distributed Systems : {A} formal
                 Approach",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "33--51",
  year =         "1992",
}

@InProceedings{WL93,
  author =       "T. Y. C. Woo and S. S. Lam",
  title =        "A Semantic Model for Authentification Protocols",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "178--195",
  year =         "1993",
}

@Article{Wol89,
  author =       "M. Wolf",
  title =        "Covert Channels in {LAN} Protocols",
  journal =      "Lecture Notes in Computer Science, Local Area Network
                 Security",
  volume =       "396",
  year =         "1989",
}

@Article{Woo84,
  author =       "C. C. Wood",
  title =        "Countering Unauthorized Systems Accesses",
  journal =      "Journal of Systems Management",
  month =        apr,
  year =         "1984",
}

@TechReport{WQ??,
  author =       "D. de Waleffe and J. J. Quisquater",
  title =        "Better Login Protocols for Computer Networks",
  institution =  "IBM",
  number =       "LGE 08",
  pages =        "163",
  year =         "??",
}

@InProceedings{WQ90,
  author =       "D. de Waleffe and J. J. Quisquater",
  title =        "Better login protocol for computer networks",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "163--172",
  year =         "1990",
}

@Article{X90,
  author =       "{XXX article non sign\'{e} }",
  title =        "La s\'{e}curit\'{e} informatique et son livre orange",
  journal =      "G\'{e}nie Logiciel et Syst\`{e}mes Experts",
  volume =       "19",
  month =        "juin",
  year =         "1990",
}

@InProceedings{Yaz90,
  author =       "K. Yazdanian",
  title =        "Relational Database Granularity",
  booktitle =    "European Symposium on Research in Computer Security
                 (ESORICS)",
  pages =        "15--22",
  year =         "1990",
}

@Article{YG90,
  author =       "Ch. Yu and V. D. Gligor",
  title =        "A Specification and Verification Method for Preventing
                 Denial of Service",
  journal =      "IEEE Trans. on Soft. Engineering",
  volume =       "16",
  number =       "6",
  month =        jun,
  year =         "1990",
}

@InProceedings{YKB93,
  author =       "R. Yaholom and B. Klein and T. Beth",
  title =        "Trust Relationships in Secure Systems-{A} Distributed
                 Authentication Perspective",
  booktitle =    "Proceedings of the IEEE Symposium on Security and
                 Privacy",
  pages =        "150--164",
  year =         "1993",
}

@Article{You85,
  author =       "W. D. Young",
  title =        "Proving a Computer System Secure",
  journal =      "Scientific Honeyweller",
  volume =       "6",
  number =       "2",
  month =        jul,
  year =         "1985",
}

@Misc{Sal90,
  author =       "R. Salz",
  title =        "Computer Oracle Passwd System ({COPS})",
  howpublished = "Newsgroup Article",
  year =         "1990",
}

@Article{AM92,
  author =       "Ludovic M\'e and Veronique Alanou",
  title =        "Une exp\'{e}rience d'audit de s\'{e}curit\'{e} sous
                 {AIX R}3.1",
  journal =      "TRIBUNIX",
  page =         "30-38",
  volume =       "8",
  number =       "43",
  year =         "1992",
}

@TechReport{MV91,
  author =       "Ludovic M\'e and Jos\'{e} Vazquez",
  title =        "La s\'{e}curit\'{e} des syst\`{e}mes informatiques :
                 \'{e}tude bibliographique",
  institution =  "SUP\'ELEC/LM",
  number =       "91-001",
  year =         "1991",
}

@PhdThesis{Deb93,
  author =       "Herv\'e Debar",
  title =        "Application des r\'eseaux de neurones \`a la
                 d\'etection d'intrusions sur les syst\`emes
                 informatiques",
  school =       "Universit\'e de Paris 6",
  year =         "1993",
}

@MastersThesis{Por92,
  author =       "Phillip Andrew Porras",
  title =        "A State Transition Analysis Tool For Intrusion
                 Detection",
  school =       "University of California, Santa Barbara",
  year =         "1992",
}

@InProceedings{SSHW88,
  author =       "M. M. Sebring and E. Shellhouse and M. E. Hanna and R.
                 A. Whitehurst",
  title =        "Expert System in Intrusion Detection: {A} Case Study",
  booktitle =    "Proceedings of the 11th National Computer Security
                 Conference",
  pages =        "74--81",
  year =         "1988",
}

@TechReport{MP94,
  author =       "Manel Medina and Enric Peig",
  title =        "Survey of Security Related Application Areas and
                 Objects",
  institution =  "Universitat Polit\`{e}cnica de Catalunya",
  year =         "1994",
}

@TechReport{JV94a,
  author =       "Harold S. Javitz and Alfonso Valdes",
  title =        "The {NIDES} Statistical Component Description and
                 Justification",
  institution =  "SRI",
  number =       "A010",
  year =         "1994",
}

@TechReport{JV94b,
  author =       "Debra Anderson and Teresa Lunt and Harold Javitz and
                 Ann Tamaru and Alfonso Valdes",
  title =        "Safeguard Final Report: Detecting Unusual program
                 Behavior Using the {NIDES} Statistical Component",
  institution =  "SRI",
  year =         "1994",
}

@TechReport{BB93,
  author =       "Jean-Pierre Ban\^{a}tre and Ciar\'{a}n Bryce",
  title =        "A Security Proof System for Netwoks of Communicating
                 Processes",
  institution =  "IRISA",
  number =       "744",
  month =        "juin",
  year =         "1993",
}

@Unpublished{HA93,
  author =       "Stephen E. Hansen and E. Todd Atkins",
  title =        "Centralized System Monitoring With Swatch",
  note =         "Stanford University",
  year =         "1993",
}

@Unpublished{Ben92b,
  author =       "Marc Benveniste",
  title =        "Mod\`{e}le formel de s\'{e}curit\'{e}",
  note =         "Document AQL",
  month =        "novembre",
  year =         "1993",
}

@Unpublished{Nee92,
  author =       "R. M. Needham",
  title =        "Reasoning about Cryptographic Protocols",
  note =         "Document distribu\'{e} lors de ESORICS'92",
  year =         "1992",
}

@InProceedings{Wie92,
  author =       "Michael J. Wiener",
  title =        "Efficient {DES} Key Search",
  booktitle =    "Crypto'92",
  year =         "1992",
}

@Proceedings{NSPW92,
  institution =  "ACM SIGSAC",
  title =        "New Security Paradigms Workshop",
  editor =       "IEEE Computer Society Press",
  year =         "1992",
}

@Proceedings{NSPW93,
  institution =  "ACM SIGSAC",
  title =        "New Security Paradigms Workshop",
  editor =       "IEEE Computer Society Press",
  year =         "1993",
}

@TechReport{CGLP92,
  author =       "B. Courtois and M. C. Gaudel and J. C. Laprie and D.
                 Powell",
  title =        "{S}\^{u}ret\'{e} de fonctionnement informatique",
  institution =  "LAAS",
  number =       "92.382",
  month =        "d\'{e}cembre",
  year =         "1992",
}

@PhdThesis{Me94,
  author =       "Ludovic M\'{e}",
  title =        "Audit de s\'{e}curit\'{e} par algorithmes
                 g\'{e}n\'{e}tiques",
  school =       "Universit\'{e} de Rennes 1 - Num\'{e}ro d'ordre 1069",
  year =         "1994",
}

@InProceedings{Lun90,
  author =       "Teresa Lunt",
  title =        "{IDES}: An intelligent System for Detecting
                 Intruders",
  booktitle =    "Computer Security, Threats and Countermeasures",
  month =        nov,
  year =         "1990",
}

@TechReport{Fal.90,
  author =       "Kevin L. Fox and Ronda R. Henning and Jonathan H. Reed
                 and Richard P. Simonian",
  title =        "A Neural Network Approach Towards Intrusion
                 Detection",
  institution =  "Harris Corporation",
  year =         "1990",
}

@Article{GS92b,
  author =       "C. R Gent and C. P Sheppard",
  title =        "Predicting Time Series by a Fully Connected Neural
                 Network Trained by Back Propagation",
  journal =      "Computing and Control Engineering Journal",
  month =        may,
  year =         "1992",
}

@Article{MS95,
  author =       "David M'Raihi and Bruce Schneider",
  title =        "Taxonomie des algorithmes cryptographiques",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "11--34",
  year =         "1995",
}

@Article{Cat95,
  author =       "Andr\'{e} Cattieuw",
  title =        "Notion de preuve sans transfert de connaissance",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "35--42",
  year =         "1995",
}

@Article{Lep95,
  author =       "Marie-Noelle Lepareux",
  title =        "Introduction aux protocoles z\'{e}ro-connaissance",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "43--52",
  year =         "1995",
}

@Article{Har95,
  author =       "Thierry Harl\'{e}",
  title =        "Pas de syst\`{e}me cryptographique sans gestion de
                 cl\'{e}s",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "53--60",
  year =         "1995",
}

@Article{Rou95,
  author =       "Yves Le Roux",
  title =        "{L}'affaire Clipper, les d\'{e}bats sur le chiffrement
                 aux Etats-Unis",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "61--66",
  year =         "1995",
}

@Article{GUQ95,
  author =       "Louis Guillou and Michel Ugon and Jean-Jacques
                 Quisquater",
  title =        "La carte \`{a} puce, un usage public de la
                 cryptologie",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "67--88",
  year =         "1995",
}

@Article{GT95,
  author =       "Jean-Pierre Georges and Roland Thies",
  title =        "Les services d'authentification et de s\'{e}curit\'{e}
                 dans le {GSM}",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "89--102",
  year =         "1995",
}

@Article{Buf95,
  author =       "Thierry Buffenoir",
  title =        "Fonctions de s\'{e}curit\'{e} pour la
                 t\'{e}l\'{e}copie",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "103--110",
  year =         "1995",
}

@Article{Heb95a,
  author =       "Patrick H\'{e}brard",
  title =        "{X509}, un cadre g\'{e}n\'{e}ral d'authentification",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "111--124",
  year =         "1995",
  keywords =     "authentication X509",
}

@Article{Fra95a,
  author =       "Henri Francesconi",
  title =        "{L}'\'{e}coute des signaux parasites",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "125--128",
  year =         "1995",
}

@Article{Fra95b,
  author =       "Henri Francesconi",
  title =        "La r\'{e}glementation fran\c{c}aise sur la
                 cryptologie",
  journal =      "Syst\`{e}mes et s\'{e}curit\'{e}",
  pages =        "129--136",
  year =         "1995",
}

@InProceedings{Heb95b,
  author =       "Patrick H\'{e}brard",
  title =        "{S}\'{e}curit\'{e} dans les couches basses de
                 l'{OSI}",
  pages =        "111--129",
  year =         "1995",
  booktitle =    "Colloque Francophone sur l'Ing\'{e}nierie des
                 Protocoles",
  address =      "Rennes, France",
  month =        may,
}

@InProceedings{BG95,
  author =       "Christophe Bidan and Sylvain Gombault",
  title =        "La s\'{e}curit\'{e} inter-domaine \`{a} l'aide des
                 analyseurs de s\'{e}curit\'{e}",
  pages =        "131--142",
  year =         "1995",
  booktitle =    "Colloque Francophone sur l'Ing\'{e}nierie des
                 Protocoles",
  address =      "Rennes, France",
  month =        may,
}

@TechReport{JV94,
  author =       "Abdelaziz Mounji and Baudouin Le Charlier and Denis
                 Zampunieris and Naji Habra",
  title =        "Distributed Audit trail Analysis",
  institution =  "Facult\'{e} Universitaire Notre-Dame de la Paix",
  number =       "RP-94-007",
  year =         "1994",
}

@Misc{SGDN90,
  author =       "{Secr\'{e}tariat G\'{e}n\'{e}ral de la D\'{e}fense
                 Nationale}",
  title =        "Protection des informations sensibles ne relevant pas
                 du secret de d\'{e}fense",
  howpublished = "document commun SGDN/DISSI/SCSSI Num\'{e}ro 600",
  month =        "janvier",
  year =         "1990",
}

@Misc{SCSSI94,
  author =       "{Service Central de la S\'{e}curit\'{e} des
                 Syst\`{e}mes Informatiques}",
  title =        "La menace et les attaques informatiques",
  howpublished = "document commun DISSI/SCSSI Num\'{e}ro 650",
  month =        "mars",
  year =         "1994",
}

@InProceedings{Kah95,
  author =       "Jos\'{e} Kahan",
  title =        "A Capability-Based Authorization Model for the {WWW}",
  year =         "1995",
  booktitle =    "WWW'95 Conference",
  address =      "Darmstadt, Germany",
  month =        avril,
}

@InProceedings{Kah94,
  author =       "Jos\'{e} Kahan",
  title =        "Un nouveau mod\'{e}le d'autorisation pour les
                 syst\`{e}mes de consultation d'information
                 multim\'{e}dia r\'{e}partie",
  year =         "1995",
  booktitle =    "Colloque AFCET : o\`{u}, quand, comment prot\'{e}ger
                 vos logiciels et documents \'{e}lectroniques",
  address =      "Paris, France",
  year =         "1994",
  month =        "d\'{e}cembre",
}

@Article{DGKS94,
  author =       "Michel Denault and Dimitris Gritzalis and Dimitris
                 Karagiannis and Paul Spirakis",
  title =        "Intrusion Detection: Approach and Performance Issues
                 of the {SECURENET} System",
  journal =      "Computers and Security",
  volume =       "13",
  pages =        "495--508",
  year =         "1994",
}

@Misc{Mei93,
  author =       "Eric Meillan",
  title =        "Droit de la s\'{e}curit\'{e} des syst\`{e}mes
                 d'information",
  howpublished = "cours fait \`{a} l'ENSTB",
  year =         "1993",
}

@Misc{FL92,
  author =       "Michael Fiey and Xavier Lacassin",
  title =        "Les algorithmes cryptographiques",
  howpublished = "Annexe B, rapport de stage de fin d'\'{e}tude
                 Sup\'{e}lec, Bull Ing\'{e}nierie",
  month =        "juin",
  year =         "1992",
}

@Misc{charte,
  title =        "Charte d'utilisation des moyens informatiques",
}

@Misc{Ham95,
  author =       "Riadh Hamdi",
  title =        "{S}\'{e}curit\'{e} et Internet",
  howpublished = "Rapport de stage de fin d'\'{e}tudes Sup\'{e}lec \`{a}
                 Transpac",
  month =        "juin",
  year =         "1995",
}

@Misc{Gai95,
  author =       "Nicolas Gaillotte",
  title =        "Audit de s\'{e}curit\'{e} sur un {SAS} internet",
  howpublished = "Rapport de stage de fin d'\'{e}tudes ENSTB \`{a} IBM",
  month =        "juin",
  year =         "1995",
}

@TechReport{IBM94,
  title =        "Secured Network Gateway Version 1.2: Installation,
                 Configuration and Administration Guide",
  organization = "IBM",
  edition =      "first",
  year =         "1994",
  month =        dec,
}

@InProceedings{SSH93,
  author =       "David R. Safford and Douglas Lee Schales and David K.
                 Hess",
  title =        "The {TAMU} Security Package: an Ongoing response to
                 the Internet Intruders in an Academic Environment",
  booktitle =    "Proceedings of the Fourth USENIX Security Symposium",
  year =         "1993",
}

@Misc{Muf92,
  author =       "Alec D. E. Muffett",
  title =        "Crack: {A} Sensible Password Checker for Unix",
  howpublished = "from
                 ftp:corton.inria.fr/CERT/tools/crack/crack4.1.tar",
  month =        mar,
  year =         "1992",
}

@PhdThesis{Kum95,
  author =       "Sandeep Kumar",
  title =        "Classification and Detection of Computer Intrusions",
  school =       "Purdue University",
  year =         "1995",
  month =        aug,
}

@TechReport{KS94,
  author =       "Sandeep Kumar and Eugene H. Spafford",
  title =        "An Application of pattern Matching in Intrusion
                 Detection",
  institution =  "Purdue University",
  year =         "1994",
  number =       "CSD-TR-94-013",
  month =        jun,
}

@Masterthesis{Asl95,
  author =       "Taimur Aslam",
  title =        "A taxonomy of Security Faults in the Unix Operating
                 System",
  school =       "Purdue University",
  year =         "1995",
  month =        aug,
}

@TechReport{CB94,
  author =       "Mark Crosbie and Gene Spafford",
  title =        "Defending a Computer System using Autonomous Agents",
  institution =  "Purdue University",
  year =         "1994",
  number =       "95-022",
  month =        mar,
  url =          "http://www.cs.purdue.edu/homes/spaf/tech-reps/9522.ps",
}

@TechReport{CB95,
  author =       "Mark Crosbie and Gene Spafford",
  title =        "Active Defense of a Computer System using Autonomous
                 Agents",
  institution =  "Purdue University",
  year =         "1995",
  number =       "95-008",
  month =        feb,
  url =          "http://www.cs.purdue.edu/homes/spaf/tech-reps/9508.ps",
}

@TechReport{Fra94,
  author =       "Jeremy Frank",
  title =        "Artificial Intelligence and Intrusion Detection:
                 Current and Future Directions",
  institution =  "University of California at Davis",
  year =         "1994",
  number =       "NSA URP MDA904-93-C-4085",
  month =        jun,
}

@Misc{Spa94,
  author =       "Eugene Spafford",
  title =        "Computer Viruses as Artificial Life",
  howpublished = "to appear in the Journal of Artificial Life",
  year =         "1994",
}

@Manual{Zim94,
  title =        "({PGP}) Pretty Good Privacy Encryption System: Users'
                 Guide",
  author =       "Philip Zimmermann",
  year =         "1994",
  month =        aug,
}

@Misc{Rou89,
  author =       "B. Roulin",
  title =        "Sp\'{e}cification de d\'{e}finition d'un {UNIX}
                 s\'{e}curis\'{e}",
  howpublished = "document technique AQL",
  month =        "juin",
  year =         "1989",
}

@Article{MA96,
  author =       "Ludovic M\'{e} and V\'{e}ronique Alanou",
  title =        "{D}\'{e}tection d'intrusions dans un syst\`{e}me
                 informatique~: m\'{e}thodes et outils",
  journal =      "TSI",
  volume =       "15",
  number =       "4",
  pages =        "429--450",
  year =         "1996",
}

@Misc{Tal96,
  author =       "Fran\c{c}ois Tallet",
  title =        "Les firewalls",
  howpublished = "M\'{e}moire MEARI",
  year =         "1996",
}

@Misc{Lig95,
  author =       "Eric Ligaon",
  title =        "Introduction \`{a} la s\'{e}curit\'{e} sous Solaris",
  howpublished = "S\'{e}minaire s\'{e}curit\'{e} SUN",
  year =         "1995",
}

@Misc{BR96,
  author =       "Jean-Jacques Bascou and Jer\^{o}me Romeu",
  title =        "{D}\'{e}tection dynamique d'intrusions : une approche
                 par r\'{e}seau de neurones",
  howpublished = "soumis pour publication \`{a} CFIP'96",
}

@Misc{RR96,
  author =       "Patrick Ragaru and Roberto Ramos",
  title =        "{S}\'{e}curisation d'architecture client-serveur",
  howpublished = "rapport de projet \'{e}tudiant de l'ENSTB",
  month =        "f\'{e}vrier",
  year =         "1996",
  keywords =     "authentication kerberos DCE sesame",
}

@Misc{LR96,
  author =       "S\'{e}bastien Letard and Herv\'{e} racine",
  title =        "Mise en place d'un firewall {IP} sur un site
                 universitaire",
  howpublished = "rapport de projet \'{e}tudiant de l'ENSTB",
  month =        "f\'{e}vrier",
  year =         "1996",
}

@Misc{Sun96,
  author =       "Sun",
  title =        "La s\'{e}curit\'{e} sur Internet",
  howpublished = "Documents remis lors du s\'{e}minaire du 26 mars 1996
                 \`{a} Rennes",
  month =        "mars",
  year =         "1996",
}

@Misc{NM95,
  author =       "David Newmann and Brent Melson",
  title =        "Can Firewall Take the Heat ?",
  howpublished = "Data Communication on the web",
  month =        nov,
  year =         "1995",
}

@Misc{Che91,
  author =       "Bill Cheswick",
  title =        "An Evening with Berferd In Which a Cracker is Lured,
                 Endured, and Studied",
  howpublished = "ATT Bell Laboratories",
  year =         "1991",
}

@PhdThesis{Sam96,
  author =       "Didier Samfat",
  title =        "Architecture de s\'{e}curit\'{e} pour r\'{e}seaux
                 mobiles",
  school =       "Ecole Nationale des T\'{e}l\'{e}communications de
                 Paris",
  year =         "1996",
}

@Misc{Gui95,
  author =       "Louis Guillou",
  title =        "Comprehensive Approach of Zero-Knowledge Techniques",
  howpublished = "ISO/IEC JTC 1/SC 27 N 1185",
  month =        oct,
  year =         "1995",
}

@Misc{Jou96,
  author =       "Manuella Jourdan",
  title =        "{ITSEC}/{ITSEM}",
  howpublished = "M\'{e}moire M\'{e}ari 1995/96",
  year =         "1996",
}

@Misc{Me96a,
  author =       "Ludovic M\'{e}",
  title =        "Genetic Algorithms, a Biologically Inspired Approach
                 for Security Audit Trails Analysis",
  howpublished = "Short paper, 1996 IEEE Symposium on Security and
                 Privacy",
  month =        may,
  year =         "1996",
}

@Article{MAA97,
  author =       "Ludovic M\'{e} and V\'{e}ronique Alanou and Jorg
                 Abraham",
  title =        "Utilisation de cartes de Kohonen pour d\'{e}tecter des
                 intrusions dans un syst\`{e}me informatique : une
                 pr\'{e}-\'{e}tude",
  journal =      "Valgo",
  year =         "1997",
}

@InProceedings{Me96b,
  author =       "Ludovic M\'{e}",
  title =        "{M}\'{e}thodes et outils de la d\'{e}tection
                 d'intrusions",
  booktitle =    "Actes du congr\`{e}s Intelligence Economique et
                 Comp\'{e}titive (IEC)",
  year =         "1996",
}

@TechReport{Bis95,
  author =       "Matt Bishop",
  title =        "A standard audit trail format",
  institution =  "Department of Computer Science, University of
                 California at Davis",
  year =         "1995",
}

@TechReport{CD94,
  author =       "George Coulouris and Jean Dallimore",
  title =        "A Security Model for Cooperative Work",
  institution =  "Queen Mary and Westfield College, Department of
                 Computer Science",
  year =         "1994",
  number =       "674",
  month =        oct,
}

@Misc{Abr95,
  author =       "Jorg Abraham",
  title =        "Etude de l'utilisation de r\'{e}seaux de neurones de
                 type carte de Kohonen pour la d\'{e}tection
                 d'intrusions dans un syst\`{e}me informatique",
  howpublished = "Rappport de stage",
  month =        "mars",
  year =         "1995",
}

@InProceedings{Pro94,
  author =       "Paul Proctor",
  title =        "Audit Reduction and Misuse Detection in Heterogeneous
                 Environments: Framework and Application",
  booktitle =    "Proceedings of the 10th Annual Computer Security
                 Applications",
  year =         "1994",
  month =        dec,
}

@Misc{Hay96,
  author =       "Haystack Labs",
  title =        "Stalker Product Overview",
  howpublished = "Document html~: \verb|http://www.haystack.com/prod/|",
  year =         "1996",
}

@Misc{Sai96,
  author =       "Science Applications International Corporation",
  title =        "{CMDS}: Product Description",
  howpublished = "Document html~:
                 \verb|http://www.saic.com:80/it/cmds|",
  year =         "1996",
}

@Misc{Semper96,
  author =       "Semper European Project",
  title =        "Secure Electonic Marketplace for Europe",
  howpublished = "Document html~: \verb|http://www.semper.org|",
  year =         "1996",
  keywords =     "commerce electronique",
}

@Misc{Jon95,
  author =       "Laurent Joncheray",
  title =        "A Simple Active Attack Against {TCP}",
  month =        apr,
  year =         "1995",
}

@Misc{CGZ96,
  author =       "Mireille Campana and Marc Girault and Gilles
                 Z\'{e}mor",
  title =        "Techniques de s\'{e}curit\'{e} appliqu\'{e}es au
                 courrier \'{e}lectronique et \`{a} Internet",
  howpublished = "France T\'{e}l\'{e}com, Conseil scientifique,
                 M\'{e}mento technique No~7",
  month =        "juin",
  year =         "1996",
}

@Misc{IETF,
  author =       "IETF",
  title =        "Information Technology Security",
  howpublished = "RFC1244",
}

@Article{Gui91,
  author =       "Daniel Guinier",
  title =        "Computer Virus Identification by Neural Networks",
  journal =      "ACM SIGSAC Review",
  year =         "1991",
  volume =       "9",
  number =       "4",
  pages =        "49--59",
}

@InProceedings{Chr96,
  author =       "Abdellatif Chraibi",
  title =        "{V}\'{e}rification des protocoles cryptographiques de
                 signature",
  booktitle =    "Actes du congr\`{e}s CFIP'96",
  year =         "1996",
}

@InProceedings{SRK96,
  author =       "Michael Sobirey and Birk Richter and Hartmut Konig",
  title =        "The Intrusion Detection System {AID}",
  booktitle =    "Proceeding of the Joint Working Conference IFIP TC-6
                 and TC-11: Communication and Multimedia Security",
  year =         "1996",
}

@Misc{Sun95,
  author =       "Sun Microsystems",
  title =        "The HotJava Browser~: a White Paper",
  howpublished = "Document publi\'{e} par Sun",
  year =         "1995",
}

@TechReport{Cur90,
  author =       "David A. Curry",
  title =        "Improving the Security of Your Unix System",
  institution =  "SRI",
  year =         "1990",
  number =       "ITSTD-721-FR-90-21",
  month =        apr,
}

@Article{Rei95,
  author =       "Jim Reid",
  title =        "Open Systems Security: Traps and Pitfalls",
  journal =      "Computers & Security",
  year =         "1995",
  number =       "14",
  pages =        "496--517",
}

@TechReport{Gal87,
  author =       "Patrick R. Gallagher",
  title =        "A Guide to Understandinf Audit in Trusted Systems",
  institution =  "NCSC",
  year =         "1987",
  number =       "NCSC-TG-001",
  month =        jul,
}

@Misc{McM91,
  author =       "Rob McMillan",
  title =        "Site Security Policy Development",
  howpublished = "Security Emergency Response Team, Australia",
  year =         "1991",
}

@Misc{Vou96,
  author =       "Fabien Vouillon",
  title =        "Etude des approches neuronales utilis\'{e}es en
                 d\'{e}tection d'intrusions",
  howpublished = "M\'{e}moire M\'{e}ari, Sup\'{e}lec",
  month =        "mars",
  year =         "1996",
}

@Misc{HSPxx,
  author =       "David K. Hess and David R. Safford and Udo W. Pooch",
  title =        "A Unix Network Protocol Security Study: Network
                 Information Service",
  howpublished = "?",
  month =        "?",
  year =         "?",
}

@Misc{Seexx,
  author =       "Donn Seeley",
  title =        "A Tour of the Worm",
  howpublished = "?",
  month =        "?",
  year =         "?",
}

@Misc{Venxx,
  author =       "Wietse Venema",
  title =        "{TCP} Wrapper",
  howpublished = "?",
  month =        "?",
  year =         "?",
}

@Article{Sch89,
  author =       "Herv\'{e} Schauer",
  title =        "La comptabilit\'{e} {UNIX} System {V}",
  journal =      "Tribunix",
  year =         "1989",
  volume =       "26",
}

@Misc{Bry88,
  author =       "Bill Bryant",
  title =        "Designing an Authentication System: a Dialogue in Four
                 Scenes",
  howpublished = "draft, Athena Project",
  month =        feb,
  year =         "1988",
  keywords =     "authentication kerberos",
}

@Article{Hig90,
  author =       "H. J. Highland",
  title =        "Using and Breaking Encryption",
  journal =      "Computers and Security",
  year =         "1990",
  volume =       "9",
  number =       "8",
  pages =        "668--671",
  keywords =     "encryption emigma",
}

@InBook{Lan83,
  author =       "Bill Landreth",
  title =        "Histoire du piratage informatique",
  chapter =      "2",
  pages =        "27--35",
  publisher =    "\'{e}diteur non connu",
  year =         "1983",
}

@Misc{Dat91a,
  author =       "Datapro Research Group",
  title =        "Unix System Administration and Security",
  howpublished = "Datapro report",
  month =        jan,
  year =         "1991",
}

@Misc{Dat91b,
  author =       "Datapro Research Group",
  title =        "Computer Crime Methods and Detection",
  howpublished = "Datapro report",
  month =        feb,
  year =         "1991",
  keywords =     "hacking",
}

@Article{DMC92,
  author =       "R. Dixon and C. Marston and P. Collier",
  title =        "A Report on the Joint {CIMA} and {IIA} Computer Fraud
                 Survey",
  journal =      "Computers and Security",
  year =         "1992",
  volume =       "11",
  pages =        "307--313",
  keywords =     "hacking",
}

@Article{Hig89,
  author =       "H. J. Highland",
  title =        "A Macro Virus",
  journal =      "Computers and Security",
  year =         "1989",
  volume =       "8",
  number =       "3",
  pages =        "178--188",
}

@Misc{Rol92,
  author =       "Pierre Rolin",
  title =        "{S}\'{e}curit\'{e} des r\'{e}seaux",
  howpublished = "unpublished draft",
  month =        "octobre",
  year =         "1992",
  keywords =     "authentication X509 kerberos chimerae",
}

@Article{GS91,
  author =       "Simson Garfinkel and Gene Spafford",
  title =        "Practical {UNIX} Security",
  journal =      "SunExpert",
  year =         "1991",
  pages =        "68--73",
}

@Proceedings{Franconia90,
  institution =  "IEEE",
  title =        "Proceedings of the Computer Security Foundations
                 Worshop {III}",
  editor =       "IEEE Computer Society Press",
  year =         "1990",
}

@Proceedings{oakland96,
  institution =  "IEEE",
  title =        "Proceedings of the 1996 {IEEE} Symposium on Security
                 and Privacy",
  editor =       "IEEE Computer Society Press",
  year =         "1996",
}

@PhdThesis{Alt92,
  author =       "Anas Altarah",
  title =        "Chimaera~: un mod\`{e}le pour la s\'{e}curit\'{e} des
                 syst\`{e}mes ouverts",
  school =       "Universit\'{e} de Nice Sophia-Antipolis",
  year =         "1992",
  month =        "d\'{e}cembre",
  keywords =     "authentication chimaera",
}

@Proceedings{NCSC16,
  institution =  "NIST-NCSC",
  title =        "Proceedings of the 16th National Computer Security
                 Conference",
  editor =       "?",
  year =         "1993",
}

@Proceedings{oakland94,
  institution =  "IEEE",
  title =        "Proceedings of the 1996 {IEEE} Symposium on Security
                 and Privacy",
  editor =       "IEEE Computer Society Press",
  year =         "1994",
}

@Proceedings{safecomp93,
  institution =  "EWICS",
  title =        "Proceedings of the 12th International Conference on
                 Computer Safety, Reliability and Security",
  editor =       "Springer-Verlag",
  year =         "1993",
}

@PhdThesis{Vaz94,
  author =       "Jos\'{e} V\'{a}zquez G\'{o}mez",
  title =        "Contribution \`{a} la mod\'{e}lisation de la
                 s\'{e}curit\'{e} multidomaine",
  school =       "Universit\'{e} de Rennes 1",
  year =         "1994",
}

@Misc{Mie92,
  author =       "St\'{e}phane Mi\`{e}ge",
  title =        "Codage et s\'{e}curit\'{e} des donn\'{e}es",
  howpublished = "Polycopi\'{e} Sup\'{e}lec No 3943",
  year =         "1992",
}

@Misc{Cho90,
  author =       "Pascal Chour",
  title =        "Cartes \`{a} micro-circuit",
  howpublished = "Polycopi\'{e} Sup\'{e}lec No 3813",
  year =         "1990",
}

@Misc{Ren94,
  author =       "Herv\'{e} renaud",
  title =        "Bases math\'{e}matiques du codage et de la
                 s\'{e}curit\'{e}",
  howpublished = "Polycopi\'{e} Sup\'{e}lec No",
  year =         "1994",
}

@Proceedings{IEC96,
  institution =  "SCIP France and GBDA Europe and OSS Inc.",
  title =        "Intelligence \'{e}conomique et comp\'{e}titive",
  editor =       "sIECa",
  year =         "1996",
}

@InProceedings{Me96c,
  author =       "Ludovic M\'{e}",
  title =        "{M}\'{e}thodes et outils de la d\'{e}tection
                 d'intrusions",
  booktitle =    "Actes du congr\`{e}s Intelligence \'{e}conomique et
                 comp\'{e}titive",
  year =         "1996",
  pages =        "112--126",
  month =        "novembre",
}

@PhdThesis{Kar91,
  author =       "Arto T. Karila",
  title =        "Open Systems Security: An Architectural Framework",
  school =       "Helsinki University of Technology",
  year =         "1991",
}

@Misc{TSI15-4,
  title =        "Technique et science informatique, Vol.15, No 4",
  howpublished = "Hermes",
  year =         "1996",
  note =         "Contient papier LM/VA sur la d\'{e}tection
                 d'intrusions",
}

@Misc{RIR4-1,
  author =       "No 1 {R\'{e}seaux et informatique r\'{e}partie, Vol.
                 4}",
  howpublished = "Hermes",
  year =         "1994",
  note =         "Contient papier LM/JVG/PR sur les modeles",
}

@Misc{JCS1-1,
  author =       "No 1 {Journal of Computer Security, Vol. 1}",
  howpublished = "IOS Press",
  year =         "1992",
}

@Misc{CetDS1-2,
  title =        "Computer and Data Security, Vol. 1, No 2",
  howpublished = "Research Information Ltd",
}

@Misc{CetS9-1,
  title =        "Computers and Security",
  howpublished = "Elsevier Advanced Technology",
  month =        feb,
  year =         "1990",
}

@Proceedings{,
  institution =  "CEN/CENELEC",
  title =        "Security Aspects in {OSI} Functional Standards",
  editor =       "?",
  year =         "1989",
}

@Misc{Dac89,
  author =       "Marc Dacier",
  title =        "La s\'{e}curit\'{e} logique en informatique~:
                 application aux r\'{e}seaux locaux",
  howpublished = "M\'{e}moire pr\'{e}sent\'{e} en vue de l'obtention du
                 grade d'ing\'{e}nieur civil en informatique",
  year =         "1989",
}

@Article{Den96,
  author =       "Dorothy E. Denning",
  title =        "A Taxonomy for Key Escrow Encryption Systems",
  journal =      "Communication of the ACM",
  year =         "1996",
  volume =       "39",
  number =       "3",
  month =        mar,
  keywords =     "tiers de confiance key escrowing",
}

@TechReport{JMW96,
  author =       "d Chris Mitchell Nigel Jefferies a and Michael
                 Walker",
  title =        "Combining {TTP}-based key management with key escrow",
  institution =  "Information Security Group, Royal Holloway, University
                 of London",
  year =         "1996",
  month =        apr,
  keywords =     "tiers de confiance key escrowing",
}

@PhdThesis{Ko96,
  author =       "Calvin C. W. Ko",
  title =        "Execution Monitoring of Security-Critical Programs in
                 Distributed Systems: {A} Specification-based Approach",
  school =       "University of California at Davis",
  year =         "1996",
}

@Misc{Sob96a,
  author =       "Michael Sobirey",
  title =        "Michael Sobirey's Intrusion Detection Page",
  howpublished = "http://www.informatik.tu-cottbus.de/~sobirey/ids.html",
  year =         "1996",
  keywords =     "intrusion detection",
}

@Misc{Sob96b,
  author =       "Michael Sobirey",
  title =        "The Intrusion Detection System {AID}",
  howpublished = "http://www.informatik.tu-cottbus.de/~sobirey/aid-e.html",
  year =         "1996",
  keywords =     "intrusion detection",
}

@InProceedings{GM96,
  author =       "Richard A. Griffith and Mac E. McGregor",
  title =        "Designing and Operating a Multilevel Security Network
                 Using Standard Commercial Products",
  booktitle =    "Proceedings of the 19th National Information Systems
                 Security Conference",
  year =         "1996",
  month =        oct,
  url =          "from
                 http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/readers-guide/NISSC96-paperlist.html",
  keywords =     "Multilevel Security Network",
}

@TechReport{Ber93,
  author =       "Aviv Bergman",
  title =        "Intrusion Detection with Neural Networks",
  institution =  "SRI International",
  year =         "1993",
  number =       "A012",
  month =        feb,
}

@Misc{Hub96,
  author =       "Markus Hubner",
  title =        "{IP} Spoofing Demystified",
  howpublished = "Web doc",
  month =        jun,
  year =         "1996",
  url =          "http://www.geocities.com/CapeCanaveral/3498/security.htm",
}

@InProceedings{ML97,
  author =       "Abdelaziz Mounji and Baudouin Le Charlier",
  title =        "Continuous Assesment of a Unix Configuration:
                 Integrating Intrusion Detection and Configuration
                 Analysis",
  booktitle =    "Proceedings of the IEEE ISOC'97 Symposium on Network
                 and Distributed Systems Security",
  year =         "1997",
  url =          "http://www.info.fundp.ac.be/~amo/publication.html",
  keywords =     "intrusion detection, ASAX",
}

@Misc{CC96,
  title =        "Common Criteria for {IT} Security Evaluation",
  howpublished = "CD-ROM",
  month =        jan,
  year =         "1996",
}

@Article{Jef96,
  author =       "Terry L. Jeffress",
  title =        "The Auditcon Utility",
  journal =      "NetWare Connection",
  year =         "1996",
  pages =        "32--42",
  month =        dec,
}

@PhdThesis{Lau97,
  author =       "Maryline Laurent",
  title =        "Protection des communications sur les r\'{e}seaux
                 {ATM}",
  school =       "Universit\'{e} de Rennes 1",
  year =         "1997",
  month =        "juillet",
}

@Misc{AD97,
  author =       "Theodore K. Apostolopoulos and Victoria C. Daskalou",
  title =        "The Role of the Time Parameter in a Network Security
                 Management Model",
  howpublished = "submitted to the IEEE Symposium on Computer
                 Communication",
  year =         "1997",
  note =         "reviewed by L.M\'{e}",
}

@Misc{EHA97,
  author =       "Mahmoud T. El-Hadidi and Nadia H. Hegazi and Heba K.
                 Aslan",
  title =        "Performance Analysis of the Kerberos Protocol in a
                 Distributed Environment",
  howpublished = "submitted to the IEEE Symposium on Computer
                 Communication",
  year =         "1997",
  note =         "reviewed by L.M\'{e}",
}

@Misc{AMG97,
  author =       "M. Abdalla and M. Mahmoud and A. Goneid",
  title =        "Secured Communication System with Neural Network
                 Encoder",
  howpublished = "submitted to the IEEE Symposium on Computer
                 Communication",
  year =         "1997",
  note =         "reviewed by L.M\'{e}",
}

@TechReport{Honeywell72,
  author =       "Honeywell",
  title =        "Multics",
  institution =  "Honeywell",
  year =         "1972",
}

@TechReport{Fal.96,
  author =       "Edward W. Felten and Dirk Balfanz and Drew Dean and
                 Dan S. Wallach",
  title =        "Web Spoofing: An Internet Con Game",
  institution =  "Princeton University",
  year =         "1996",
  number =       "540-96",
}

@Article{SH96,
  author =       "Michael Shoffner and Merlin Hughes",
  title =        "Java and Web-Executable Object Security",
  journal =      "Dr. Dobb's Journal",
  year =         "1996",
  month =        nov,
  url =          "http://www.ddj.com/ddj/1996/1996.11/shof.htm",
}

@InProceedings{DFH96,
  author =       "Patrick D'Haeseleer and Stephanie Forrest and Paul
                 Helman",
  title =        "An Immunological Approach to Change Detection:
                 Algorithms, Analysis and Implications",
  booktitle =    "Proceedings of the 1996 IEEE Symposium on Security and
                 Privacy",
  year =         "1996",
  pages =        "110--119",
  month =        may,
  url =          "http://www.cs.unm.edu/~forrest/ieee-sp-neg-select.ps.gz",
}

@InProceedings{FL96,
  author =       "Stephanie Forrest and Thomas Longstaff",
  title =        "A Sense of Self for Unix Processes",
  booktitle =    "Proceedings of the 1996 IEEE Symposium on Security and
                 Privacy",
  year =         "1996",
  pages =        "120--128",
  month =        may,
}

@Misc{FSA97,
  author =       "Stephanie Forrest and Anil Somayaji and David H.
                 Ackley",
  title =        "Building Diverse Computer Systems",
  howpublished = "Submitted to the Sixth Workshop on Hot Topics in
                 Operating Systems",
  year =         "1997",
  url =          "http://www.cs.unm.edu/~forrest/hotos.ps",
}

@Misc{DF96,
  author =       "Dipankar Dasgupta and Stephanie Forrest",
  title =        "Novelty Detection in Time Series Data Using Ideas from
                 Immunology",
  howpublished = "Web doc",
  year =         "1996",
  url =          "http://www.cs.unm.edu/~forrest/noveltydetection96.ps",
}

@Misc{FHS96,
  author =       "Stephanie Forrest",
  title =        "Computer Immunology",
  howpublished = "Submitted to Communications of the ACM",
  month =        dec,
  year =         "1996",
  url =          "http://www.cs.unm.edu/~forrest/cacm.ps",
}

@Misc{Bob97,
  author =       "Gildas Bobon",
  title =        "Le march\'{e} de la s\'{e}curit\'{e}",
  howpublished = "Mémoire M\'{e}ari",
  month =        "mars",
  year =         "1997",
}

@Misc{Ber97,
  author =       "Hughes Bertrand",
  title =        "Intrusion Detection System",
  howpublished = "Mémoire M\'{e}ari",
  month =        "mars",
  year =         "1997",
}

@Misc{GD97,
  author =       "Adriana Gorunescu and Cosmin Dimitriu",
  title =        "Analyse d'audit",
  howpublished = "Mémoire Miniprojet ENSTB",
  month =        "mars",
  year =         "1997",
  keywords =     "data mining",
}

@TechReport{GK95,
  author =       "Sokratis Katsikas and Dimitris Gritzalis",
  title =        "University Programmes on Information Security,
                 Dependability and Safety",
  institution =  "Erasmus",
  year =         "1995",
  number =       "ICP-94(95)-G-4016/11:IS-CD-3c",
  month =        jul,
}

@Article{Bel89,
  author =       "S. M. Bellovin",
  title =        "Security Problems in the {TCP}/{IP} Protocol Suite",
  journal =      "Computer Communication Review",
  year =         "1989",
  volume =       "19",
  number =       "2",
  pages =        "32--48",
  month =        apr,
}

@Misc{Far96,
  author =       "Dan Farmer",
  title =        "Shall We Dust Moscow",
  howpublished = "Web doc",
  month =        dec,
  year =         "1996",
  url =          "http://www.trouble.org/survey/",
}

@Book{Ben96,
  author =       "Alain Bensoussan",
  title =        "Les {T}\'{e}l\'{e}coms et le droit",
  publisher =    "Hermes",
  year =         "1996",
}

@Proceedings{esorics96,
  title =        "Proceedings of the 1996 European Symposium on Research
                 in Computer Security",
  year =         "1996",
}

@Proceedings{oakland97,
  institution =  "IEEE",
  title =        "Proceedings of the 1997 {IEEE} Symposium on Security
                 and Privacy",
  editor =       "IEEE Computer Society Press",
  year =         "1997",
}

@Misc{RG95,
  author =       "Ron Rivest and Rosario Gennaro",
  title =        "Course on Network and Computer Security",
  howpublished = "Web doc",
  year =         "1995",
  url =          "http://theory.lcs.mit.edu/~rosario/6.915/home.html",
}

@Misc{BWF96,
  author =       "M. Bishop and C. Wee and J. Frank",
  title =        "Goal Oriented Auditing and Logging",
  howpublished = "Submitted to IEEE Transactions on Computing Systems",
  year =         "1996",
  url =          "http://seclab.cs.ucdavis.edu/papers.html",
}

@InProceedings{HS97,
  author =       "John Hale and Sujeet Shenoi",
  title =        "Catalytic Inference Analysis: Detecting Inference
                 Threats due to Knowledge Discovery",
  booktitle =    "Proceedings of the 1997 IEEE Symposium on Security and
                 Privacy",
  year =         "1997",
  url =          "http://euler.mcs.utulsa.edu/~hale/oakim.ps",
  keywords =     "intrusions detection",
}

@InProceedings{Aal.97,
  author =       "Paul Ammann and Sushil Jajodia and Catherine D.
                 McCollum and Barbara T. Blaustein",
  title =        "Surviving Information Warfare Attacks on Databases",
  booktitle =    "Proceedings of the 1997 IEEE Symposium on Security and
                 Privacy",
  year =         "1997",
  url =          "http://www.isse.gmu.edu/~csis/publications/oak97-iw.ps",
  keywords =     "intrusions detection",
}

@InProceedings{KRL97,
  author =       "Calvin Ko and Manfred Ruschitzka and Karl Levitt",
  title =        "Execution Monitoring of Security-Critical Programs in
                 a Distributed System: {A} Specification-based
                 Approach",
  booktitle =    "Proceedings of the 1997 IEEE Symposium on Security and
                 Privacy",
  year =         "1997",
  keywords =     "intrusions detection",
}

@InProceedings{LJ97,
  author =       "Ulf Lindqvist and Erland Jonsson",
  title =        "How to Systematically Classify Computer Security
                 Intrusions",
  booktitle =    "Proceedings of the 1997 IEEE Symposium on Security and
                 Privacy",
  year =         "1997",
  url =          "http://www.ce.chalmers.se/~ulf/pubs.html",
  keywords =     "intrusions detection",
}

@TechReport{Lin96,
  author =       "Ulf Lindqvist",
  title =        "Observations on the Nature of Computer Security
                 Intrusions",
  institution =  "Chalmers university of technology",
  year =         "1996",
  number =       "253L",
  month =        dec,
  keywords =     "intrusions detection",
}

@Misc{RS96,
  author =       "R. L. Rivest and A. Shamir",
  title =        "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps",
  howpublished = "Web doc",
  month =        may,
  year =         "1996",
  url =          "http://theory.lcs.mit.edu/~rivest/RivestShamir-mpay.ps",
  keywords =     "commerce electronique",
}

@InBook{Hag96,
  author =       "Jean Haguet",
  title =        "{L}'internet~: guide stratégique pour l'entreprise",
  chapter =      "15",
  publisher =    "Masson",
  year =         "1996",
  url =          "http://www.gctech.fr/librairie/documentation.html",
  keywords =     "commerce electronique",
}

@PhdThesis{Mou97,
  author =       "Abdelaziz Mounji",
  title =        "Rule-Based Distributed Intrusion Detection",
  school =       "Universit\'{e} de Namur",
  year =         "1997",
  month =        "Juillet 1997",
  keywords =     "detection d'intrusions",
}