1 |
Gopalan Sivathanu, Charles P. Wright, and Er ez Zadok, "Ensuring data integrity in storage: techniques and applications", Proceedings of the 2005 ACM workshop on Storage security and survivability, Fairfax, United States, Nov. 2005, pp. 26-36.
|
2 |
Mihir Bellarea, 1, Joe Kilianb and Phillip Roga way, "The Security of the Cipher Block Chaini ng Message Authentication Code", Journal of C omputer and System Sciences, Volume 61, Issue 3, December 2000, pp. 362-399.
DOI
ScienceOn
|
3 |
SangYeob Na and Suhhyun Cheon, "Dynamic Role Assignment in Role-Based Access Control ", Proceeding of the 5th ACM RBAC Workshop, Berlin, Germany, Jul 2000, pp.39-44.
|
4 |
Chi-Kwong Chan and L. M. Cheng, "Cryptana lysis of a Timestamp-Based Password Authent ication Scheme", Computers & Security, Volum e 21, Issue 1, 2001, pp. 74-76.
DOI
ScienceOn
|
5 |
Jane F. kinkus, Science and Technology Resour ces on the Internet: Computer Security, Issues in Science and Technology Librarianship, No 36, Fall 2002.
|
6 |
Seth T. Ross, UNIX System Security Tools, McGraw-Hill, ISBN 0079 13788 1, 1999.
|
7 |
Frank Stajano, Security for Ubiquitous Computing, Wiley, ISBN 0470 84493 0, 2002.
|
8 |
The information security glossary, http://www. your window.to/information-security/gl_nonrepu diation.htm, Nov 2007.
|
9 |
David F. Ferraiolo, Janet A.Cugini, and D. Ric hard Kuhn, "Role-Based Access Control(RBAC): Feature and Motivation", National Institute of Standard and Technology, 1995.
|
10 |
Ralph C. Merkle, "A certified digital signature ", Proceedings on Advances in cryptology, Cali fornia, United States, 1989, pp. 218 - 238
|
11 |
Deborah Russell and G.T. Gangemi Sr, Comput er Security Basics, O'Reilly, ISBN 0 937175 71 4, 1992.
|
12 |
Hans Dobbertin, Lars Knudsen, and Matt Robs haw, "The Cryptanalysis of the AES - A Brief Survey", Advanced Encryption Standard - AE S, 4th International Conference, AES 2004, LN CS 3373, Bonn, Germany, May 2004, pp. 1-10.
|
13 |
E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, New York, 1993.
|
14 |
M Naor and M.Yung, "Universal one-way has h functions and their cryptographic applications ", Annual ACM Symposium on Theory of Com puting, Seattle, 1989, pp. 33 - 43.
|
15 |
Charles T. Cullen, Peter B. Hirtle, David Levy, Clifford A. Lynch and Jeff Rothengerg, Authenticity in Digital Environment, Council on Library and Information Resources, ISBN 1 887334 777, May 2000.
|
16 |
Adobe, "A primer on electronic document security", Technical White Paper, Nov 2004.
|
17 |
Computer Security: A practical Definition, http:/ /www. albion.com/security/intro-4.html, Jul 200 7.
|