24/05/2018, 19:21

Tài liệu tham khảo-Bảo mật máy tính

1. Dieter Gollmann. (1999). Computer Security. John Wiley & Sons, Inc. 2. James, F.K. and Keith, W.R. (2003). Computer Networking: A Top-Down Approach Featuring the Internet. Pearson Education, Inc. ...

1. Dieter Gollmann. (1999). Computer Security. John Wiley & Sons, Inc.
2. James, F.K. and Keith, W.R. (2003). Computer Networking: A Top-Down Approach Featuring the Internet. Pearson Education, Inc.
3. Pierre Bieber and Fre’de’ric Cuppens. (2001). Expression of Confidentiality Policies with Deontic Logic. John Wiley & Sons, Inc. 
4. Zhiqing Liu. (2001). Manage Component-Specific Access Control with Differentiation and Composition. Retrieved April 2005, from Indiana University, website: http://www.cs.iupui.edu/~zliu/doc/policy.pdf.
5. Matthew J.Herholtz. (2001). Java’s Evolving Security Model: Beyond the Sandbox for Better Assurance or Murkier Brew?. Retrieved May 2005, from Sans Institute, website:http://www.giac.org/practical/gsec/Matthew Herholtz GSEC.pdf.
6. OWASP Project. (2001). A Guide to Building Secure Web Applications. Retrieved may 2005, from http://www.cgisecurity.com/owasp/html/ch08s03.html
7. Prasad G. Naldurg. (2004). Modelling insecurity: Enabling recovery-oriented security with dynamic policies. Retrieved May 2005, from University of Illinois at Urbana-Champaign, website:http://www.cs.uiuc.edu/Dienst/Repository/2.0/Body/ncstrl.uiuc_cs/UIUCDCS-R-2004-2378/postscript.pdf
8. Dung. P.M. (2005). Computer Security. (Lecture notes, Course No AT70.13, School of Advanced Technology). Asean Institute of Technology.
9. Bell D.E. and LaPadula L.J. (1976). Secure computer system: unified exposition and Multics interpretation. The Mitre Corporation.
10. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
11. Stinson, D.R. (1995). Cryptography: Theory and Practice. CRC Press, Inc.
12. William Stallings. (1999). Cryptography and Network Security: Principles and Practice. Prentice Hall, Inc.
13. Phan Đình Diệu. (2002). Lý thuyết mật mã và an toàn thông tin. NXB ĐHQG Hà Nội.
14. Aptech Limited. (2000). Concepts of E-commerce. Aptech certified E-commerce program. India: Author.
15. Ngô Anh Vũ. (1999). Virus tin học – Huyền thoại và thực tế. NXB Thành phố Hồ Chí Minh.
16. Nguyễn Viết Linh và Đậu Quang Tuấn. (2001). Hướng dẫn phòng chống Virus trong tin học một cách hiệu quả. NXB Trẻ.
17. Nguyễn Mạnh Giang. (2005). Lập trình bằng ngôn ngữ Assembly cho máy tính IBM-PC. (Tái bản lần 3). NXB Giáo dục.
18. Nguyễn Đình Hân. (2005). Bảo mật: Chung sống với mã ngoại lai. Thế giới vi tính – PC World Viet Nam, Sê-ri A - Công nghệ máy tính và mạng, 147, 102-104.
19. Philip W. L. Fong.(2004). Proof Linking: A Modular Verification Architecture for Mobile Code Systems. (PhD Dissertation No V5A 1S6, School of Computing Science, Simon Fraser University, Burnaby, BC, Canada). Retrieved May 2005, from http://www2.cs.uregina.ca/~pwlfong/Pub/dissertation.pdf
20. Valentin Razmov. (2002). Security in Untrusted Code Environments: Missing Pieces of the Puzzle. Retrieved May 2005, from University of Washington, website:http://www.cs.washington.edu/homes/valentin/papers/Security-UntrustedCode.pdf
21. Sean Boran. (2002). The IT Security Cookbook. Retrieved May 2005, fromhttp://www.secinf.net/misc/the_it_security_cookbook/the_it_security_cookbook_securing_applications_.html
22. Satish R., Venkata R., Balaji T., Govindakrishnan K., Rajneesh M., Nilest P. and Sravan K. (2002). Security of Mobile Code. Retrieved April 2005, from University of Kentucky, website:http://cs.engr.uky.edu/~singhal/term-papers/Mobilecode.pdf
23. Tobias Fuchs. (2004). Proof-Carrying Code. Retrieved April 2005, from University of Muenchen, website:http://wwwbrauer.in.tum.de/seminare/security/SS04/fuchs-paper.pdf
24. Frederick B. Cohen. (1991). A Cryptographic Checksum for Integrity Protection. Computers and Security, 6(6), 505-510.
25. Frederick B. Cohen. (1991). Trends In Computer Virus Research. Retrieved May 2005, from http://all.net/books/integ/japan.html
26. Ian Goldberg, David Wagner, Randi Thomas and Eric A. Brewer. (1996). A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker. Retrieved May 2005, from University of California, Bereley, website:http://www.cs.berkeley.edu/~daw/papers/janus-usenix96.ps.
27. Guy Edjlali, Anurag Acharya and Vipin Chaudhary. (1998). History-based Access Control for Mobile Code. Retrieved April 2005, from:http://www.pdcl.eng.wayne.edu/~vipin/papers/deeds.ps.
28. Frederick B. Cohen. (1994). A Short Course on Computer Viruses. (Second Edition). John Wiley & Sons, Inc.
29. Nguyễn Đình Hân. (2005). Các chiến lược chống Virus. Thế giới vi tính – PC World Viet Nam, Sê-ri A - Công nghệ máy tính và mạng, 150, 108-110.
30. Pavan Verma. (2005). Virus Protection. Retrieved May 2005, from EECS Department, University of Michigan, website:http://vx.netlux.org/lib/pdf/Virus Protection.pdf
31. Wayner A. Jansen. (2001). Guidelines on Active Content and Mobile Code. Retrieved May 2005, from National Institute of Standard and Technology, U.S. Department of Commerce, website: http://csrc.nist.gov/publications/nistpubs/800-28-ver2/SP800-28v2.pdf
0