Reports and Papers Archive
The Kinetics of Computer Virus Replication
TIS/PEM Installation Guide
TIS/PEM User\'s Guide
A Summary of the ACM/IEEE-CS Joint Curriculum Task Force Report
Usenix Association Bylaws
Covert Distributed Processing with Computer viruses
Doing Intrusion Detection Using Embedded Sensors
Security Assessment of IP-based Networks: A Holistic Approach
Security Policy Communication in a Distributed Network Element
This paper discusses the distributed network element concept as it pertains to the communication of security policies. In the context of this paper, a security policy specifies access control rules on network traffic. We introduce the problem and give a software architecture to solve it. The solution has four components that form the distributed network element: the controler, adaptor, driver and network element. We also discuss the application of the solution to two cases: one in which the network element is an ATM switch and the other in which the network element is an IP switch.
Issues in the Incorporation of Security Services into a Protocol Reference Model
The Compression Functions of SHA, MD2, MD4 and MD5 are not Affine
21st Century InfoSec Management and Beyond
The world has changes and continues to change at an exponential rate. THis is having a major impact on the effective means to implement information security. We have to look at some basic often highly regarded principles used successsfully and unsuccessfully in excuting or profession - and be prepared to throw them away. Ranging from organisation, risk analysis, policy, technology through to the wider issues effecting security, this paper looks at a likely future and presents some of the key changes we need to undertake to ensure security functions at the heart of our businesses and affliliations. THe conclusion is that is we don\‘t adapt we, as a profession, will be displaced by the correct action from our businesses

