forked from keithw/cyber-ssh
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcyber.bib
107 lines (97 loc) · 3.8 KB
/
cyber.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
@inproceedings {Mosh,
author = {Keith Winstein and Hari Balakrishnan},
title = {Mosh: An Interactive Remote Shell for Mobile Clients},
booktitle = {2012 USENIX Annual Technical Conference (USENIX ATC 12)},
year = {2012},
isbn = {978-931971-93-5},
address = {Boston, Massachusetts, USA},
pages = {177--182},
url = {https://www.usenix.org/conference/atc12/technical-sessions/presentation/winstein},
publisher = {USENIX. Available at \url{https://mosh.org}.},
}
@book{nistSSH,
author = {Tatu Yl\"{o}nen and Paul Turner and Karen Scarfone and Murugiah Souppaya},
publisher = {National Institute of Standards and Technology},
title = {NIST Internal Report 7966: Security of Interactive and Automated Access Management Using Secure Shell (SSH)},
year = {2015},
note = {\url{http://dx.doi.org/10.6028/NIST.IR.7966}}
}
@book{nist80053,
publisher = {National Institute of Standards and Technology},
title = {NIST Special Publication 800-53 rev. 4: Security and Privacy Controls for Federal Information Systems and Organizations},
year = {2013},
note = {\url{http://dx.doi.org/10.6028/NIST.SP.800-53r4}}
}
@book{cyberframework,
key = {cyberframework},
publisher = {National Institute of Standards and Technology},
title = {Framework for Improving Critical Infrastructure Cybersecurity},
month = {February},
day = {12},
year = {2014},
note = {\url{https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf}}
}
@misc{trumpeo,
key = {eo13800},
note = {Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, Exec.~Order No.~13,800, 82 Fed.~Reg.~22,391 (May 16, 2017).}
}
@misc{fisma,
key = {fisma},
note = {Federal Information Security Management Act of 2002, Pub.~L.~No.~107-347~\S\S~301--305, 116 Stat.~2899, 2946--2961 (codified as amended in scattered sections of 44 U.S.C., 40 U.S.C., and 15 U.S.C.)}
}
@inproceedings{SSH,
title={{SSH--secure login connections over the Internet}},
author={Yl\"{o}nen, T.},
booktitle={6th USENIX Security Symp.},
pages={37--42},
year={1996}
}
@Article{wobber:taostocs,
author = {Edward P. Wobber and Mart{\'\i}n Abadi and Michael Burrows
and Butler Lampson},
title = {Authentication in the {T}aos Operating System},
journal = TOCS,
year = 1994,
volume = 12,
number = 1,
pages = {3--32}
}
@inproceedings{rex,
title = {{REX}: {S}ecure, {E}xtensible {R}emote {E}xecution},
author = {Michael Kaminsky and Eric Peterson and Daniel B. Giffin
and Kevin Fu and David Mazi{\`e}res and M. Frans Kaashoek},
booktitle = {USENIX},
year = {2004},
month = {June},
}
@inproceedings{congmgr,
author = {Hari Balakrishnan and
Hariharan Shankar Rahul and
Srinivasan Seshan},
title = {An Integrated Congestion Management Architecture for Internet Hosts},
booktitle = {{SIGCOMM}},
pages = {175--187},
year = {1999},
url = {http://doi.acm.org/10.1145/316188.316220},
doi = {10.1145/316188.316220},
timestamp = {Mon, 06 Feb 2006 11:00:58 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/sigcomm/BalakrishnanRS99},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{ron,
author = {David G. Andersen and
Hari Balakrishnan and
M. Frans Kaashoek and
Robert Morris},
title = {Resilient overlay networks},
journal = {Computer Communication Review},
volume = {32},
number = {1},
pages = {66},
year = {2002},
url = {http://doi.acm.org/10.1145/510726.510740},
doi = {10.1145/510726.510740},
timestamp = {Thu, 09 Feb 2006 13:30:37 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/ccr/AndersenBKM02},
bibsource = {dblp computer science bibliography, http://dblp.org}
}