Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Мельников Д. А. - Организация и обеспечение безопасности информационно-технологических сетей и систем - 2012

.pdf
Скачиваний:
782
Добавлен:
15.07.2016
Размер:
20.96 Mб
Скачать

Список литературы

1.Алферов А.П., Зубов А.Ю., Кузьмин А.С., Черемушкин А.В., Основы криптографии. - Гелиос-АРВ, Москва, 2002.

2.Анин Б., Петрович А. Радиошпионаж. - М.: Международные отношения, 1996.

3.Бабаш А.В., Шанкин Г.П., Криптография. - М.: СОЛОН-Р, 2007.

4.Белов Е.Б., Лось В.П., Мещеряков Р.В., Шелупанов А.А. Основы информационной безопасности. Учебное пособие для вузов. - М.: Горячая линия - Телеком, 2006.

5.Григорьев В.А. Передача сообщений по зарубежным инфор­ мационным сетям. - Л.: ВАС, 1989.

6.Романец Ю.В., Тимофеев П.А., Шаньгин В.Ф. Защита информа­ ции в компьютерных системах и сетях. - М.: Радио и связь, 1999.

7.Мельников Д.А. Организация информационного обмена в информационно-вычислительных сетях. Учебное пособие. - М.: ФАПСИ, 1998.

8.Мельников Д.А. Информационные процессы в компьютерных сетях. Протоколы, стандарты, интерфейсы, модели... - М.: КУДИЦ-ОБРАЗ, 1999, ISBN 5-93378-0002-2.

9.Мельников Д.А., Савельев М.С. Скрытые под маской. PCWeek. - 2005. - №6.

10.Орлов В.А., Мельников Д.А. Современная криптография и ар­ хитектура безопасности компьютерных сетей: Учебное посо­ бие. - М.: МГУПИ, 2009.

11.Диффи у., Хеллман М.Э. Защищенность и имитостойкость: Введение в криптографию. / / ТИИЭР.- 1979. - Т. 67, №3.

12.Диффи у. Первые десять лет криптографии с открытым клю­ чом. / / ТИИЭР.- 1988.- Т. 76, № 5.

13.Мафтик С. Механизмы защиты в сетях ЭВМ. - М.: Мир, 1993.

14.Melnikov D., Jones A., 'Masquerade' Attacks and a Process for Their Detection. Proceedings of the 3rd European Conference on In­ formation Warfare and Security. - Royal Holloway University of London, UK. - 28-29 June 2004. - p.269.

15.Melnikov D., Jones A., Static Image Data Hiding and Encryption Method. Proceedings of the 3rd European Conference on Informa­ tion Warfare and Security. - Royal Holloway University of London, UK. - 28-29 June 2004. - p.279.

16.Denning D.E. "Cryptography and Data Security". - AddisonWesley, 1982.

Списоклитературы

593

17.American National Standards Institute, "Public key Cryptography for the Financial Service Industry: Agreement of Symmetric Keys Using Diffie-Hellman and MQV Algorithms", X9.42, 29 Jan 1999.

18.American Bar Association, "Digital Signature Guidelines: Legal In­ frastructure for Certification Authorities and Secure Electronic Commerce", Chicago, IL, 1 Aug 1996.

19.U.S. Army Corps of Engineers, "Electromagnetic Pulse (EMP) and Tempest Protection for Facilities", E P 1110-3-2, 31 Dec 1990.

20.British Standards Institution, "Information Security Management, Part 1: Code of Practice for Information Security Management", BS 7799-1:1999, effective 15 May 1999.

21.British Standards Institution, "Information Security Management, Part 2: Specification for Information Security Management Sys­ tems", BS 7799-2:1999, effective 15 May 1999.

22.D. E. Bell and L. J. LaPadula, "Secure Computer Systems: Mathe­ matical Foundations and Model", M74-244, The MITRE Corpora­ tion, Bedford, MA, May 1973.

23.Common Criteria Implementation Board, "Common Criteria for In­ formation Technology Security Evaluation, Part 1: Introduction and General Model", ver. 2.1, CCIB-99-01, Aug 1999.

24.U.S. Department of Defense Computer Security Center, "Computer Security Requirements: Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments", CSC-STD-003-85, 25 Jun 1985.

25.Denning D. E., "A Lattice Model of Secure Information Flow", in "Communications of the ACM", vol. 19, no. 5, May 1976, pp. 236-243.

26.U.S. Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria", DoD 5200.28-STD, 26 Dec 1985.

27.U.S. Department of Defense, Directive 5200.28, "Security Require­ ments for Automated Information Systems (AISs)", 21 Mar 1988.

28.U.S. Department of Defense, "X.509 Certificate Policy", ver. 2, Mar 1999.

29.U.S. Department of Defense, "NSA Key Recovery Assessment Cri­ teria", 8 Jun 1998.

30.W. Ford, "Computer Communications Security: Principles, Stan­ dard Protocols and Techniques", ISBN 0-13-799453-2,1994.

31.W. Ford and M. Baum, "Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption", ISBN 0-13- 476342-4,1997.

32.U.S. Department of Commerce, "Glossary for Computer Systems Security", FIPS PUB 39,15 Feb 1976.

594

Список литературы

33.U.S. Department of Commerce, "Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Opera­ tions", National Institute of Standards, 4 Sep 1998.

34.U.S. Department of Commerce, "Underlying Technical Models for Information Technology Security", National Institute of Standards Special Publication, December 2001.

35.ITU-T, "Security Architecture for Open Systems Interconnection for CCITT Applications", Recommendation X.800,1991.

36.ITU-T, "Information technology - Security techniques - Guidelines for the use and management of trusted third party services", Rec­ ommendation X.842, 2000.

37.ISO, "Information Processing Systems - Open Systems Intercon­ nection Reference Model - Part V. Basic Reference Model", ISO/IEC 7498-1.

38.ISO, "Information Processing Systems - Open Systems Intercon­ nection Reference Model - Part 2: Security Architecture", ISO/IEC 7499-2.

39.David Kahn, "The Codebreakers: The Story of Secret Writing", The Macmillan Company, New York, 1967.

40.Markus G. Kuhn and Ross J. Anderson, "Soft Tempest: Hidden Da­ ta Transmission Using Electromagnetic Emanations", in David Aucsmith, ed., "Information Hiding, Second International Work­ shop, IH'98", Portland, Oregon, USA, 15-17 Apr 1998, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 124-142.

41.U.S. Department of Commerce, "Minimum Interoperability Speci­ fication for PKI Components (MISPC), Version 1", National Insti­ tute of Standards Special Publication 800-15, Sep 1997.

42.National Computer Security Center, "A Guide to Understanding Audit in Trusted Systems", NCSC-TG-001,1 Jun 1988.

43.National Computer Security Center, "Glossary of Computer Securi­ ty Terms", NCSC-TG-004, ver. 1, 21 Oct 1988. (Part of the Rainbow Series.)

44.National Computer Security Center, "Trusted Network Interpreta­ tion of the Trusted Computer System Evaluation Criteria", NCSC- TG-005, ver. 1, 31 Jul 1987. (Part of the Rainbow Series.)

45.Simson Garfinkel, "PGP: Pretty Good Privacy", O'Reilly & Asso­ ciates, Inc., Sebastopol, CA, 1995.

46.Postel, J., "User Datagram Protocol", STD 6, RFC-768, August 1980.

47.Postel, J., "Internet Protocol", STD 5, RFC-791, September 1981.

48.Postel, J., "Internet Control Message Protocol", STD 5, RFC-792, September 1981.

49.Postel, J., ed., "Transmission Control Protocol", STD 7, RFC-793, September 1981.

Список литературы

595

50.Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC-821, Au­ gust 1982.

51.Postel, J. and J. Reynolds, "TELNET Protocol Specification", STD 8, RFC-854,May 1983.

52.Postel,J. and J.Reynolds, "File Transfer Protocol (FTP)", STD 9, RFC-959, Octoberl985.

53.Mockapetris, P., "Domain Names - Concepts and Facilities", STD 13, RFC-1034, November 1987.

54.Rivest, R., "The MD5 Message-Digest Algorithm", RFC-1321, April 1992.

55.Lloyd, B. and W. Simpson, "PPP Authentication Protocols", RFC1334, October 1992.

56.Finseth,C., "An Access Control Protocol, Sometimes Called TACACS", RFC-1492, July 1993.

57.Kaufman, C , "DASS: Distributed Authentication Security Service", RFC-1507, September 1993.

58.Kohl, J. and C. Neuman, "The Kerberos Network Authentication Service (V5)", RFC-4120 (RFC-4537), July 2005.

59.Berners-Lee, T., "Universal Resource Identifiers in WWW", RFC1630, June-1994.

60.Simpson, W., ed.," The Point-to-Point Protocol (PPP)", STD 51, RFC-1661, July 1994.

61.Myers, J., "Uniform Resource Locators (URL)", RFC-1738, Decem­ ber 1994.

62.Eastlake, D., Crocker, S. and J. Schiller, "Randomness Recommen­ dations for Security", RFC-4086, June 2005.

63.Metzger, P. and W. Simpson, "IP Authentication using Keyed MD5", RFC-1828, August 1995.

64.Berners-Lee, T., "Hypertext Markup Language - 2.0", RFC-1866, November 1995.

65.Conta, A. and S. Deering, "Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification", RFC-1885, December 1995.

66.Eastlake D. 3rd, ed., "CyberCash Credit Card Protocol Version 0.8", RFC-1898, February 1996.

67.Leech M., Ganis M., Lee Y., Kuris R., Koblas D. and L. Jones, "SOCKS Protocol Version 5", RFC-1928, March 1996.

68.Haller N. and C. Metzion, "A One-Time Password System", RFC1938, May 1996.

69.Myers J. and M.Rose, "Post Office Protocol - Version 3", STD 53, RFC-1939, May 1996.

70.Carpenter, B.,ed., "Architectural Principles of the Internet", RFC1958, June 1996.

596

Списоклитературы

71.Malkin, G., ed., "Internet Users' Glossary", F Y I18, RFC-1983, Au­ gust 1996.

72.Freed, N. and N. Borenstein, "Multipurpose Internet Mail Exten­ sions (MIME) Part One: Format of Internet Message Bodies", RFC2045, November 1996.

73.Eastlake D., 3rd, "Domain Name System Security Extensions", RFC-2065, January 1997.

74.Linn J., "Generic Security Service Application Program Interface, Version 2", RFC-2078, January 1997.

75.Rigney, C , Rubens, A., Simpson, W. and S. Willens, "Remote Au­ thentication Dial In User Service (RADIUS)", RFC-2138, April 1997.

76.Eastlake, D., "Secure Domain Name System Dynamic Update", RFC-2137, April 1997.

77.Gwinn, A., "Network Security For Trade Shows", RFC-2179, July 1997.

78.Fraser, B., "Site Security Handbook", FYI 8, RFC-2196, September 1997.

79.Myers, J., "Simple Authentication and Security Layer (SASL)", RFC-2222, October 1997.

80.Dierks, T. and C. Allen, "The TLS Protocol, Version 1.0", RFC-2246, January 1999.

81.Haller N., ed., "A One-Time Password System", RFC-2289, Febru­ ary 1998.

82.Ramos, A., "IETF Identification and Security Guidelines", RFC2323, April 1998.

83.Brownlee, N. and E. Guttman, "Expectations for Computer Securi­ ty Incident Response", RFC-2350, June 1998.

84.Hinden,R. and S.Deering, "IP Version 6 Addressing Architecture", RFC-2373, July 1998.

85.Berners-Lee, T., Fielding, R. and L. Masinter, "Uniform Resource Identifiers (URI): Generic Syntax", RFC-2396, August 1998.

86.Kent, S. and K. Seo, "Security Architecture for the Internet Proto­ col", RFC-4301, December 2005.

87.Kent, S., "IP Authentication Header", RFC-4302, December 2005.

88.Kent, S., "IP Encapsulating Security Payload (ESP)", RFC-4303, De­ cember 2005.

89.3rd Eastlake, D., "Cryptographic Algorithm Implementation Re­ quirements For Encapsulating Security Payload (ESP) and Authen­ tication Header (AH)", RFC 4305, December 2005.

90.Kaufman, C , Ed., "The Internet Key Exchange (IKEv2) Protocol"/ RFC 4306, December 2005.

91.Callas J., ed., "OpenPGP Message Format", RFC-2440, November 1998.

Списоклитературы

597

92.Newman С., "The One-Time-Password SASL Mechanism", RFC2444, October 1998.

93.Deering S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Spe­ cification", RFC-2460, December 1998.

94.Guttman, E., Leong, L. and G. Malkin, "Users' Security Hand­ book", RFC-2504, February 1999.

95.Cooper D., Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC-5280, May 2008.

96.Case J., Mundy R., Partain D. and B. Stewart, "Introduction to Ver­ sion 3 of the Internet-Standard Network Management Frame­ work", RFC-2570, April 1999.

97.Blumenthal, U. and B. Wijnen, "User-based Security Model (USM) for Version 3 of the Simple Network Management Protocol (SNMPv3)", RFC-2574, April 1999.

98.Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol - HTTP/1.1", RFC-2616, June 1999.

99.Housley, R., "Cryptographic Message Syntax", RFC-2630, June 1999.

100.Ramsdell, B., ed., "S/MIME Version 3 Message Specification", RFC-2633, June 1999.

101.Burdett D., "Internet Open Trading Protocol - IOTP, Version 1.0", RFC-2801, April 2000.

102.Davidson, K. and Y. Kawatsura, "Digital Signatures for the vl.O Internet Open Trading Protocol (IOTP)", RFC-2802, April 2000.

103.Maruyama H., Tamura K. and N. Uramot, "Digest Values for DOM (DOMHASH)", RFC-2803, April 2000.

104.Shirey R., "Internet Security Glossary", RFC-2828, May 2000.

105.Prafullchandra H., Schaad J., "Diffie-Hellman Proof-of-Possession Algorithms", RFC-2875, July 2000.

106.Eastlake D. 3rd, Smith C , "Internet Open Trading Protocol (IOTP) HTTP Supplement", RFC-2935, September 2000.

107.Kawatsura Y., Payment Application Programmers Interface (API) for vl.O Internet Open Trading Protocol (IOTP), RFC-3867, No­ vember 2004.

108.Tim Bray, Jean Paoli, С. M. Sperber-McQueen, "Extensible Markup Language (XML) 1.0", http://www.w3.org/TR/1998/REC-xml- 19980210.

109.E.S. Raymond, ed., "The On-Line Hacker Jargon File", ver. 4.0.0, 24 Jul 1996.

110."The New Hacker's Dictionary", 2d edition, MIT Press, Sep 1993, ISBN 0-262-18154-1.

598

Список литературы

111.D. Russell and G. T. Gangemi Sr., " Computer Security Basics", ISBN 0-937175-71-4,1991.

112.J. McNamara. Secrets of Computer Espionage: Tactics and Coun­ termeasures, John Wiley & Sons, Inc., New York, 2003.

113.B. Schneier, "Applied Cryptography", John Wiley & Sons, Inc., New York, 1994.

114.U.S. Department of Defense, National Security Agency, "Secure Data Network Systems, Security Protocol 3 (SP3)", document SDN.301, Revision 1.5,15 May 1989.

115.U.S. Department of Defense, National Security Agency, "Security Protocol 4 (SP4)", document SDN.401, Revision 1.2,12 Jul 1988.

116.U.S. Department of Defense, National Security Agency, "Secure data Network System, Message Security Protocol (MSP)", docu­ ment SDN.701, Revision 4.0, 7 Jun 1996, with Corrections to Mes­ sage Security Protocol, SDN.701, Rev 4.0", 96-06-07, 30 Aug, 1996.

ISBN 978-5-91304-246-0

9 7 8 5 9 1 3

0 4 2 4 6 0