\newcommand{\etalchar}[1]{$^{#1}$} \begin{thebibliography}{BCOW94} \bibitem[Age85]{kn:nsa85} National~Security Agency. \newblock Magnetic {T}ape {D}egausser. \newblock Technical Report L14-4-A, National Security Agency/Central Security Service, Octubre 1985. \bibitem[AK96]{kn:and96} Ross~J. Anderson and Markus Kuhn. \newblock Tamper resistance -- a cautionary note. \newblock In {\em Proceedings of the 2nd {\sc usenix} Workshop on Electronic Commerce}, pages 1--11. The {\sc usenix} Association, Noviembre 1996. \bibitem[AKS96]{kn:aks96} Taimur Aslam, Ivan Krsul, and Eugene~H. Spafford. \newblock Use of a taxonomy of security faults. \newblock Technical Report TR-96-051, Purdue University Department of Computer Science, 1996. \bibitem[ALGJ98]{kn:axe98} Stefan Axelsson, Ulf Lindqvist, Ulf Gustafson, and Erland Jonsson. \newblock An approach to {U}nix {S}ecurity {L}ogging. \newblock In {\em Proceedings of the 21st National Information Systems Security Conference}, pages 62--75. National Institute of Standards and Technology/National Computer Security Center, Octubre 1998. \bibitem[And80]{kn:and80} James~P. Anderson. \newblock Computer security threat monitoring and surveillance. \newblock Technical report, James P. Anderson Co., Abril 1980. \bibitem[And94]{kn:and94} Ross~J. Anderson. \newblock Why {C}ryptosystems {F}ail. \newblock {\em Communications of the {ACM}}, 37:32--40, Noviembre 1994. \bibitem[And97]{kn:and97} Ross~J. Anderson. \newblock Tamperproofing of {C}hip {C}ards. \newblock Enviado a la lista {\tt cypherpunks@cyberpass.net} por William H. Geiger III en septiembre, 1997. \bibitem[Ano97]{kn:ano97} Anonymous. \newblock {\em Maximum Security: a hacker\'{}s guide to protecting your Internet site and network}. \newblock McMillan Computer Publishing, 1997. \bibitem[Ano01]{kn:ano01} Anonymous. \newblock {\em Maximum {L}inux {S}ecurity: a hacker\'{}s guide to protecting your {L}inux Server and Workstation}. \newblock Sams Publishing, 2001. \bibitem[ANS98]{kn:ans98} R.~J. Anderson, R.~M. Needham, and A.~Shamir. \newblock The {S}teganographic {F}ile {S}ystem. \newblock {\em Lecture Notes in Computer Science}, 1525:73--82, 1998. \bibitem[Ark99]{kn:ark99} Ofir Arkin. \newblock Network {S}canning {T}echniques, Noviembre 1999. \newblock PubliCom Communications Solutions. \bibitem[Atk93]{kn:atk93} Derek~A. Atkins. \newblock {\em Charon: Kerberos Extensions for Authentication over Secondary Networks}. \newblock PhD thesis, {D}epartment of {E}lectrical {E}ngineering and {C}omputer {S}cience, {M}assachusetts {I}nstitute of {T}echnology, 1993. \bibitem[Axe98]{kn:axe98b} Stefan Axelsson. \newblock Research in intrusion-detection systems: A survey. \newblock Technical Report 98--17, Chalmers University of Technology, Diciembre 1998. \bibitem[B{\etalchar{+}}85]{kn:ora} Sheila~L. Brand et~al. \newblock Department of {D}efense {T}rusted {C}omputer {S}ystem {E}valuation {C}riteria. \newblock Technical Report DOD 5200.28-STD, Department of Defense, Diciembre 1985. \bibitem[B{\etalchar{+}}88]{kn:glo} Sue Berg et~al. \newblock Glossary of {C}omputer {S}ecurity {T}erms. \newblock Technical Report NCSC-TG-004, National Computer Security Center, Octubre 1988. \bibitem[Bac86]{kn:bac86} Maurice~J. Bach. \newblock {\em The Design of the {U}nix Operating System}. \newblock Prentice Hall, 1986. \bibitem[Bai97]{kn:bai97} Edward~C. Bailey. \newblock {\em Maximum {\sc rpm}: {T}aking the {R}ed {H}at {P}ackage {M}anager to the limit}. \newblock Red Hat Software, Inc., 1997. \bibitem[BAW96]{kn:bou96} F.~Bouchier, J.S. Ahrens, and G.~Wells. \newblock Laboratory evaluation of the {I}ri{S}can prototype biometric identifier. \newblock Technical Report SAND96-1033, Sandia National Laboratories, Abril 1996. \bibitem[BB99]{kn:bus99} Roland B\"uschkes and Mark Borning. \newblock Transaction--based {A}nomaly {D}etection. \newblock In {\em Proceedings of Workshop on Intrusion Detection and Network Monitoring}. The {\sc usenix} Association, Abril 1999. \bibitem[BBD{\etalchar{+}}96]{kn:bec96} Michael Beck, Harold Bohme, Mirko Dzladzka, Ulrich Kunitz, Robert Magnus, and Dirk Verworner. \newblock {\em Linux Kernel Internals}. \newblock Addison-Wesley, 1996. \bibitem[BCOW94]{kn:open} John Barkley, Lisa Carnahan, Karen Olsen, and John Wack. \newblock Improving security in a network environment. \newblock In John Barkley, editor, {\em Security in {O}pen {S}ystems}, chapter~10. National Institute of Standards and Technology ({\sc nist}), Julio 1994. \newblock Special Publication 800-7. \bibitem[BD96]{kn:bis96} Matt Bishop and Michael Dilger. \newblock Checking for race conditions in file accesses. \newblock {\em Computing System}, 9(2):131--152, Primavera 1996. \bibitem[Bel89]{kn:bel89} Steven~M. Bellovin. \newblock Security problems in the {\sc tcp/ip} {P}rotocol {S}uite. \newblock {\em Computer Communications Review}, 19(2):32--48, Abril 1989. \bibitem[Bel92]{kn:bel92} Steven~M. Bellovin. \newblock There be dragons. \newblock In {\em Proceedings of the Third {\sc usenix} Security Symposium}, pages 1--16. The {\sc usenix} Association, Septiembre 1992. \bibitem[Bel93a]{kn:bel93} Walter Belgers. \newblock Unix password security, 1993. \bibitem[Bel93b]{kn:bell93} Steven~M. Bellovin. \newblock Packets found on an internet. \newblock {\em Computer Communications Review}, 23(3):26--31, Julio 1993. \bibitem[Bel96]{kn:rfc1498} Steven~M. Bellovin. \newblock {RFC1498}: Defending against sequence number attacks, Mayo 1996. \bibitem[BF99]{kn:bal99} Dirk Balfanz and Edward~W. Felten. \newblock Hand-held computers can be better smart cards. \newblock In {\em Proceedings of the 8th {\sc usenix} Security Symposium}. The {\sc usenix} Association, Agosto 1999. \bibitem[BGML96]{kn:ben96} W.~Bender, D.~Gruhl, N.~Morimoto, and A.~Lu. \newblock Techniques for data hiding. \newblock {\em {IBM} Systems Journal}, 35(3,4), 1996. \bibitem[Bha01]{kn:bha01} Nishchal Bhalla. \newblock {AIX} 4.3 bastion host guidelines, Junio 2001. \newblock The {SANS} {I}nstitute. \bibitem[Bis86]{kn:bis86} Matt Bishop. \newblock How to write a setuid program. \newblock {\em ;login:}, 12(1), Enero 1986. \bibitem[Bis90]{kn:bis90} Matt Bishop. \newblock A {S}ecurity {A}nalysis of the {NTP} {P}rotocol, 1990. \bibitem[Bis91]{kn:bis91} Matt Bishop. \newblock A proactive password checker. \newblock In D.T. Lindsay and W.L. Price, editors, {\em Proceedings of the 7th International Conference on Information Security}, pages 150--158, Mayo 1991. \bibitem[Bis92]{kn:bis92} Matt Bishop. \newblock Anatomy of a proactive password changer. \newblock In {\em Proceedings of {\sc usenix} Unix Security III}. The {\sc usenix} Association, 1992. \bibitem[Bis95]{kn:bis95b} Matt Bishop. \newblock Race conditions, files and security flaws; or the tortoise and the hare {\it redux}. \newblock Technical Report CSE-95-8, University of California at Davis, 1995. \bibitem[BK95]{kn:bis95} Matt Bishop and Daniel~V. Klein. \newblock Improving system security via proactive password checking. \newblock {\em Computers \& Security}, 14(3):233--249, 1995. \bibitem[Bla93]{kn:cfs93} Matt Blaze. \newblock A {C}ryptographic {F}ile {S}ystem for {U}nix. \newblock In {\em Proceedings of the 1st {ACM} {C}onference on Computer and Communications Security}, pages 9--16. ACM, Noviembre 1993. \bibitem[BM91]{kn:bel91} Steven~M. Bellovin and Michael Merritt. \newblock Limitations of the {K}erberos {A}uthentication {S}ystem. \newblock In {\em Proceedings of the {W}inter 1991 {\sc usenix} {C}onference}, pages 253--267. The {\sc usenix} Association, Enero 1991. \bibitem[BPB00]{kn:bal00} Bill Ball, David Pitts, and William Ball. \newblock {\em Red Hat Linux 7 Unleashed}. \newblock Sams Publishing, 2000. \bibitem[C{\etalchar{+}}91]{kn:rfc1244} Dave Curry et~al. \newblock {\em {RFC1244}: {S}ite {S}ecurity {H}andbook}. \newblock Internet Activities Board, Julio 1991. \bibitem[C{\etalchar{+}}98]{kn:cow98} Crispin Cowan et~al. \newblock Stack{G}uard: automatic adaptative detection and prevention of buffer--overflow attacks. \newblock In {\em Proceedings of the 7th {\sc usenix} Security Symposium}. The {\sc usenix} Association, Enero 1998. \bibitem[CA97a]{kn:cos97a} Bryan Costales and Eric Allman. \newblock {\em Sendmail}. \newblock O\'{}Reilly \& Associates, 2nd edition, Enero 1997. \bibitem[CA97b]{kn:cos97b} Bryan Costales and Eric Allman. \newblock {\em Sendmail Desktop Reference}. \newblock O\'{}Reilly \& Associates, Marzo 1997. \bibitem[Cab96]{kn:cab96} Pino Caballero. \newblock {\em Introducci\'on a la Criptograf\'{\i}a}. \newblock Ra-Ma, 1996. \bibitem[Caj82]{kn:san82} Valentin~Sanz Caja. \newblock {\em Vulnerabilidad y seguridad de los sistemas inform\'aticos}. \newblock Fundaci\'on Citema, 1982. \bibitem[CB94]{kn:che94} William~R. Cheswick and Steven~M. Bellovin. \newblock {\em Firewalls and Internet Security: Repelling the wily hacker}. \newblock Addison Wesley, 1994. \bibitem[CC86]{kn:cor86} D.B. Cornish and R.~V. Clarke. \newblock {\em The Reasoning Criminal: Rational Choice Perspectives on Offending}. \newblock Springer-Verlag, 1986. \bibitem[CDK94]{kn:cou94} G.F. Couloris, J.~Dollimore, and T.~Kindberg. \newblock {\em Distributed Systems. Concepts and design}. \newblock Addison Wesley, 2nd edition, 1994. \bibitem[CDM97]{kn:car97} R\'emy Card, Eric Dumas, and Frack M\'evel. \newblock {\em Programaci\'on Linux 2.0: API de sistema y funcionamiento del n\'ucleo}. \newblock Eyrolles, 1997. \bibitem[Cen91]{kn:ncsc91} National Computer~Security Center. \newblock Data {R}emanence in {A}utomated {I}nformation {S}ystems. \newblock Technical Report NCSC-TG-025, National Computer Security Center, Septiembre 1991. \bibitem[CER99]{kn:cert99} CERT. \newblock {CERT} {A}dvisory {CA}--99--02. {T}rojan {H}orses. \newblock Technical report, Computer Emergency Response Team, Marzo 1999. \bibitem[CES91]{kn:cesid} CESID. \newblock {\em Glosario de t\'erminos de {C}riptolog\'{\i}a}. \newblock Centro Superior de Informaci\'on de la Defensa, 1991. \bibitem[CH99]{kn:ciu99} Stephen Ciullo and Daniel Hinojosa. \newblock {HP-UX} kernel tuning and performance guide. \newblock http://www.hp.com/techpartners/tuning.html, 1999. \bibitem[Cha92]{kn:cha92} D.~Brent Chapman. \newblock Network ({I}n){S}ecurity through {\sc ip} packet filtering. \newblock In {\em Proceedings of the third {\sc usenix} Security Symposium}, pages 63--76. The {\sc usenix} Association, Septiembre 1992. \bibitem[Che92]{kn:ches92} William~R. Cheswick. \newblock An evening with {B}erferd, in which a cracker is lured, endured, and studied. \newblock In {\em Proceedings of the Winter {\sc usenix} Conference}. The {\sc usenix} Association, Enero 1992. \bibitem[CHN{\etalchar{+}}92]{kn:che92} Andrew Cherry, Mark~W. Henderson, William~K. Nickless, Robert Olson, and Gene Rackow. \newblock Pass or fail: A new test for password legitimacy, 1992. \bibitem[CHS91]{kn:cor91} Bruce Corbridge, Robert Henig, and Charles Slater. \newblock Packet filtering in an {\sc ip} router. \newblock In {\em Proceedings of the Fifth LISA Conference}, pages 227--232. The {\sc usenix} Association, Octubre 1991. \bibitem[CKL97]{kn:ko97} M.~Ruschitzka C.~Ko and K.~Levitt. \newblock Execution monitoring of security--critical programs in distributed systems: A specification--based approach. \newblock In {\em Proceedings of the 1997 {\sc ieee} Symposium on Security and Privacy}, pages 175--187. {\sc ieee} Computer Society, Mayo 1997. \bibitem[Coc73]{kn:coc73} C.C. Cocks. \newblock A note on non--secret encryption. \newblock Technical report, CESG, Noviembre 1973. \bibitem[Coh84]{kn:coh94} Fred Cohen. \newblock Computer viruses: theory and experiments. \newblock In {\em 7th {DoD}/{NBS} Computer Security Conference Proceedings}, pages 240--263, Septiembre 1984. \bibitem[Coh99]{kn:coh99} Fred Cohen. \newblock Simulating {C}yber {A}ttacks, {D}efenses and {C}onsequences. \newblock http://all.net/journal/ntb/simulate/simulate.html, Mayo 1999. \bibitem[CoIST99]{kn:nrc99} National Research~Council Committee~on Information Systems~Trustworthiness. \newblock {\em Trust in Cyberspace}. \newblock National Academy Press, 1999. \bibitem[Com88]{kn:apo88} Apollo Computer. \newblock Managing {S}ys{V} {S}ystem {S}oftware. \newblock Technical Report 010851-A00, Apollo Computer, Inc. (Hewlett Packard), Junio 1988. \bibitem[Com95]{kn:com95} Douglas~E. Comer. \newblock {\em Internetworking with {\sc tcp/ip}. Volume 1: {P}rinciples, {P}rotocols \& {A}rchitecture}. \newblock Prentice Hall, 3rd edition, 1995. \bibitem[Con99]{kn:ids99} Intrusion Detection~System Consortium. \newblock Intrusion {D}etection {S}ystems buyer\'{}s guide. \newblock Technical report, {ICSA}.{NET}, 1999. \bibitem[Cow92]{kn:cow92} Randle Cowcher. \newblock Physical {S}ecurity. \newblock In Keith~M. Jackson and Jan Hruska, editors, {\em Computer Security Reference Book}, chapter~24, pages 311--332. Butterworth-Heinemann, 1992. \bibitem[CR94]{kn:chr94} Kaare Christian and Susan Richter. \newblock {\em The Unix Operating System}. \newblock John Wiley \& Sons, 1994. \bibitem[Cru00]{kn:kru00} Jeff Crume. \newblock {\em Inside Internet Security: What hackers don\'{}t want you to know}. \newblock Addison Wesley, 2000. \bibitem[CWP{\etalchar{+}}00]{kn:cow00} Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole. \newblock Buffer {O}verflows: {A}ttacks and {D}efenses for the {V}ulnerability of the {D}ecade. \newblock In {\em Proceedings of the {\sc sans} 2000 Conference}. The {\sc sans} Institute, 2000. \bibitem[CZ95]{kn:bre95} D.~Brent Chapman and Elizabeth~D. Zwicky. \newblock {\em Building {I}nternet {F}irewalls}. \newblock O\'{}Reilly \& Associates, 1st edition, Noviembre 1995. \bibitem[dA88]{kn:alv88} Ana~Maria de~Alvar\'e. \newblock How crackers crack passwords, or what passwords to avoid. \newblock Technical Report UCID-21515, Lawrence Livermore National Laboratory, Septiembre 1988. \bibitem[Dae96]{kn:dae96b} Daemon9. \newblock {IP}--{S}poofing demystified. \newblock {\em Phrack Magazine}, 7(48), Junio 1996. \bibitem[Dau97]{kn:dau97} John Daugman. \newblock Iris recognition for personal identification, 1997. \bibitem[Dau98]{kn:dau98} John Daugman. \newblock Recognizing persons by their iris patterns. \newblock In {\em Biometrics: {P}ersonal {I}dentification in {N}etworked {S}ociety}, pages 103--121. Kluwer, 1998. \bibitem[Den83]{kn:den83} Dorothy Denning. \newblock {\em Cryptography and Data Security}. \newblock Addison-Wesley, 1983. \bibitem[Den90]{kn:den90} P.~Denning. \newblock {\em Computers under attack}. \newblock ACM Press, 1990. \bibitem[Det01]{kn:det01} Dethy. \newblock Examining portscan methods -- {A}nalysing {A}udible {T}echniques, January 2001. \newblock http://www.synnergy.net/downloads/papers/portscan.txt. \bibitem[DFW96]{kn:dea96} Drew Dean, Edward~W. Felten, and Dan~S. Wallach. \newblock Java {S}ecurity: from {H}ot{J}ava to {N}etscape and beyond. \newblock In {\em Proceedings of the {IEEE} {S}ymposium on {S}ecurity and {P}rivacy}, 1996. \bibitem[DH76]{kn:dh76} W.~Diffie and M.~E. Hellman. \newblock New directions in cryptography. \newblock {\em IEEE Transactions on Information Theory}, IT-22:644--654, Noviembre 1976. \bibitem[DH77]{kn:dif77} W.~Diffie and M.E. Hellman. \newblock Exhaustive cryptanalysis of the {\sc nbs} data encryption standad. \newblock {\em Computer}, 10(6):74--84, Junio 1977. \bibitem[Dik99]{kn:dik99} Casper Dik. \newblock {S}olaris 2 {FAQ}, Octubre 1999. \newblock ftp://ftp.wins.uva.nl/pub/solaris/. \bibitem[DNO01]{kn:vas01} Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica. \newblock {\em The {S}olaris {F}ingerprint {D}atabase -- {A} {S}ecurity {T}ool for {S}olaris {O}perating {E}nvironment {F}iles}. \newblock Sun Microsystems, Mayo 2001. \newblock Sun BluePrints OnLine. \bibitem[DP84]{kn:dav84} D.~W. Davies and W.~L. Price. \newblock {\em Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer}. \newblock John Wiley and Sons, New York, 1984. \bibitem[Duf89]{kn:duf89} Tom Duff. \newblock Experience with viruses on {UNIX} systems. \newblock In {\em {\sc usenix} Computing Systems}, volume~2, 1989. \bibitem[Ell70]{kn:ell70} J.~H. Ellis. \newblock The possibility of {N}on--{S}ecret digital encryption. \newblock Technical report, CESG, Enero 1970. \bibitem[ER89]{kn:er89} M.W. Eichin and J.A. Rochlis. \newblock With microscope and tweezers: An analysis of the {I}nternet {V}irus of {N}ovember 1988. \newblock In {\em IEEE Security and Privacy}, pages 326--343, 1989. \bibitem[Esc98]{kn:esc98} Terry Escamilla. \newblock {\em Intrusion {D}etection: {N}etwork {S}ecurity beyond the {F}irewall}. \newblock John Wiley and Sons, 1998. \bibitem[Eve92]{kn:eve92} David Everett. \newblock Identity verification and biometrics. \newblock In Keith~M. Jackson and Jan Hruska, editors, {\em Computer Security Reference Book}, chapter~10, pages 37--73. Butterworth-Heinemann, 1992. \bibitem[FBDW96]{kn:fel96} Edward~W. Felten, Dirk Balfanz, Drew Dean, and Dan~S. Wallach. \newblock Web {S}poofing: an {I}nternet {C}on {G}ame. \newblock Technical Report 540--96, Princeton University Department of Computer Science, 1996. \newblock Revisado en febrero de 1997. \bibitem[Fen99]{kn:fen99} Carole Fennelly. \newblock The human side of computer security. \newblock {\em SunWorld}, Julio 1999. \bibitem[Fis95]{kn:fis95} John Fisher. \newblock Securing {X} {W}indows. \newblock Technical Report CIAC-2316 R.0, Department of Energy Computer Incident Advisory Capability -- CIAC, Agosto 1995. \bibitem[FK90]{kn:fel90} David~C. Feldmeirer and Philip~R. Karn. \newblock {UNIX} password security - ten years later. \newblock In G.~Brassard, editor, {\em CRYPTO89}, pages 44--63. Springer-Verlag, 1990. \newblock Lecture Notes in Computer Science No.\ 435. \bibitem[Fly00a]{kn:fly00b} Hal Flynn. \newblock Back to the {B}asics: {S}olaris and inetd.conf, Marzo 2000. \newblock http://www.securityfocus.com/focus/sun/articles/inetd[1,2].html. \bibitem[Fly00b]{kn:fly00a} Hal Flynn. \newblock Back to the {B}asics: {S}olaris default processes and init.d, part {III}, Junio 2000. \newblock http://www.securityfocus.com/focus/sun/articles/b5.html. \bibitem[FPA98]{kn:tit98} Dan Farmer, Brad Powell, and Matthew Archibald. \newblock Titan. \newblock In {\em Proceedings of the 12th Systems Administration Conference -- LISA\'{}98}. The {\sc usenix} Association, Diciembre 1998. \bibitem[Fre98]{kn:fre98} Martin Freiss. \newblock {\em Protecting networks with {SATAN}}. \newblock O'Reilly \& Associates, 1st edition, Mayo 1998. \bibitem[Fri95]{kn:fri95} {\AE}leen Frisch. \newblock {\em Essential System Administration}. \newblock O\'{}Reilly \& Associates, 1995. \bibitem[Fyo98]{kn:fyo98} Fyodor. \newblock {R}emote {OS} detection via {\sc tcp/ip} {S}tack {F}ingerprinting, Octubre 1998. \newblock http://www.insecure.org/nmap/nmap-fingerprinting-article.html. \bibitem[G{\etalchar{+}}93]{kn:gli93} Virgil~D. Gligor et~al. \newblock A {G}uide to understanding {C}overt {C}hannel {A}nalysis of {T}rusted {S}ystems. \newblock Technical Report NCSC-TG-030, National Computer Security Center, Noviembre 1993. \bibitem[Gal96a]{kn:gal96} Miguel~\'Angel Gallardo. \newblock Informatoscopia y tecnolog\'{\i}a forense. \newblock In {\em \'Ambito Jur\'{\i}dico de las Tecnolog\'{\i}as de la Informaci\'on}. Consejo General del Poder Judicial, 1996. \bibitem[Gal96b]{kn:gal96a} Miguel~\'Angel Gallardo. \newblock Seguridad (e inseguridad) en {J}ava. \newblock {\em Seguridad en Inform\'atica y Comunicaciones}, (20), Junio 1996. \bibitem[Gal96c]{kn:gal96b} Peter Galvin. \newblock Controlling {ACL}s. \newblock {\em Sun{W}orld}, Agosto 1996. \bibitem[Gar95]{kn:gar95} Simson Garfinkel. \newblock {\em {PGP}: {P}retty {G}ood {P}rivacy}. \newblock O'Reilly \& Associates, Enero 1995. \bibitem[GB97]{kn:nist97} Barbara Guttman and Robert Bagwill. \newblock Internet {S}ecurity {P}olicy: {A} {T}echnical {G}uide. \newblock Technical report, National Institute of Standards and Technology, Julio 1997. \bibitem[GB99]{kn:gon99} Marcus Goncalves and Steven Brown. \newblock {\em Check Point Firewall--1 Administration Guide}. \newblock McGrawHill, 1999. \bibitem[GC94]{kn:goo94} Berny Goodheart and James Cox. \newblock {\em The Magic Garden Explained: The Internals of {U}nix System {V} {R}elease 4, an Open Systems Design}. \newblock Prentice Hall, 1994. \bibitem[GKK97]{kn:gue97} Eric Guerrino, Mike Kahn, and Ellen Kapito. \newblock User authentication and encryption overview, 1997. \bibitem[GL91]{kn:gl91} T.D. Garvey and Teresa~F. Lunt. \newblock Model--based {I}ntrusion {D}etection. \newblock In {\em Proceedings of the 14th National Computer Security Conference}, pages 372--385, Octubre 1991. \bibitem[Gon97]{kn:gon97} Marcus Goncalves. \newblock {\em Firewalls Complete}. \newblock McGrawHill, 1997. \bibitem[Gra00]{kn:gra00} Robert~David Graham. \newblock Network {I}ntrusion {D}etection {S}ystems {FAQ} v. 0.8.3, Marzo 2000. \newblock http://www.robertgraham.com/pubs/network-intrusion-detection.html. \bibitem[Gre99]{kn:gre99} Peter~H. Gregory. \newblock {\em Solaris {S}ecurity}. \newblock Prentice Hall and Sun Microsystems Press, 1st edition, 1999. \bibitem[Gre00]{kn:gren00} Mark Grennan. \newblock Firewall and {P}roxy {S}erver {HOWTO}. \newblock http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html, 2000. \bibitem[GS96]{kn:spa96} Simson Garfinkel and Eugene~H. Spafford. \newblock {\em Practical Unix \& Internet Security}. \newblock O'Reilly \& Associates, 2nd edition, Abril 1996. \bibitem[GS97]{kn:gar97} Simson Garfinkel and Eugene~H. Spafford. \newblock {\em Web Security \& Commerce}. \newblock O'Reilly \& Associates, 1st edition, Junio 1997. \bibitem[GSTY96]{kn:gob96} H.~Gobioff, S.~Smith, J.D. Tygar, and B.~Yee. \newblock Smart cards in hostile environments. \newblock In {\em Proceedings of the 2nd {\sc usenix} Workshop on Electronic Commerce}. The {\sc usenix} Association, Noviembre 1996. \bibitem[Gun96]{kn:gun96} Shishir Gundavaram. \newblock {\em CGI Programming on the World Wide Web}. \newblock O'Reilly \& Associates, 1st edition, Marzo 1996. \bibitem[GUQ92]{kn:gui92} Louis~Claude Guillou, Michel Ugon, and Jean-Jacques Quisquater. \newblock The smart card -- a standardized security device dedicated to public cryptology. \newblock In {\em Contemporary Cryptology -- The Science of Information Integrity}, pages 561--614. IEEE Press, 1992. \bibitem[Gut96]{kn:gut96} Peter Gutmann. \newblock Secure deletion of data from magnetic and solid-state memory. \newblock In {\em Sixth USENIX Security Symposium Proceedings}. The {\sc usenix} Association, Julio 1996. \bibitem[H{\etalchar{+}}02]{kn:oss} Pete Herzot et~al. \newblock Open--{S}ource {S}ecurity {T}esting {M}ethodology {M}anual v2.0. \newblock Technical report, The Ideahamster Organization, Febrero 2002. \bibitem[Hal94]{kn:hal94} Neil Haller. \newblock The {\sc s/key} one time password system. \newblock In {\em Proceedings of the {\sc isoc} Symposium on network and distributed systems security}, Febrero 1994. \bibitem[HB96]{kn:tod96} L.~Todd Heberlein and Matt Bishop. \newblock Attack class: Address spoofing. \newblock In {\em Proceedings of the 19th National Information Systems Security Conference}, pages 371--377, Octubre 1996. \bibitem[HC83]{kn:hol83} Richard~C. Hollinger and John~P. Clark. \newblock {\em Theft by Employees}. \newblock Lexington Books, 1983. \bibitem[Her00]{kn:her00} Peter Hernberg. \newblock User {A}uthentication {HOWTO}. \newblock http://www.tldp.org/HOWTO/User-Authentication-HOWTO/, Mayo 2000. \bibitem[Hig88]{kn:hig88} H.J. Highland. \newblock Electromagnetic {E}avesdropping {M}achines for {C}hristmas? \newblock {\em Computers and {S}ecurity}, 7(4), 1988. \bibitem[HJAW88]{kn:hec88} Matthew~S. Hecht, Abhai Johri, Radhakrishna Aditham, and T.~John Wei. \newblock Experience adding {C}2 {S}ecurity {F}eatures to {U}nix. \newblock In {\em {\sc usenix} Conference Proceedings}, pages 133--146. The {\sc usenix} Association, Verano 1988. \bibitem[HLMS90]{kn:hea90} Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla. \newblock The architecture of a {N}etwork {L}evel {I}ntrusion {D}etection {S}ystem. \newblock Technical Report CS90--20, University of New Mexico, Agosto 1990. \bibitem[HN{\etalchar{+}}99]{kn:ha99} Bao Ha, Tina Nguyen, et~al. \newblock {\em Slackware Linux Unleashed}. \newblock Sams Publishing, 1999. \bibitem[HP96]{kn:hp96} Hewlet-Packard. \newblock {\em Managing {HP-UX} software with {SD-UX}}. \newblock HP, Enero 1996. \newblock HP Part Number B2355-90107. \bibitem[HP00a]{kn:hp00b} Hewlett-Packard. \newblock {\em HP-UX {P}atch {M}anagement: a guide to patching {HP-UX} 10.x systems}. \newblock Hewlett--Packard, Enero 2000. \newblock HP Part Number B3782--90828. \bibitem[HP00b]{kn:hp00} Hewlett-Packard. \newblock {\em Managing Systems and Workgroups: A Guide for HP-UX System Administrators}. \newblock Hewlett--Packard, 2000. \newblock HP Part Number B2355--90701. \bibitem[Hu91]{kn:hu91} W.~M. Hu. \newblock Reducing timing channels with fuzzy time. \newblock In {\em Proceedings of the 1991 Symposium on Research in Security and Privacy}, pages 8--20. {\sc ieee} Computer Society, Mayo 1991. \bibitem[Hun92]{kn:hun92} Craig Hunt. \newblock {\em TCP/IP Network Administration}. \newblock O\'{}Reilly \& Associates, 1992. \bibitem[Huo98]{kn:huo98} Simo Huopio. \newblock Biometric {I}dentification. \newblock In {\em Seminar on Network Security: Authorization and Access Control in Open Network Environment}, 1998. \bibitem[HW01]{kn:hou01} Kevin~J. Houle and George~M. Weaver. \newblock Trends in {D}enial of {S}ervice attack technology. \newblock Technical report, CERT Coordination Center, Carnegie Mellon University, Octubre 2001. \bibitem[IBM97a]{kn:ibm97c} IBM. \newblock {\em {AIX} {V}ersion 4.3 {P}roblem {S}olving {G}uide and {R}eference}. \newblock IBM, Octubre 1997. \newblock IBM RedBook SC23--4123. \bibitem[IBM97b]{kn:ibm97b} IBM. \newblock {\em {AIX} {V}ersion 4.3 {S}ystem {M}anagement {G}uide: {C}ommunication and {N}etworks}. \newblock IBM, Octubre 1997. \newblock IBM RedBook SC23--4127. \bibitem[IBM97c]{kn:ibm97} IBM. \newblock {\em {AIX} {V}ersion 4.3 {S}ystem {M}anagement {G}uide: {O}perating {S}ystem and {D}evices}. \newblock IBM, Octubre 1997. \newblock IBM RedBook SC23--2529. \bibitem[IBM00a]{kn:ibm00} IBM. \newblock {\em {AIX} 4.3 {E}lements of {S}ecurity. {E}ffective and {E}fficient {I}mplementation}. \newblock IBM, Agosto 2000. \newblock IBM RedBook SG24--5962-00. \bibitem[IBM00b]{kn:ibm00b} IBM. \newblock {\em {IBM} {C}ertification {S}tudy {G}uide. {AIX} {P}roblem {D}etermination {T}ools and {T}echniques}. \newblock IBM, Diciembre 2000. \newblock IBM RedBook SG24--6185-00. \bibitem[Ilg92]{kn:il93} Koral Ilgun. \newblock {\sc ustat}: A real--time intrusion detection system for unix. \newblock In {\em Proceedings of the 1993 Symposium on Security and Privacy}, pages 16--28. {\sc ieee} Computer Society, Mayo 1992. \bibitem[Ins97]{kn:ins97} Shawn Instentes. \newblock Stack {S}mashing: {W}hat to do? \newblock {\em ;login:}, 22(2), Abril 1997. \bibitem[ISV95]{kn:isv95} David Icove, Karl Seger, and William VonStorch. \newblock {\em Computer Crime. A Crimefighter's handbook}. \newblock O'Reilly \& Associates, 1995. \bibitem[JF01]{kn:cap01} David W.~Chapman Jr. and Andy Fox. \newblock {\em Cisco\copyright\ Secure PIX\copyright\ Firewalls}. \newblock Cisco Press, 2001. \bibitem[JTY97]{kn:jan97} Philippe Janson, Gene Tsudik, and Moti Yung. \newblock Scalability and flexibility in authentication services: The {K}rypto{K}night {A}pproach. \newblock In {\em Proceedings of {INFOCOM}\'{}97}. {\sc ieee} Computer Society, 1997. \bibitem[JV93]{kn:jv93} Harold~S. Javitz and Alfonso Valdes. \newblock The {NIDES} {S}tatistical {C}omponent: {D}escription and {J}ustification. \newblock Technical report, SRI International, Marzo 1993. \bibitem[Kah67]{kn:kah67} David Kahn. \newblock {\em The Codebreakers}. \newblock McMillan, 1967. \bibitem[Kat88]{kn:kat88} J.~Katz. \newblock {\em Seductions of Crime: Moral and Sensual Attractions in Doing Evil}. \newblock Basic Books, 1988. \bibitem[Kem98]{kn:ke98} Richard~A. Kemmerer. \newblock {\sc nstat}: {A} {M}odel--{B}ased {R}eal--{T}ime {N}etwork {I}ntrusion {D}etection {S}ystem. \newblock Technical Report TRCS97-18, University of California, Junio 1998. \bibitem[KI99]{kn:ked99} Gershon Kedem and Yuriko Ishihara. \newblock Brute force attack on {U}nix passwords with {\sc simd} computer. \newblock In {\em Proceedings of the 8th {\sc usenix} Security Symposium}. The {\sc usenix} Association, Agosto 1999. \bibitem[Kir95]{kn:kir95} Olaf Kirch. \newblock {\em The {L}inux {N}etwork {A}dministrators\'{} {G}uide}. \newblock O\'{}Reilly \& Associates, 1995. \bibitem[KK92]{kn:kob92} David Koblas and Michelle Koblas. \newblock Socks. \newblock In {\em Proceedings of the Third Unix Security Symposium}, pages 77--83. The {\sc usenix} Association, Septiembre 1992. \bibitem[Kla95]{kn:kla95} Christopher Klaus. \newblock Stealth {S}canning -- {B}ypassing {F}irewalls and {\sc satan} {D}etectors, Diciembre 1995. \newblock Internet Security Systems, Inc. \bibitem[Kle90]{kn:kle90} Daniel~V. Klein. \newblock Foiling the cracker: A survey of, and improvements to, password security. \newblock In {\em Unix Security Workshop}, pages 5--14. The {\sc usenix} Association, Agosto 1990. \bibitem[KMM95]{kn:koh95} R.~Kohno, R.~Meidan, and L.B. Milstein. \newblock Spread {S}pectrum {A}ccess {M}ethods for {W}ireless {C}ommunications. \newblock {\em {IEEE} Communications Magazine}, 33:58--67, Enero 1995. \bibitem[Ko96]{kn:ko96} Calvin Cheuk~Wang Ko. \newblock {\em Execution Monitoring of Security--Critical Programs in a Distributed System: A Specification--Based Approach}. \newblock PhD thesis, University of California at Davis, 1996. \bibitem[KP84]{kn:ker84} Brian~W. Kernighan and Rob Pike. \newblock {\em The {U}nix Programming Environment}. \newblock Prentice Hall, 1984. \bibitem[KS93]{kn:kim93} Gene~H. Kim and Eugene~H. Spafford. \newblock The design and implementation of {T}ripwire: A file system integrity checker. \newblock Technical Report CSD-TR-93-071, Purdue University, Noviembre 1993. \bibitem[KS94a]{kn:kim94a} Gene~H. Kim and Eugene~H. Spafford. \newblock Experiences with {T}ripwire: using integrity checkers for intrusion detection. \newblock In {\em Systems Administration, Networking and Security Conference {III}}. The {\sc usenix} Association, Abril 1994. \bibitem[KS94b]{kn:kim94b} Gene~H. Kim and Eugene~H. Spafford. \newblock Writing, supporting and evaluating {T}ripwire: a publically available security tool. \newblock In {\em Proceedings of the {\sc usenix} Applications Development Symposium}. The {\sc usenix} Association, 1994. \bibitem[KS94c]{kn:ks94} Sandeep Kumar and Eugene Spafford. \newblock An {A}pplication of {P}attern {M}atching in {I}ntrusion {D}etection. \newblock Technical Report CSD-TR-94-013, Purdue University, Marzo 1994. \bibitem[KT97]{kn:kra} Micki Krause and Harold~F. Tipton. \newblock {\em Handbook of Information Security Management}. \newblock CRC Press LLC, 1997. \bibitem[Kum95]{kn:ku95} Sandeep Kumar. \newblock {\em Classification and {D}etection of {C}omputer {I}ntrusions}. \newblock PhD thesis, Purdue University, Agosto 1995. \bibitem[L{\etalchar{+}}92]{kn:lu92} Teresa~F. Lunt et~al. \newblock A real--time intrusion detection expert system ({\sc ides}). final technical report. \newblock Technical report, SRI International, Febrero 1992. \bibitem[Lam73]{kn:lam73} B.~W. Lampson. \newblock A note on the {C}onfinement {P}roblem. \newblock {\em Communications of the ACM}, 16(10):613--615, Octubre 1973. \bibitem[Lam81]{kn:lam81} Leslie Lamport. \newblock Password authentication with insecure communication. \newblock {\em Communications of the ACM}, 24(11):770--772, Noviembre 1981. \bibitem[Lap91]{kn:lap91} J.C. Laprie. \newblock {\em Dependability: Basic concepts and terminology}. \newblock Springer-Verlag, 1991. \bibitem[LBMC94]{kn:lan94} Carl~E. Landwher, Alan~R. Bull, John~P. McDermott, and William~S. Choi. \newblock A taxonomy of computer program security flaws, with examples. \newblock {\em ACM Computing Surveys}, 3(26), Septiembre 1994. \bibitem[Lip75]{kn:lip75} Steven~B. Lipner. \newblock A note on the {C}onfinement {P}roblem. \newblock {\em Operating Systems Review}, 9(5):192--196, Noviembre 1975. \bibitem[Lis95]{kn:jay95} Justin~Jay Lister. \newblock {\em Intrusion {D}etection {S}ystems: an Introduction to the detection and prevention of computer abuse}. \newblock PhD thesis, University of Wollongong, 1995. \bibitem[LU02]{kn:vel02} Juan Miguel~Velasco L\'opez-Urda. \newblock Seguridad bajo control: {\it `outsourcing vs. in house'}, las claves para evaluar. \newblock {\em Seguridad en Inform\'atica y Comunicaciones}, (49), Abril 2002. \bibitem[Lun90]{kn:lun90} Teresa~F. Lunt. \newblock Detecting {I}ntruders in {C}omputer {S}ystems. \newblock In {\em Proceedings of the Sixth Annual Symposium and Technical Displays on Physical and Electronic Security}, 1990. \bibitem[MA94]{kn:rc570} Roger Merckling and Anne Anderson. \newblock {RFC} 57.0: {S}mart {C}ard {I}ntroduction, Marzo 1994. \bibitem[Mai96]{kn:mai96} Uriel Maimon. \newblock Port {S}canning without the {\sc syn} flag. \newblock {\em Phrack Magazine}, 7(49), 1996. \bibitem[Man91]{kn:man91} Jason Manger. \newblock {\em Unix: The complete book}. \newblock Sigma Press, 1991. \bibitem[Man96]{kn:man96} U.~Manber. \newblock A simple scheme to make passwords based on {O}ne-{W}ay functions much harder to crack. \newblock {\em Computers \& Security}, 15(2):171--176, 1996. \bibitem[Mar88a]{kn:mar88a} John Markhoff. \newblock Author of computer `virus' is son of {U}.{S}. electronic security expert. \newblock {\em The New York Times}, 5 Noviembre 1988. \bibitem[Mar88b]{kn:mar88b} John Markhoff. \newblock A family\'{}s passion for computers, gone sour. \newblock {\em The New York Times}, 11 Noviembre 1988. \bibitem[McC00]{kn:mcc00} Ron McCarthy. \newblock {IP} {F}ilter on {S}olaris. \newblock {\em Sys Admin Magazine}, 2000. \newblock Solaris Suplement. \bibitem[McH95]{kn:mch95} John McHugh. \newblock Covert channel analysis. \newblock In {\em Handbook for the Computer Security Certification of Trusted Systems}. Naval Research Laboratory, Enero 1995. \bibitem[McI89]{kn:mci89} M.~Douglas McIlroy. \newblock Virology 101. \newblock In {\em {\sc usenix} Computing Systems}, volume~2, 1989. \bibitem[McM97]{kn:mcm97} Dave McMordie. \newblock Texture analysis of the human iris for high security authentication. \newblock Technical Report Image Processing 304-529, Department of Electrical Engineering, McGill University, Diciembre 1997. \bibitem[Mel97]{kn:mel97} Mark~K. Mellis. \newblock Surprises in the {DMZ}. \newblock {\em ;login:}, 22(1), Febrero 1997. \bibitem[Men98]{kn:phrack54} Phunda Menta. \newblock Linux and random source bleaching. \newblock {\em Phrack Magazine}, 8(54), 1998. \bibitem[Mey89]{kn:mey89} Gordon~R. Meyer. \newblock {\em The Social Organization of the Computer Underground}. \newblock PhD thesis, Northern Illinois University, 1989. \bibitem[MF96]{kn:mcg96} Gary McGraw and Edward Felten. \newblock {\em Java Security: Hostile Applets, Holes and Antidotes}. \newblock John Wiley and Sons, 1996. \bibitem[MFS90]{kn:mil90} Barton~P. Miller, Lars Fredriksen, and Bryan So. \newblock An empirical study of the reliability of {U}nix utilities. \newblock {\em Communications of the ACM}, 33(12):32--44, Diciembre 1990. \bibitem[Mic98]{kn:sun98} Sun Microsystems. \newblock Solaris 7 {S}ystem {A}dministration {G}uide, {V}olume {I}, Octubre 1998. \newblock http://docs.sun.com/. \bibitem[MK94]{kn:mos94} Ira~S. Moskowitz and Myong~H. Kang. \newblock {C}overt {C}hannels -- {H}ere to {S}tay? \newblock In {\em Proceedings of COMPASS\'{}94}, pages 235--243. {\sc ieee} Press, Junio 1994. \bibitem[MK99]{kn:steg99} Andrew~D. McDonald and Markus~G. Kuhn. \newblock Steg{FS}: {A} {S}teganographic {F}ile {S}ystem for {L}inux. \newblock In Andreas Pfitzmann, editor, {\em Information Hiding}, pages 461--475. Springer-Verlag, 1999. \bibitem[MKL{\etalchar{+}}95]{kn:mil95} Barton~P. Miller, David Koski, Cjin~Pheow Lee, Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. \newblock Fuzz revisited: A re-examination of the reliability of {U}nix utilities and services. \newblock ftp://grilled.cs.wisc.edu/technical$\_$papers/fuzz-revisited.ps, 1995. \bibitem[MM00]{kn:mau00} Jim Mauro and Richard McDougall. \newblock {\em Solaris {I}nternals: {C}ore {K}ernel {A}rchitecture}. \newblock Prentice Hall and Sun Microsystems Press, 1st edition, 2000. \bibitem[MNSS87]{kn:mil87} S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer. \newblock Kerberos {A}uthentication and {A}uthorization {S}ystem. \newblock In {\em Project {A}thena {T}echnical {P}lan}, chapter E.2.1. Massachusetts Institute of Technology, Diciembre 1987. \bibitem[Mog89]{kn:mog89} Jeffrey~C. Mogul. \newblock Simple and flexible datagram access control for {U}nix--based gateways. \newblock In {\em Proceedings of the {\sc usenix} Summer Conference}, pages 203--221. The {\sc usenix} Association, 1989. \bibitem[Mor85]{kn:mor85} Robert Morris. \newblock A {W}eakness in the 4.2{\sc bsd} {U}nix {\sc tcp/ip} {S}oftware. \newblock Technical Report CSTR--117, {\sc AT}\&{\sc T} Bell Laboratories, 1985. \bibitem[Mou00]{kn:mou00} Gerhard Mourani. \newblock Get acquainted with {L}inux {S}ecurity and {O}ptimization {S}ystem. \newblock Technical report, Open {N}etwork {A}rchitecture, Enero 2000. \bibitem[MPS{\etalchar{+}}93]{kn:muf93} Sead Muftic, Ahmed Patel, Peter Sanders, Rafael Colon, Jan Heijnsdijk, and Unto Pulkkinen. \newblock {\em Security in {O}pen {S}ystems}. \newblock John Wiley and Sons, 1993. \bibitem[MS98]{kn:meh98} Nimisha~V. Mehta and Karen~R. Sollins. \newblock Expanding and extending the security features of {J}ava. \newblock In {\em Proceedings of the 7th {\sc usenix} Security Symposium}. The {\sc usenix} Association, Enero 1998. \bibitem[MT79]{kn:mor79} Robert Morris and Ken Thompson. \newblock Password security: A case history. \newblock {\em Communications of the ACM}, 22(11), Noviembre 1979. \bibitem[MTHZ92]{kn:mol92} Refik Molva, Gene Tsudik, Els~Van Herrenweghen, and Stefano Zatti. \newblock Krypto{K}night {A}uthentication and {K}ey {D}istribution {S}ervice. \newblock In {\em Proceedings of {ESORICS} 92}, Octubre 1992. \bibitem[MvOV96]{kn:men96} Alfred~J. Menezes, Paul~C. van Oorschot, and Scott~A. Vanstone. \newblock {\em Handbook of Applied Cryptography}. \newblock CRC Press, Octubre 1996. \bibitem[NB01a]{kn:noo01b} Alex Noordergraaf and Glenn Brunette. \newblock {\em The {S}olaris {S}ecurity {T}oolkit -- {I}nstallation, {C}onfiguration and {U}sage {G}uide}. \newblock Sun Microsystems, Junio 2001. \newblock Sun BluePrints OnLine. \bibitem[NB01b]{kn:noo01} Alex Noordergraaf and Glenn Brunette. \newblock {\em The {S}olaris {S}ecurity {T}oolkit -- {I}nternals}. \newblock Sun Microsystems, Junio 2001. \newblock Sun BluePrints OnLine. \bibitem[NB01c]{kn:noo01c} Alex Noordergraaf and Glenn Brunette. \newblock {\em The {S}olaris {S}ecurity {T}oolkit -- {Q}uick {S}tart}. \newblock Sun Microsystems, Junio 2001. \newblock Sun BluePrints OnLine. \bibitem[NB01d]{kn:noo01d} Alex Noordergraaf and Glenn Brunette. \newblock {\em The {S}olaris {S}ecurity {T}oolkit -- {R}elease {N}otes}. \newblock Sun Microsystems, Junio 2001. \newblock Sun BluePrints OnLine. \bibitem[Noo01]{kn:noo01e} Alex Noordergraaf. \newblock {\em Building a {J}ump{S}tart {I}nfrastructure}. \newblock Sun Microsystems, Abril 2001. \newblock Sun BluePrints OnLine. \bibitem[Nor99]{kn:nor99} Stephen Northcutt. \newblock {\em Network Intrusion Detection: An Analyst\'{}s Handbook}. \newblock New Riders, 1999. \bibitem[NS78]{kn:nee78} R.M. Needham and M.D. Schroeder. \newblock Using encryption for authentication in large networks of computers. \newblock {\em Communications of the {ACM}}, 21(12):993--999, Diciembre 1978. \bibitem[NSS89]{kn:nem89} Evi Nemeth, Garth Snyder, and Scott Seebass. \newblock {\em Unix {S}ystem {A}dministration {H}andbook}. \newblock Prentice Hall, 1989. \bibitem[NW99]{kn:noo99} Alex Noordergraaf and Keith Watson. \newblock {\em {S}olaris {O}perating {E}nvironment {N}etwork {S}ettings for {S}ecurity}. \newblock Sun Microsystems, Diciembre 1999. \newblock Sun BluePrints OnLine. \bibitem[Olo92]{kn:olo92} Tomas Olovsson. \newblock A structured approach to computer security. \newblock Technical Report 122, Chalmers University of Technology, 1992. \bibitem[One96]{kn:ale97} Aleph One. \newblock Smashing the stack for fun and profit. \newblock {\em Phrack Magazine}, 7(49), Noviembre 1996. \bibitem[Org88]{kn:iso88} International~Standards Organization. \newblock Information {P}rocessing {S}ystems - {OSI RM}. \newblock Technical Report 97 7498-2, ISO/TC, 1988. \newblock Part 2: Security Architecture. \bibitem[oS80]{kn:fips81} National~Bureau of~Standars. \newblock {DES} {M}odes of {O}peration. \newblock Technical Report NBS FIPS PUB 81, U.S. Department of Commerce, Dicembre 1980. \bibitem[oST84]{kn:nist186} National~Institute of~Standards and Technology. \newblock Digital {S}ignature {S}tandard. \newblock Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, Mayo 1984. \bibitem[OT88]{kn:rei88} Tim O\'{}Reilly and Grace Todino. \newblock {\em Managing {\sc uucp} and {U}se{N}et}. \newblock O'Reilly \& Associates, Marzo 1988. \bibitem[otUAH90]{kn:army} Department of~the US~Army~Headquarters. \newblock Basic cryptanalysis. \newblock Technical Report FM-34-40-2, United States Army, Septiembre 1990. \bibitem[P{\etalchar{+}}94]{kn:pep94} Susan Peppard et~al. \newblock {\em Unix Unleashed}. \newblock Sams Publishing, 1st edition, 1994. \bibitem[Par81]{kn:par81} Donn~B. Parker. \newblock {\em Computer Security Management}. \newblock Prentice Hall, 1981. \bibitem[Par94]{kn:par94} Donn~B. Parker. \newblock Demonstrating the elements of information security with threats. \newblock In {\em Proceedings of the 17th National Computer Security Conference}, pages 421--430, 1994. \bibitem[Par98]{kn:par98} William Parkhurst. \newblock {\em Cisco Router OSPF Design and Implementation Guide}. \newblock McGrawHill, 1998. \bibitem[PB93]{kn:pol93} W.~Timothy Polk and Lawrence~E. Bassham. \newblock Security issues in the {D}atabase {L}anguage {SQL}, Julio 1993. \bibitem[Pfl97]{kn:pfl97} Charles~P. Pfleeger. \newblock {\em Security in computing}. \newblock Prentice Hall, 1997. \bibitem[Phi97]{kn:phi97} Ken Phillips. \newblock Biometric identification comparison chart. \newblock {\em {PC} {W}eek}, Marzo 1997. \bibitem[Pit00]{kn:pit99} Jes\'us Pita. \newblock La tarjeta inteligente como medio de identificaci\'on electr\'onica y acceso a servicios de seguridad: la experiencia de la {\sc fnmt-rcm}. \newblock {\em Seguridad en Inform\'atica y Comunicaciones}, (39), Abril 2000. \bibitem[PK91]{kn:por91} P.A. Porras and R.A. Kemmerer. \newblock Analyzing covert storage channels. \newblock In {\em Proceedings of the 1991 Symposium on Research in Security and Privacy}, pages 36--51. {\sc ieee} Computer Society, Mayo 1991. \bibitem[PK92]{kn:por92} P.A. Porras and R.A. Kemmerer. \newblock Penetration state transition analysis: a rule--based intrusion detection approach. \newblock In {\em Proceedings of the 8th Computer Security Application Conference}, pages 220--229, Noviembre 1992. \bibitem[Pla83]{kn:pla83} Jos\'e Plans. \newblock {\em La pratique de l\'{}audit informatique}. \newblock Eyrolles, 1983. \bibitem[PN92]{kn:pro92} Norman~E. Proctor and Peter~G. Neumann. \newblock Architectural implications of {C}overt {C}hannels. \newblock In {\em Proceedings of the 15th National Computer Security Conference}, pages 28--43, Octubre 1992. \bibitem[Por92]{kn:por92a} Phillip~A. Porras. \newblock {\em {\sc stat}: {A} {S}tate {T}ransition {A}nalysis {T}ool for {I}ntrusion {D}etection}. \newblock PhD thesis, University of California, Junio 1992. \bibitem[PP01]{kn:pon01} Marty Poniatowski and Martin Poniatowski. \newblock {\em HP-UX 11i System Administration Handbook and Toolkit}. \newblock Prentice Hall, Abril 2001. \bibitem[PPK93]{kn:pin93} Pinkas, Parker, and Kaijser. \newblock {SESAME}: {A}n {I}ntroduction, 1993. \bibitem[RA94]{kn:ran93a} Marcus~J. Ranum and Frederick~M. Avolio. \newblock A toolkit and methods for internet firewalls. \newblock In {\em Proceedings of the Technical Summer Conference}, pages 37--44. The {\sc usenix} Association, Junio 1994. \bibitem[Rad92]{kn:rad92} Peter~V. Radatti. \newblock Computer virus awareness for {UNIX}. \newblock {\em NCSA News}, 3:8, Mayo 1992. \bibitem[Rad93]{kn:rad93} Peter~V. Radatti. \newblock The plausibility of {UNIX} virus attacks. \newblock Technical report, Cybersoft, Inc., 1993. \bibitem[Rad95]{kn:rad95} Peter~V. Radatti. \newblock Computer viruses in {U}nix networks. \newblock Technical report, Cybersoft, Inc., 1995. \bibitem[Rad97]{kn:rad97} Peter~V. Radatti. \newblock Mr{M}ean the hacker. \newblock {\em ;login:}, Octubre 1997. \bibitem[Ran93]{kn:ran93} Marcus~J. Ranum. \newblock Thinking about {F}irewalls. \newblock In {\em Proceedings of the Second {SANS} {C}onference}, Abril 1993. \bibitem[Ran95]{kn:firefaq} Marcus~J. Ranum. \newblock Firewalls {F}requently {A}sked {Q}uestions, 1995. \bibitem[Ran98]{kn:ran98} Marcus~J. Ranum. \newblock Intrusion {D}etection: {C}hallenges and {M}yths. \newblock Technical report, Network Flight Recorder, Inc., 1998. \bibitem[Ran00]{kn:ran00} Marcus~J. Ranum. \newblock The network police blotter. \newblock {\em ;login:}, 25(5), Agosto 2000. \bibitem[RCG96]{kn:rcg96} A.~Ribagorda, A.~Calvo, and M.A. Gallardo. \newblock {\em Seguridad en Unix: Sistemas Abiertos e Internet}. \newblock Paraninfo, 1996. \bibitem[Reh00]{kn:reh00} Rafeeg Rehman. \newblock {\em HP Certified: HP-UX System Administration}. \newblock Prentice Hall, Mayo 2000. \bibitem[Rei89]{kn:rei89} N.~Reichman. \newblock Breaking confidences: Organizational influences on insider trading. \newblock {\em The Sociological Quarterly}, 30:185--204, 1989. \bibitem[Ris01]{kn:ris01} Neil~B. Riser. \newblock An overview of some the current spoofing threats, Julio 2001. \newblock The {SANS} {I}nstitute. \bibitem[Rit86]{kn:rit86} Dennis~M. Ritchie. \newblock On the security of {UNIX}. \newblock In {\em UNIX System Manager's Manual, 4.3 BSD, Virtual VAX-11 Version}, pages 17:1--3. University of California, Berkeley, CA, Abril 1986. \bibitem[Riv90]{kn:riv90} Ron Rivest. \newblock The {\sc md4} message digest algorithm. \newblock In {\em Crypto\'{}90 Abstracts}, pages 281--291, Agosto 1990. \bibitem[Riv92]{kn:riv92} Ron Rivest. \newblock The {\sc md5} message digest algorithm, Abril 1992. \newblock Internet Request for Comments 1321. \bibitem[Rob94]{kn:rob94} Andrew~T. Robinson. \newblock Internet {F}irewalls: {A}n {I}ntroduction. \newblock Technical report, NetMAINE, P.O. BOX 8258, Portland, ME 04104-8258, USA, 1994. \bibitem[Roe99]{kn:roe99} Martin Roesch. \newblock Snort -- {L}ightweight {I}ntrusion {D}etection for {N}etworks. \newblock In {\em Proceedings of the 13th Systems Administration Conference -- LISA\'{}99}. The {\sc usenix} Association, Noviembre 1999. \bibitem[Rou96]{kn:dae96} Route. \newblock Project {L}oki: {\sc icmp} {T}unnelling. \newblock {\em Phrack Magazine}, 7(49), Noviembre 1996. \bibitem[Row96]{kn:row96} Craig~H. Rowland. \newblock Covert {C}hannels in the {\sc tcp/ip} {P}rotocol {S}uite, 1996. \bibitem[Roy88]{kn:roy88} Mike Royko. \newblock Here\'{}s how to stop computer vandals. \newblock {\em The Chicago Tribune}, 7 Noviembre 1988. \bibitem[Rus00]{kn:rus00} Rusty Russell. \newblock Linux {\tt ipchains} {HOWTO}, v. 1.0.8. \newblock http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html, Julio 2000. \bibitem[Rus02]{kn:rus02} Rusty Russell. \newblock Linux 2.4 {P}acket {F}iltering {HOWTO} v. 1.2. \newblock http://netfilter.samba.org/documentation/HOWTO/packet-filtering-HOWTO.txt, 2002. \bibitem[RW84]{kn:ree84} James~A. Reeds and Peter~J. Weinberger. \newblock File security and the {UNIX} system {\tt crypt} command. \newblock {\em AT\&T Bell Labs Technical Journal}, 63(8):1673--1683, Octubre 1984. \bibitem[Sal90]{kn:sal90} A.~Salomaa. \newblock {\em Public Key Cryptography}. \newblock Springer-Verlag, 1990. \bibitem[SBL90]{kn:san90} Corey Sandler, Tom Badgett, and Larry Lefkowitz. \newblock {\em {VAX} {S}ecurity: {P}rotecting the {S}ystem and the {D}ata}. \newblock John Wiley and Sons, 1990. \bibitem[Sch94]{kn:sch94} Bruce Schneier. \newblock {\em Applied Cryptography: Protocols, Algorithms and Source Code in C}. \newblock John Wiley \& Sons, 1994. \bibitem[Sch97]{kn:sch97} John Schimmel. \newblock A historical look at firewall technologies. \newblock {\em ;login:}, 22(1), Febrero 1997. \bibitem[See89]{kn:see89} Donn Seeley. \newblock A tour of the {W}orm. \newblock In {\em Proceedings of 1989 Winter {\sc usenix} Conference}. The {\sc usenix} Association, Febrero 1989. \bibitem[Sei99]{kn:sei99} Kurt Seifried. \newblock Linux {A}dministrator\'{}s {S}ecurity {G}uide. \newblock http://www.securityportal.com/lasg/, 1999. \bibitem[Sem96]{kn:sem96} Chuck Semeria. \newblock Internet {F}irewalls and {S}ecurity. \newblock Technical report, 3Com, 1996. \bibitem[Ser91]{kn:ser91} Omri Serlin. \newblock {SVR4} may become the first truly secure {U}nix. \newblock {\em {\sc unixworld}}, VIII(11):39--40, Noviembre 1991. \bibitem[SG91]{kn:sg91} Shiuhpyng~Winston Shieh and Virgil~D. Gligor. \newblock A pattern--oriented intrusion model and its applications. \newblock In {\em Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy}, pages 327--342. {\sc ieee} Computer Society, Mayo 1991. \bibitem[SH82]{kn:sho82} John~F. Shoch and Jon~A. Hupp. \newblock The worm programs -- early experience with a distributed computation. \newblock {\em Communications of the {ACM}}, 25(3):172--180, Marzo 1982. \bibitem[SH95]{kn:siy95} Karanjit Siyan and Chris Hare. \newblock {\em Internet y seguridad en redes}. \newblock Prentice Hall, 1995. \bibitem[Sha49]{kn:sha49} C.~E. Shannon. \newblock Communication theory of secrecy systems. \newblock {\em Bell Systems Technology Journal}, 28:657--715, 1949. \bibitem[Sho00]{kn:sho00} Adam Shostack. \newblock Security code review guidelines, 2000. \bibitem[Sim90]{kn:sim90} Steve Simmons. \newblock Life without root. \newblock In {\em Proceedings of the 4th Systems Administration Conference -- LISA\'{}90}. The {\sc usenix} Association, Octubre 1990. \bibitem[SK98]{kn:sch98} Bruce Schneier and John Kelsey. \newblock Cryptographic support for secure logs on untrusted machines. \newblock In {\em Proceedings of the 7th {\sc usenix} Security Symposium}. The {\sc usenix} Association, Enero 1998. \bibitem[Skl01]{kn:skl01} Sandor~W. Sklar. \newblock The {AIX} {E}rror {L}ogging {F}acility. \newblock {\em Sys Admin}, 10(6), Junio 2001. \newblock AIX Administration Supplement. \bibitem[SM70]{kn:syk70} Gresham Sykes and David Matza. \newblock Techniques of {N}eutralization: {A} {T}heory of {D}elinquency. \newblock In Marvin~E. Wolfgang et~al., editors, {\em The Sociology of Crime and Delinquency}, pages 292--299. John Wiley and Sons, 2nd edition, 1970. \bibitem[Smi92]{kn:smi92} Martin Smith. \newblock Personnel {S}ecurity. \newblock In Keith~M. Jackson and Jan Hruska, editors, {\em Computer Security Reference Book}, chapter~33, pages 417--436. Butterworth-Heinemann, 1992. \bibitem[Smi97]{kn:smi97} Nathan~P. Smith. \newblock Stack {S}mashing {V}ulnerabilities in the {U}nix {O}perating {S}ystem, 1997. \newblock http://millcomm.com/\~{}nate/machines/security/stack-smashing/. \bibitem[Smu90]{kn:smu90} Peter Smulders. \newblock The {T}hreat of {I}nformation {T}heft by {R}eception of {E}lectromagnetic {R}adiation from {RS-232} {C}ables. \newblock {\em Computers and {S}ecurity}, 9(1), 1990. \bibitem[Spa88]{kn:spa88} Eugene~H. Spafford. \newblock The {I}nternet {W}orm program: An analysis. \newblock Technical Report CSD-TR-823, Purdue University Department of Computer Science, 1988. \bibitem[Spa89]{kn:spa89} Eugene~H. Spafford. \newblock The {I}nternet {W}orm: Crisis and aftermath. \newblock {\em Communications of the ACM}, 32(6):678--687, 1989. \bibitem[Spa90]{kn:spa90} Eugene~H. Spafford. \newblock Are computer hacker break--ins ethical? \newblock Technical Report CSD-TR-994, Purdue University, Julio 1990. \bibitem[Spa91a]{kn:spa91} Eugene~H. Spafford. \newblock The {I}nternet {W}orm incident. \newblock Technical Report CSD-TR-933, Purdue University Department of Computer Science, 1991. \bibitem[Spa91b]{kn:spa91b} Eugene~H. Spafford. \newblock {\sc opus}: Preventing weak password choices. \newblock In {\em Proceedings of the 14th National Computer Security Conference}, pages 446--455, Octubre 1991. \bibitem[Spi01a]{kn:spi01b} Lance Spitzner. \newblock {I}ntrusion {D}etection for {C}heck {P}oint {F}ire{W}all--1. \newblock http://www.enteract.com/\~{}lspitz/intrusion.html, Diciembre 2001. \bibitem[Spi01b]{kn:spi01} Lance Spitzner. \newblock Know your enemy: {H}oneynets. \newblock http://project.honeynet.org/papers/honeynet/, 2001. \bibitem[Spr01]{kn:hpfaq} Ian~P. Springer. \newblock {HP-UX} {FAQ}, Noviembre 2001. \newblock http://www.faqs.org/faqs/hp/hpux-faq/. \bibitem[Sta00]{kn:iso} British Standard. \newblock Information technology -- {C}ode of practice for information security management. \newblock Technical Report BS ISO/IEC 17799:2000, British Standard Publishing Limited, Diciembre 2000. \bibitem[Ste90]{kn:ste90} W.~Richard Stevens. \newblock {\em Unix {N}etwork {P}rogramming}. \newblock Prentice Hall, 1990. \bibitem[Ste94]{kn:ste94} W.~Richard Stevens. \newblock {\em TCP/IP Illustrated Volume I: The Protocols}. \newblock Addison Wesley, 1994. \bibitem[Ste98a]{kn:ste98} Ingo Stengel. \newblock Security architectures based on active firewall components, 1998. \newblock FH--Darmstadt. \bibitem[Ste98b]{kn:ste98b} Kevin Steves. \newblock Building a bastion host using {HP-UX} 10. \newblock http://people.hp.se/stevesk/bastion10.html, 1998. \bibitem[Ste00]{kn:ste00} Kevin Steves. \newblock Building a bastion host using {HP-UX} 11. \newblock http://people.hp.se/stevesk/bastion11.html, 2000. \bibitem[Sto88]{kn:sto88} Cliff Stoll. \newblock Stalking the wily hacker. \newblock {\em Communications of the {ACM}}, 31(5):484--497, Mayo 1988. \bibitem[Sto89]{kn:sto89} Cliff Stoll. \newblock {\em The Cuckoo's Egg}. \newblock Doubleday, 1989. \bibitem[Sun96]{kn:sun96} Aurobindo Sundaram. \newblock An introduction to {I}ntrusion {D}etection. \newblock {\em Crossroads: The {ACM} Student Magazine}, 2(4), Abril 1996. \bibitem[Swi92]{kn:swi92} Peter Swinbank. \newblock Electromagnetic {R}adiation. \newblock In Keith~M. Jackson and Jan Hruska, editors, {\em Computer Security Reference Book}, chapter~11, pages 75--90. Butterworth-Heinemann, 1992. \bibitem[Tan91]{kn:tan91} Andrew Tanenbaum. \newblock {\em Operating Systems: Design and Implementation}. \newblock Prentice Hall, 1991. \bibitem[Tan95]{kn:tan95} Andrew Tanenbaum. \newblock {\em Distributed Operating Systems}. \newblock Prentice Hall, 1995. \bibitem[Tan96]{kn:tan96} Andrew Tanenbaum. \newblock {\em Computer Networks}. \newblock Prentice Hall, 1996. \bibitem[Tho84]{kn:tho84} Ken Thompson. \newblock Refections on trusting trust. \newblock {\em Communications of the ACM}, 27(8), Agosto 1984. \bibitem[Thu00]{kn:thu00} Thuull. \newblock Anomaly {D}etection {S}ystems. \newblock {\em 2600: The {H}acker {Q}uartely}, 17(3), Primavera 2000. \bibitem[Tom75]{kn:tom75} Raymond~S. Tomlinson. \newblock Selecting {S}equence {N}umbers. \newblock In {\em Proceedings of {\sc sigcomm/sigops} {I}nterprocess {C}ommunication {W}orkshop}, pages 11--23. ACM, 1975. \bibitem[Tom94]{kn:tom94} Chris Tomlinson. \newblock A {P}ractical {G}uide to {S}olaris {S}ecurity. \newblock Technical report, Sun Microsystems (UK), Marzo 1994. \bibitem[Tox00]{kn:tox00} Bob Toxen. \newblock {\em Real {W}orld {L}inux {S}ecurity: {I}ntrusion {P}revention, {D}etection and {R}ecovery}. \newblock Prentice Hall, 1st edition, 2000. \bibitem[TW93]{kn:win93} G.~Winfield Treese and Alec Wolman. \newblock X through the firewall, and other applications relays. \newblock In {\em Proceedings of the {\sc usenix} Summer Conference}. The {\sc usenix} Association, Junio 1993. \bibitem[TY82]{kn:tho82} Rebecca Thomas and Jean Yates. \newblock {\em A User Guide to the {U}nix System}. \newblock McGrawHill, 1982. \bibitem[V{\etalchar{+}}00]{kn:bet00} Scott Vetter et~al. \newblock {\em IBM {C}ertification {S}tudy {G}uide. {AIX} v4.3 {S}ystem {A}dministration}. \newblock IBM, 2000. \newblock IBM RedBook SG24--5129--00. \bibitem[vE85]{kn:eck85} Wim van Eck. \newblock Electromagnetic {R}adiation from {V}ideo {D}isplay {U}nits: An {E}avesdropping {R}isk? \newblock {\em Computers and {S}ecurity}, 4(4), 1985. \bibitem[Ven92]{kn:ven92} Wietse Venema. \newblock {TCP} {W}rapper: Network monitoring, access control and booby traps. \newblock In {\em Proceedings of the 3rd {\sc usenix} {U}nix {S}ecurity {S}ymposium}, pages 85--92. The {\sc usenix} Association, Septiembre 1992. \bibitem[Vic94]{kn:vic94} Bob Vickers. \newblock Guide to safe {X}, Febrero 1994. \bibitem[vKPG97]{kn:kra97} Robert van Kralingen, Corien Prins, and Jan Grijpink. \newblock Using your body as a key: legal aspects of biometrics, 1997. \bibitem[Vol97]{kn:vol97} Yuri Volobuev. \newblock Playing redir games with {\sc arp} and {\sc icmp}, Septiembre 1997. \bibitem[vSS98]{kn:ss98} Carl van Schaik and Paul Smeddle. \newblock A {S}teganographic {F}ile {S}ystem {I}mplementation for {L}inux. \newblock Technical report, University of Cape Town (South Africa), Octubre 1998. \bibitem[vSTO94]{kn:schy94} R.~G. van Schyndel, A.~Z. Tirkel, and C.~F. Osborne. \newblock A digital watermark. \newblock In {\em International Conference on Image Processing}, volume~2, pages 86--90. IEEE, 1994. \bibitem[WA02]{kn:phone02} Dameon~D. Welch-Abernathy. \newblock {\em Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide}. \newblock Addison Wesley, 2002. \bibitem[WC94]{kn:wack94} John~P. Wack and Lisa~J. Carnahan. \newblock Keeping your site comfortably secure: an introduction to {I}nternet {F}irewalls. \newblock Technical report, National Institute of Standards and Technology ({\sc nist}), Diciembre 1994. \newblock Special Publication 800-10. \bibitem[WD95]{kn:win95} Ira~S. Winkler and Brian Dealy. \newblock Information security technology?...{D}on\'{}t rely on it. {A} case study in social engineering. \newblock In {\em Proceedings of the 5th {\sc usenix} Unix Security Symposium}. The {\sc usenix} Association, Junio 1995. \bibitem[Wil74]{kn:wil74} M.~J. Williamson. \newblock Non--{S}ecret encryption using a finite field. \newblock Technical report, CESG, Enero 1974. \bibitem[Wil76]{kn:wil76} M.~J. Williamson. \newblock Thoughts on cheaper {N}on--{S}ecret encryption. \newblock Technical report, CESG, Agosto 1976. \bibitem[Won01]{kn:won01} Chris Wong. \newblock {\em HP-UX 11i Security}. \newblock Prentice Hall, Septiembre 2001. \bibitem[Wra91a]{kn:wra91b} J.C. Wray. \newblock An analysis of covert timing channels. \newblock In {\em Proceedings of the 1991 Symposium on Research in Security and Privacy}, pages 2--7. {\sc ieee} Computer Society, Mayo 1991. \bibitem[Wra91b]{kn:wra91a} J.W. Wray. \newblock Toward a mathematical foundation for information flow security. \newblock In {\em Proceedings of the 1991 Symposium on Research in Security and Privacy}, pages 21--34. {\sc ieee} Computer Society, Mayo 1991. \bibitem[Wre98]{kn:wre98} Dave Wreski. \newblock Linux {S}ecurity {A}dministrator\'{}s {G}uide. \newblock http://nic.com/\~{}dave/Security/, 1998. \bibitem[Ylo96]{kn:ylo96} Tatu Ylonen. \newblock {\sc ssh} -- {S}ecure login connetions over the {I}nternet. \newblock In {\em Proceedings of the 6th {\sc usenix} Security Symposium}, pages 37--42. The {\sc usenix} Association, Julio 1996. \bibitem[Zie01]{kn:zie01} Robert~L. Ziegler. \newblock {\em Linux {F}irewalls}. \newblock New Riders, 2nd edition, 2001. \bibitem[Zim95a]{kn:zim95a} Phil Zimmermann. \newblock {\em The Official {\sc pgp} User\'{}s Guide}. \newblock M.I.T. Press, 1995. \bibitem[Zim95b]{kn:zim95b} Phil Zimmermann. \newblock {\em {\sc pgp}: Source Code and Internals}. \newblock M.I.T. Press, 1995. \end{thebibliography}