Software Security

CompSci 725 FC 02
Clark Thomborson
Handout 6: Bibliography

Technical Articles (those marked with [00] or [01] were reviewed in 2000 or 2001 resp.)

         [01] Kenneth Ho, "A Study into the Problem of Software Piracy in Hong Kong and China," Master's dissertation, Management and Information Systems, London School of Economics and Political Science, 1995. http://www.info.gov.hk/ipd/piracy.html

         [01] Fritz Hohl, Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, In Mobile Agents and Security, Springer Verlag, LNCS 1419, pp. 92-113, 1998.Available: http://link.springer.de/link/service/series/0558/tocs/t1419.htm, April 2001.

         B Horne, L Matheson, C Sheehan, and R Tarjan, �Dynamic Self-Checking Techniques for Improved Tamper Resistance�.In Workshop on Security and Privacy in Digital Rights Management 2001.Available: http://www.star-lab.com/sander/spdrm/papers.html, February 2002.

         D Peng, S Jun, S Ye, L Ju, �MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets.�In J. Liu and Y. Ye (Eds.): E-Commerce Agents, LNAI 2033, pp. 264-282, Springer-Verlag, Berlin Heidelberg 2001.Available: http://link.springer.de/link/service/series/0558/tocs/t2033.htm, April 2001.

         Robert A Percival, �Standing on the Shoulders of Giants: The Reverse Engineering of Computer Software and the Law of Copyright In Canada,� research paper series, Smith Lyons Barristers and Solicitors, http://www.smithlyons.ca/Publications/Articles/IT_99_10_2.htm, October 1999.

         M Swanson and B Guttman, �Generally Accepted Principles and Practices for Securing Information Technology Systems,� National Institute of Standards and Technology, Department of Commerce, US Government, September 1996.Available: http://www.auerbach-publications.com/white-papers/nist-security-guidelines.pdf, April 2001.

         [00] Ken Thompson, "Reflections on Trusting Trust", Comm ACM 27:8, pp. 761-763, August 1984. http://www.acm.org/classics/sep95

Tutorials

Patents and Published International Patent Applications

         Charles E. Hill. Software Piracy Detection System. US Patent 5,754,864, May 19, 1998. Assignee: Charles E. Hill and associates.

         Keith Holmes. Computer software protection. US Patent 5,287,407, February 15, 1994. Assignee: International Business Machines.

Books

Web sites of interest

Miscellaneous

Similar Courses