The 'Security Digest' Archives (TM)

Archive: About | Browse | Search | Contributions | Feedback
Site: Help | Index | Search | Contact | Notices | Changes

ARCHIVE: 'Phage List' - Archives (1988 - 1989)
DOCUMENT: phage #111 [Re: Let's get the name correct] (1 message, 801 bytes)
SOURCE: http://securitydigest.org/exec/display?f=phage/archive/111.txt&t=text/plain
NOTICE: securitydigest.org recognises the rights of all third-party works.

START OF DOCUMENT

From: Tom Libert <libert@citi.umich.edu>
To: phage
Date: Mon 13:23:00 07/11/1988 EST
Subject: Re: Let's get the name correct
References: [Thread Prev: 107] [Thread Next: 231] [Message Prev: 109] [Message Next: 112]

	...
	I hope these references help.  I would suggest you read them if you
	have further questions, and let's get the nomenclature on this
	consistent.

Nice list, Gene.  I'd also add the following:

Fred Cohen, "Computer Viruses",  1985 USC doctoral thesis (available from the
author, CS Dept., U of Cincinnati).  Cohen attributes the term "virus"
to Len Adleman of RSA (etc.) fame.

Fred Cohen, "Computer Viruses--Theory and Experiments", Computers &
Security, vol. 6, 1987, Elsevier/North-Holland, pp. 22-35.

Ken Thompson, "Reflections on Trusting Trust", Turing Award Lecture,
CACM, August 1984.  The famous "compiler virus".

Fred Cohen, "A Cryptographic Checksum for Integrity Protection",
Computers & Security, vol. 6, 1987, Elsevier/North-Holland, pp. 505-510.

Maria M. Pozzo and Terence E. Gray, "An Approach to Containing
Computer Viruses", Computers & Security, vol. 6, 1987, Elsevier/North-Holland,
pp. 321-331.

I haven't read this one, but it sounds interesting:

B. Landreth, "Out of the Inner Circle:  A Hacker's Guide to Computer
Security", Microsoft Press, Bellevue WA  1985.

END OF DOCUMENT