% Archivo de bibliografia para el libro de seguridad @Book{ NIC:03, author = "R. Nichols and P. C. Lekkas", editor = "McGraw-Hill", title = "Seguridad para comunicaciones inal{\'a}mbricas", publisher = "McGraw-Hill", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "", author = "R. Nichols and P. C. Lekkas" } @Book{ ACE:03, author = "Vicente Aceituno Canal", editor = "Noriega Editores", title = "Seguridad de la informaci'on", publisher = "Noriega Editores", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "M'exico D.F., M'exico", OPTedition = "", OPTmonth = "M'exico D.F.", OPTnote = "", OPTannote = "", } @Book{ KURT:01, author = "Kurt Wall et al", editor = "Prentice Hall", title = "Programaci'on en Linux", publisher = "Prentice Hall", year = "2001", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Madrid, Espa~na", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "", } @Book{ SARW:03, author = "Sarwar, Koretsky", editor = "Pearson, Prentice Hall", title = "El libro de Linux", publisher = "Prentice Hall", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Madrid, Espa~na", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "", } @Book{ STRO:02, author = "Bjarne Stroustrup", editor = "Addison Wesley", title = "El lenguaje de programaci{\'o}n C++", publisher = "Addison Wesley", year = "2002", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Madrid, Espa{\~n}a", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ BLAN:06, author = "James Blanchette and Mark Summerfield", editor = "Prentice Hall", title = "C++ GUI Programming with Qt 4", publisher = "Prentice Hall", year = "2006", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Massachusetts, USA", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ STAL:03, author = "William Stallings", editor = "Pearson", title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares", publisher = "Prentice Hall", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Espa{\~n}a", OPTedition = "2", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ PRESS:05, author = "Roger S. Pressman", editor = "Mc Graw-Hill", title = "Ingenier'ia del software. Un enfoque pr'actico", publisher = "Mc Graw-Hill", year = "2005", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "6", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ NASH:02, author = "Nash Duane and Joseph Brink", editor = "McGraw-Hill", title = "PKI: Infraestructura de clave p{\'u}blica", publisher = "McGraw-Hill", year = "2002", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Article{ PERL:99, author = "R. Perlman", title = "An overview of PKI trust models", journal = "Network, IEEE", year = "1999", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTpages = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ SCHM:03, title = "Aprendiendo UML en 24 horas", author = "Joseph Schmuller", editor = "Prentice Hall", publisher = "Prentice Hall", year = "2003", address = "M{\'e}xico" } @Book{ VIEG:2002, title = "Network Security with OpenSSL", author = "John Viega and Matt Messier and Pravir Chandra", publisher = "O'Really", edition = "384", year = "2002" } @Book{ BOOC:99, title = "UML Lenguaje Unificado de Modelado", author = "G., Booch", publisher = "Addison Wesley", year = "1999" } @Book{ MULL:97, title = "Modelado de objetos con UML", author = "Alain Pierre-Muller", publisher = "Eyrolles", address = "Barcelona, Espa\~na", year = "1997" } @Book{ PILA:04, title = "Version Control with Subversion ", author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick", publisher = "O'Really ", year = "2004" } @Electronic{ XCA:03, title = "XCA, una interfaz gr\'afica para OpenSSL, Clave p\'ublicas y privadas, certificados, solicitudes y listas de revocaci'on", howpublished = "http://www.hohnstaedt.de/xca.html", year = "2003", author = {Christian Hohnst\"{a}dt} } @Electronic{ IBM:98, title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products", howpublished = "http://www.software.ibm.com/commerce/set/overview.html", year = "2003", author = {IBM Corporation} } @Electronic{ FSF:07, title = "Free Software Definition", howpublished = "http://www.fsf.org/licensing/essays/free-sw.html", year = "2007", author = {} } @Electronic{ TRAC:07, title = "Welcome to the Trac Project", howpublished = "http://trac.edgewall.org/", year = "2007", author = {} } @Book{ TONITO:14, title = "Trasteando con la bibliografía", author = "Antonio Araujo ", editor = "CENDITEL", publisher = "CENDITEL", year = "2014", address = "Mérida" } @Electronic{ IEEEhowto:espana, title = "Portal del DNI Electrónico Español", author = {}, howpublished = "http://www.dnielectronico.es/", year = "2012" } @Article{ IEEEhowto:eID, title = "Electronic Identity Cards for User Authentication Promise and Practice", author = "Andreas Poller, Ulrich Waldmann, Sven Vowe, Sven Turpe", journal = "IEEE Security \& Privacy", year = "2013", volume = "10", pages = "46--54" } @Electronic{ IEEEhowto:estonia, title = "Oficial Gateway to Estonia", author = {}, howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html", year = "2013" } @Book{ IEEEhowto:software, title = "Ingeniería del Software", author = "Campderrich Falgueras", publisher = "Editorial UOC", year = "2003", address = "Barcelona, España" } @Electronic{ IEEEhowto:directiva, title = "DIRECTIVA 1999/93/CE DEL PARLAMENTO EUROPEO Y DEL CONSEJO", author = {}, howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf", year = "1999" } @Electronic{ IEEEhowto:x509, title = "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments (RFC) 5280", author = {Cooper D., Santesson S., y otros}, howpublished = "http://www.ietf.org/rfc/rfc5280.txt", year = "2013" } @Electronic{ IEEEhowto:pkcs7, title = "PKCS\#7.Cryptographic Message Syntax", author = {}, howpublished = "https://tools.ietf.org/html/rfc2315", year = "2013" } @Electronic{ IEEEhowto:pades, title = "PAdES. PDF Advance Electronic Signatures", author = {}, howpublished = "http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801v010101p.pdf", year = "2013" } @Electronic{ IEEEhowto:xmldsig, title = "XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008", author = {Bartel M., Boyer J., y otros}, howpublished = "http://www.w3.org/TR/xmldsig-core/", year = "2013" } @Electronic{ IEEEhowto:bdoc, title = "Formato para firmas electrónicas", author = {}, howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf", year = "2013" } @Article{ IEEEhowto:neubauer, title = "Digital signatures with familiar appearance for e-government documents: authentic PDF", author = "Neubauer, T.; Weippl, E.; Biffl, S.", journal = "Proceedings of the First International Conference on Availability, Reliability and Security", year = "2006", volume = {}, pages = "723--731" } @Book{ IEEEhowto:java, title = "Professional Java, JDK", author = "Richardson Clay, Avondolio Donald, others", publisher = "Wrox", year = "2005", } @Electronic{ IEEEhowto:xades, title = "XML Advanced Electronic Signatures (XAdES)", author = "Cruellas, J. Karlinger G., y otros", howpublished = "http://www.w3.org/TR/XAdES/", year = "2003" } @Electronic{ IEEEhowto:mime, title = "Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted", author = "Galvin , J. Murphy, S. Crocker, S. Freed, N.", howpublished = "http://tools.ietf.org/html/rfc1847", year = "2013" } @Electronic{ IEEEhowto:pkcs12, title = "PKCS\#12.Personal Information Exchange Syntax Standard.", author = "RSA Laboratories.", howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138", year = "2013" } @Book{ IEEEhowto:bpel, title = "Business Process Execution for Web Services BPEL and BPEL4WS", author = "Matjaz Juric, Mathew Benny", publisher = "Packt Publishing", year = "2006", } @Article{ IEEEhowto:safet, title = "SAFET: Sistema para la generación de aplicaciones de firma electrónica", author = "Bravo, V. Araujo A.", journal = "Revista Puente", year = "2011", volume = "6", } % referencias capítulo 7 @Electronic{ rlsm:terminology, title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", author = "Pfitzmann, A., Hansen, M.", howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml", year = "2000" } @Article{ rlsm:diaz01, title = "Towards measuring Anonymity ", author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.", journal = "Designing Privacy Enhancing Technologies", year = "2002", pages = "54--68", volume = {}, } @Article{ rlsm:serj01, title = "Towards an Information Theoretic Metric for Anonymity", author = "Serjantov, A., Danezis, G.", journal = "Proceedings of Privacy Enhancing Technologies Workshop", year = "2002", pages = "54--68", volume = {}, } @Article{ rlsm:chaum-mix, title = "Untraceable electronic mail, return addresses, and digital pseudonyms", author = "Chaum, D.", journal = "Communications of the ACM", year = "1981", pages = {}, volume = "4", } @Article{ rlsm:diaz-mixes, title = "Generalising Mixes", author = "D\'{\i}az, C., Serjantov, A.", journal = "Proceedings of Privacy Enhancing Technologies workshop", year = "2003", pages = "18--31", volume = {}, } @Article{ rlsm:mixminion, title = "Mixminion: Design of a Type III Anonymous Remailer Protocol", author = "Danezis, G., Dingledine, R., Mathewson, N.", journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy", year = "2003", pages = "2--15", volume = {}, } @Article{rlsm:tor-design, title = "Tor: The Second-Generation Onion Router", author = "Dingledine, R., Mathewson, N., Syverson, P.", journal = "Proceedings of the 13th USENIX Security Symposium", year = "2004", pages = {}, volume = {}, } @Article{rlsm:antnet, title = "AntNet: Distributed Stigmergetic Control for Communications Networks", author = "Caro, G.D., Dorigo, M.", journal = "Journal of Artificial Intelligence Research", year = "1998", pages = {}, volume = {}, } @Article{ rlsm:ants-white, title = "Connection Management using Adaptive Mobile Agents", author = "White, T., Pagurek, B.", journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications", year = "1998", pages = "802--809", volume = {}, } @Article{ rlsm:ants-loadbalancing, title = "Ant-Based Load Balancing in Telecommunications Networks", author = "Schoonderwoerd, R.", journal = "Adaptive Behavior", year = "1997", pages = "169--207", volume = "5", } @Article{ rlsm:shannon, title = "The mathematical theory for communicactions", author = "Shannon, C.", journal = "Bell Systems Technical Journal", year = "1948", pages = "50--64", volume = "30", } @Article{ rlsm:yuxin, title = "Measuring Anonymity with Relative Entropy", author = "Deng, Y., Pang, J., Wu, P.", journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust", year = "2007", pages = "65--79", volume = {}, } @Article{ rlsm:combinatorial, title = "A Combinatorial Approach to Measuring Anonymity", author = "Edman, M., Sivrikaya, F., Yener, B.", journal = "Intelligence and Security Informatics", year = "2007", pages = "356--363", volume = {}, } @Article{ rlsm:revisiting, title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity", author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.", journal = "Workshop on Privacy in the Electronic Society", year = "2008", pages = "111--116", volume = {}, } @Article{ rlsm:berthold, title = "The Disavantages of Free Mix Routes and How to overcome them", author = "Berthold, O., Pfitzmann, A., Standtke, R.", journal = "Proceedings of Privacy Enhancing Technologies Workshop", year = "2001", pages = "30--45", volume = {}, } @Article{ rlsm:reiter, title = "Crowds: Anonymity for Web Transactions", author = "Reiter, M., Rubin, A.", journal = "ACM Transactions on Information and System Security", year = "1998", pages = {}, volume = "1", } @Electronic{ rlsm:vernier, title = "What are Mean Squared Error and Root Mean Squared Error?.", author = "Vernier, D., and Gastineau, J.", howpublished = "http://www.vernier.com/til/1014/", year = "2011" } @Article{ rlsm:jianhua, title = "Divergences Measures Based in Shannon Entropy", author = "Jianhua, L.", journal = "IEEE Transactions on Information Theory", year = "1991", pages = {}, volume = "37", number = "1", } % Referencias adicionales del capítulo 3. @TechReport{ico2006, author = {Information Commissioner Office}, title = {Data protection technical guidance note: Privacy enhancing technologies (pets)}, institution = {Information Commissioner Office}, year = {2006}, month = {April}, } @TechReport{ONU1948, author = {Organización de las Naciones Unidas}, title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos}, institution = {Organización de las Naciones Unidas}, year = {1948} } @phdthesis{george-thesis, title = {Better Anonymous Communications}, author = {George Danezis}, school = {University of Cambridge}, year = {2004}, month = {July}, www_tags = {selected}, www_section = {Anonymous communication}, www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf}, } @inproceedings{ISDN-mixes, title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed Systems}, year = {1991}, month = {February}, pages = {451--463}, www_tags = {selected}, www_section = {Anonymous communication}, www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz}, } @inproceedings{esorics04-mauw, title = {A formalization of anonymity and onion routing}, author = {S. Mauw and J. Verschuren and E.P. de Vink}, booktitle = {Proceedings of ESORICS 2004}, year = {2004}, location = {Sophia Antipolis}, pages = {109--124}, editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva}, publisher = {LNCS 3193}, www_tags = {selected}, www_section = {Formal methods}, www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, } @inproceedings{onion-discex00, title = {{O}nion {R}outing Access Configurations}, author = {Paul Syverson and Michael Reed and David Goldschlag}, booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000)}, volume = {1}, year = {2000}, pages = {34--40}, publisher = {IEEE CS Press}, www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz}, www_tags = {selected}, www_abstract_url = {http://www.onion-router.net/Publications.html}, www_section = {Anonymous communication}, www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf}, www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps}, } @inproceedings{onion-routing:pet2000, title = {{Towards an Analysis of Onion Routing Security}}, author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, year = {2000}, month = {July}, pages = {96--114}, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_important = {1}, www_tags = {selected}, www_section = {Anonymous communication}, www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}, } @inproceedings{danezis:pet2004, title = {The Traffic Analysis of Continuous-Time Mixes}, author = {George Danezis}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, volume = {3424}, year = {2004}, month = {May}, pages = {35--50}, series = {LNCS}, www_important = {1}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}, } @inproceedings{timing-fc2004, title = {Timing Attacks in Low-Latency Mix-Based Systems}, author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, booktitle = {Proceedings of Financial Cryptography (FC '04)}, year = {2004}, month = {February}, pages = {251--265}, editor = {Ari Juels}, publisher = {Springer-Verlag, LNCS 3110}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf}, } @inproceedings{SS03, title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, author = {Andrei Serjantov and Peter Sewell}, booktitle = {Proceedings of ESORICS 2003}, year = {2003}, month = {October}, www_tags = {selected}, www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.}, www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}, www_section = {Traffic analysis}, } @inproceedings{flow-correlation04, title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, volume = {3424}, year = {2004}, month = {May}, pages = {207--225}, series = {LNCS}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}, } @inproceedings{WangCJ05, title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, year = {2005}, month = {November}, pages = {81--91}, www_tags = {selected}, www_section = {Anonymous communication}, www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf}, } @inproceedings{e2e-traffic, title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, author = {Nick Mathewson and Roger Dingledine}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, volume = {3424}, year = {2004}, month = {May}, pages = {17--34}, series = {LNCS}, www_important = {1}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}, } @inproceedings{back01, title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, author = {Adam Back and Ulf M\"oller and Anton Stiglic}, booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, year = {2001}, month = {April}, pages = {245--257}, editor = {Ira S. Moskowitz}, publisher = {Springer-Verlag, LNCS 2137}, www_important = {1}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf}, } @inproceedings{hs-attack06, title = {Locating Hidden Servers}, author = {Lasse {\O}verlier and Paul Syverson}, booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, year = {2006}, month = {May}, publisher = {IEEE CS}, www_important = {1}, www_tags = {selected}, www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf}, www_remarks = {Motivates and describes Tor's entry guard design.}, www_section = {Traffic analysis}, }