% Archivo de bibliografia para el libro de seguridad % referencias capítulo 5 @Book{ NIC:03, author = "R. Nichols and P. C. Lekkas", editor = "McGraw-Hill", title = "Seguridad para comunicaciones inal{\'a}mbricas", publisher = "McGraw-Hill", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "", author = "R. Nichols and P. C. Lekkas" } @Book{ ACE:03, author = "Vicente Aceituno Canal", editor = "Noriega Editores", title = "Seguridad de la información", publisher = "Noriega Editores", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "M'exico D.F., M'exico", OPTedition = "", OPTmonth = "M'exico D.F.", OPTnote = "", OPTannote = "", } @Book{ KURT:01, author = "Kurt Wall et al", editor = "Prentice Hall", title = "Programación en Linux", publisher = "Prentice Hall", year = "2001", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Madrid, Espa~na", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "", } @Book{ SARW:03, author = "Sarwar, Koretsky", editor = "Pearson, Prentice Hall", title = "El libro de Linux", publisher = "Prentice Hall", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Madrid, Espa~na", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "", } @Book{ STRO:02, author = "Bjarne Stroustrup", editor = "Addison Wesley", title = "El lenguaje de programaci{\'o}n C++", publisher = "Addison Wesley", year = "2002", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Madrid, Espa{\~n}a", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ BLAN:06, author = "James Blanchette and Mark Summerfield", editor = "Prentice Hall", title = "C++ GUI Programming with Qt 4", publisher = "Prentice Hall", year = "2006", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Massachusetts, USA", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ STAL:03, author = "William Stallings", editor = "Pearson", title = "Fundamentos de Seguridad de Redes. Aplicaciones y Est{\'a}ndares", publisher = "Prentice Hall", year = "2003", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Espa{\~n}a", OPTedition = "2", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ PRESS:05, author = "Roger S. Pressman", editor = "Mc Graw-Hill", title = "Ingeniería del software. Un enfoque práctico", publisher = "Mc Graw-Hill", year = "2005", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "6", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ NASH:02, author = "Andrew Nash, William Duane, Celia Joseph and Joseph Brink", editor = "McGraw-Hill", title = "PKI: Infraestructura de clave p{\'u}blica", publisher = "McGraw-Hill", year = "2002", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ RANKL:04, author = "Wolfgang Rankl, Wolfgang Effing", title = "Smart Card Handbook", publisher = "Wiley", year = "2004", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTseries = "", OPTaddress = "Mexico", OPTedition = "3", OPTmonth = "", OPTnote = "", OPTannote = "" } @Article{ PERL:99, author = "R. Perlman", title = "An overview of PKI trust models", journal = "Network, IEEE", year = "1999", OPTkey = "", OPTvolume = "", OPTnumber = "", OPTpages = "", OPTmonth = "", OPTnote = "", OPTannote = "" } @Book{ SCHM:03, title = "Aprendiendo UML en 24 horas", author = "Joseph Schmuller", editor = "Prentice Hall", publisher = "Prentice Hall", year = "2003", address = "M{\'e}xico" } @Book{ VIEG:2002, title = "Network Security with OpenSSL", author = "John Viega and Matt Messier and Pravir Chandra", publisher = "O'Really", edition = "384", year = "2002" } @Book{ BOOC:99, title = "UML Lenguaje Unificado de Modelado", author = "G., Booch", publisher = "Addison Wesley", year = "1999" } @Book{ MULL:97, title = "Modelado de objetos con UML", author = "Alain Pierre-Muller", publisher = "Eyrolles", address = "Barcelona, Espa\~na", year = "1997" } @Book{ PILA:04, title = "Version Control with Subversion ", author = "C. Michael Pilato and Ben Collins-Sussman and Brian W. Fitzpatrick", publisher = "O'Really ", year = "2004" } @Electronic{ XCA:03, title = "{XCA, una interfaz gr\'afica para OpenSSL, Claves p\'ublicas y privadas, certificados, solicitudes y listas de revocación}", howpublished = "http://www.hohnstaedt.de/xca.html", year = "2003", author = {Christian Hohnst\"{a}dt} } @Electronic{ IBM:98, title = "IBM Corporation. An overview of the IBM SET and the IBM CommercePoint Products", howpublished = "http://www.software.ibm.com/commerce/set/overview.html", year = "2003", author = {IBM Corporation} } @Electronic{ FSF:07, title = "Free Software Definition", howpublished = "http://www.fsf.org/licensing/essays/free-sw.html", year = "2007", author = {} } @Electronic{ TRAC:07, title = "Welcome to the Trac Project", howpublished = "http://trac.edgewall.org/", year = "2007", author = {} } @Book{ TONITO:14, title = "Trasteando con la bibliografía", author = "Antonio Araujo ", editor = "CENDITEL", publisher = "CENDITEL", year = "2014", address = "Mérida" } % referencias capítulo 6 @Electronic{ IEEEhowto:espana, title = "Portal del {DNI Electrónico Español}", author = {}, howpublished = "http://www.dnielectronico.es/", year = "2012" } @Article{ IEEEhowto:eID, title = "Electronic Identity Cards for User Authentication Promise and Practice", author = "Andreas Poller and Ulrich Waldmann and Sven Vowe and Sven Turpe", journal = "IEEE Security \& Privacy", year = "2013", volume = "10", pages = "46--54" } @Electronic{ IEEEhowto:estonia, title = "Oficial Gateway to {Estonia}", author = {}, howpublished = "http://estonia.eu/about-estonia/economy-a-it/e-estonia.html", year = "2013" } @Book{ IEEEhowto:software, title = "Ingeniería del Software", author = "Campderrich Falgueras", publisher = "Editorial UOC", year = "2003", address = "Barcelona, España" } @Electronic{ IEEEhowto:directiva, title = "DIRECTIVA 1999/93/{CE} DEL {P}ARLAMENTO {E}UROPEO Y DEL {C}ONSEJO", author = {}, howpublished = "http://www.cert.fnmt.es/legsoporte/D\_1999\_93\_CE.pdf", year = "1999" } @Electronic{ IEEEhowto:x509, title = "Internet {X.509} {Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}. {Request for Comments} ({RFC}) 5280", author = {Cooper, D. and Santesson, S. and others}, howpublished = "http://www.ietf.org/rfc/rfc5280.txt", year = "2013" } @Electronic{ IEEEhowto:pkcs7, title = "{PKCS\#7}. {Cryptographic Message Syntax}", author = {}, howpublished = "https://tools.ietf.org/html/rfc2315", year = "2013" } @Electronic{ IEEEhowto:pades, title = "{PAdES}. {PDF Advance Electronic Signatures}", author = {ETSI}, year = {2013}, howpublished = {http://www.etsi.org/deliver/etsi\_ts/102700\_102799/10277801/01.01.01\_60/ts\_10277801 v010101p.pdf}, } @Electronic{ IEEEhowto:xmldsig, title = "{XML Signature Syntax and Processing (Second Edition). W3C Recommendation 10 June 2008}", author = {Bartel, M. and Boyer, J. and others}, howpublished = "http://www.w3.org/TR/xmldsig-core/", year = "2013" } @Electronic{ IEEEhowto:bdoc, title = "Formato para firmas electrónicas", author = {}, howpublished = "http://www.signature.it/-TOOLS/Bdoc-1.0.pdf", year = "2013" } @Article{ IEEEhowto:neubauer, title = "Digital signatures with familiar appearance for e-government documents: authentic {PDF}", author = "Neubauer, T. and Weippl, E. and Biffl, S.", journal = "Proceedings of the First International Conference on Availability, Reliability and Security", year = "2006", volume = {}, pages = "723--731" } @Book{ IEEEhowto:java, title = "{Professional Java, JDK}", author = "Richardson Clay and Avondolio Donald and others", publisher = "Wrox", year = "2005", } @Electronic{ IEEEhowto:xades, title = "{XML Advanced Electronic Signatures (XAdES)}", author = "Cruellas, J. and Karlinger, G. and others", howpublished = "http://www.w3.org/TR/XAdES/", year = "2003" } @Electronic{ IEEEhowto:mime, title = "{Security Multiparts for MIME. Multipart/Signed and Multipart/Encrypted}", author = "Galvin, J. and Murphy, S. and Crocker, S. and Freed, N.", howpublished = "http://tools.ietf.org/html/rfc1847", year = "2013" } @Electronic{ IEEEhowto:pkcs12, title = "{PKCS\#12. Personal Information Exchange Syntax Standard}", author = "{RSA Laboratories}", howpublished = "https://www.rsa.com/rsalabs/node.asp?id=2138", year = "2013" } @Book{ IEEEhowto:bpel, title = "{Business Process Execution for Web Services BPEL and BPEL4WS}", author = "Matjaz Juric and Mathew Benny", publisher = "Packt Publishing", year = "2006", } @Article{ IEEEhowto:safet, title = "{SAFET: Sistema para la generación de aplicaciones de firma electrónica}", author = "Araujo, A. and Bravo, V.", journal = "Revista Puente", year = "2011", volume = "6", } % referencias capítulo 7 @Electronic{rlsm:terminology, title = "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology", author = "Pfitzmann, A., Hansen, M.", howpublished = "http://dud.inf.tu-dresden.de/Anon\_Terminology.shtml", year = "2000" } @Article{rlsm:diaz01, title = "Towards measuring Anonymity ", author = "D\'{\i}az, C., Seys, S., Claessens, J., Preneel, B.", journal = "Designing Privacy Enhancing Technologies", year = "2002", pages = "54--68", volume = {}, } @Article{rlsm:serj01, title = "Towards an Information Theoretic Metric for Anonymity", author = "Serjantov, A., Danezis, G.", journal = "Proceedings of Privacy Enhancing Technologies Workshop", year = "2002", pages = "54--68", volume = {}, } @Article{ rlsm:chaum-mix, title = "Untraceable electronic mail, return addresses, and digital pseudonyms", author = "Chaum, D.", journal = "Communications of the ACM", year = "1981", pages = {}, volume = "4", } @Article{ rlsm:diaz-mixes, title = "Generalising Mixes", author = "D\'{\i}az, C., Serjantov, A.", journal = "Proceedings of Privacy Enhancing Technologies workshop", year = "2003", pages = "18--31", volume = {}, } @Article{ rlsm:mixminion, title = "Mixminion: Design of a Type III Anonymous Remailer Protocol", author = "Danezis, G., Dingledine, R., Mathewson, N.", journal = "Proceedings of the 2003 IEEE Symposium on Security and Privacy", year = "2003", pages = "2--15", volume = {}, } @Article{rlsm:tor-design, title = "Tor: The Second-Generation Onion Router", author = "Dingledine, R., Mathewson, N., Syverson, P.", journal = "Proceedings of the 13th USENIX Security Symposium", year = "2004", pages = {}, volume = {}, } @Article{rlsm:antnet, title = "AntNet: Distributed Stigmergetic Control for Communications Networks", author = "Caro, G.D., Dorigo, M.", journal = "Journal of Artificial Intelligence Research", year = "1998", pages = {}, volume = {}, } @Article{ rlsm:ants-white, title = "Connection Management using Adaptive Mobile Agents", author = "White, T., Pagurek, B.", journal = "Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications", year = "1998", pages = "802--809", volume = {}, } @Article{ rlsm:ants-loadbalancing, title = "Ant-Based Load Balancing in Telecommunications Networks", author = "Schoonderwoerd, R.", journal = "Adaptive Behavior", year = "1997", pages = "169--207", volume = "5", } @Article{ rlsm:shannon, title = "The mathematical theory for communicactions", author = "Shannon, C.", journal = "Bell Systems Technical Journal", year = "1948", pages = "50--64", volume = "30", } @Article{rlsm:yuxin, title = "Measuring Anonymity with Relative Entropy", author = "Deng, Y., Pang, J., Wu, P.", journal = "Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust", year = "2007", pages = "65--79", volume = {}, } @Article{rlsm:combinatorial, title = "A Combinatorial Approach to Measuring Anonymity", author = "Edman, M., Sivrikaya, F., Yener, B.", journal = "Intelligence and Security Informatics", year = "2007", pages = "356--363", volume = {}, } @Article{rlsm:revisiting, title = "Revisiting A Combinatorial Approach Toward Measuring Anonymity", author = "Gierlichs, B., Troncoso, C., Diaz, C., Preneel, B., Verbauwhede, I.", journal = "Workshop on Privacy in the Electronic Society", year = "2008", pages = "111--116", volume = {}, } @Article{rlsm:berthold, title = "The Disavantages of Free Mix Routes and How to overcome them", author = "Berthold, O., Pfitzmann, A., Standtke, R.", journal = "Proceedings of Privacy Enhancing Technologies Workshop", year = "2001", pages = "30--45", volume = {}, } @Article{ rlsm:reiter, title = "Crowds: Anonymity for Web Transactions", author = "Reiter, M., Rubin, A.", journal = "ACM Transactions on Information and System Security", year = "1998", pages = {}, volume = "1", } @Electronic{ rlsm:vernier, title = "What are Mean Squared Error and Root Mean Squared Error?.", author = "Vernier, D., and Gastineau, J.", howpublished = "http://www.vernier.com/til/1014/", year = "2011" } @Article{ rlsm:jianhua, title = "Divergences Measures Based in Shannon Entropy", author = "Jianhua, L.", journal = "IEEE Transactions on Information Theory", year = "1991", pages = {}, volume = "37", number = "1", } % Referencias adicionales del capítulo 3. @TechReport{ico2006, author = {Information Commissioner Office}, title = {Data protection technical guidance note: Privacy enhancing technologies (pets)}, institution = {Information Commissioner Office}, year = {2006}, month = {April}, } @TechReport{ONU1948, author = {Organización de las Naciones Unidas}, title = {Derechos humanos para todos. Declaración Universal de los Derechos humanos}, institution = {Organización de las Naciones Unidas}, year = {1948} } @phdthesis{george-thesis, title = {Better Anonymous Communications}, author = {George Danezis}, school = {University of Cambridge}, year = {2004}, month = {July}, www_tags = {selected}, www_section = {Anonymous communication}, www_pdf_url = {http://www.cl.cam.ac.uk/~gd216/thesis.pdf}, } @inproceedings{ISDN-mixes, title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, booktitle = {Proceedings of the GI/ITG Conference on Communication in Distributed Systems}, year = {1991}, month = {February}, pages = {451--463}, www_tags = {selected}, www_section = {Anonymous communication}, www_ps_gz_url = {http://www.semper.org/sirene/publ/PfPW_91TelMixeGI_NTG.ps.gz}, } @inproceedings{esorics04-mauw, title = {A formalization of anonymity and onion routing}, author = {S. Mauw and J. Verschuren and E.P. de Vink}, booktitle = {Proceedings of ESORICS 2004}, year = {2004}, location = {Sophia Antipolis}, pages = {109--124}, editor = {P. Samarati and P. Ryan and D. Gollmann and R. Molva}, publisher = {LNCS 3193}, www_tags = {selected}, www_section = {Formal methods}, www_pdf_url = {http://www.win.tue.nl/~ecss/downloads/esorics04.pdf}, } @inproceedings{onion-discex00, title = {{O}nion {R}outing Access Configurations}, author = {Paul Syverson and Michael Reed and David Goldschlag}, booktitle = {Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000)}, volume = {1}, year = {2000}, pages = {34--40}, publisher = {IEEE CS Press}, www_ps_gz_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps.gz}, www_tags = {selected}, www_abstract_url = {http://www.onion-router.net/Publications.html}, www_section = {Anonymous communication}, www_pdf_url = {http://www.onion-router.net/Publications/DISCEX-2000.pdf}, www_ps_url = {http://www.onion-router.net/Publications/DISCEX-2000.ps}, } @inproceedings{onion-routingpet2000, title = {{Towards an Analysis of Onion Routing Security}}, author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, booktitle = {Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability}, year = {2000}, month = {July}, pages = {96--114}, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_important = {1}, www_tags = {selected}, www_section = {Anonymous communication}, www_ps_gz_url = {http://www.onion-router.net/Publications/WDIAU-2000.ps.gz}, } @inproceedings{danezispet2004, title = {The Traffic Analysis of Continuous-Time Mixes}, author = {George Danezis}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, volume = {3424}, year = {2004}, month = {May}, pages = {35--50}, series = {LNCS}, www_important = {1}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}, } @inproceedings{timing-fc2004, title = {Timing Attacks in Low-Latency Mix-Based Systems}, author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, booktitle = {Proceedings of Financial Cryptography (FC '04)}, year = {2004}, month = {February}, pages = {251--265}, editor = {Ari Juels}, publisher = {Springer-Verlag, LNCS 3110}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://www.cs.umass.edu/~mwright/papers/levine-timing.pdf}, } @inproceedings{SS03, title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, author = {Andrei Serjantov and Peter Sewell}, booktitle = {Proceedings of ESORICS 2003}, year = {2003}, month = {October}, www_tags = {selected}, www_remarks = {An investigation of packet counting attacks (which work best on lightly loaded networks) and connection-start timing attacks.}, www_ps_url = {http://www.cl.cam.ac.uk/users/aas23/papers_aas/conn_sys.ps}, www_section = {Traffic analysis}, } @inproceedings{flow-correlation04, title = {On Flow Correlation Attacks and Countermeasures in Mix Networks}, author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, volume = {3424}, year = {2004}, month = {May}, pages = {207--225}, series = {LNCS}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}, } @inproceedings{WangCJ05, title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, booktitle = {Proceedings of the ACM Conference on Computer and Communications Security}, year = {2005}, month = {November}, pages = {81--91}, www_tags = {selected}, www_section = {Anonymous communication}, www_pdf_url = {http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf}, } @inproceedings{e2e-traffic, title = {Practical Traffic Analysis: Extending and Resisting Statistical Disclosure}, author = {Nick Mathewson and Roger Dingledine}, booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)}, volume = {3424}, year = {2004}, month = {May}, pages = {17--34}, series = {LNCS}, www_important = {1}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://freehaven.net/doc/e2e-traffic/e2e-traffic.pdf}, } @inproceedings{back01, title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, author = {Adam Back and Ulf M\"oller and Anton Stiglic}, booktitle = {Proceedings of Information Hiding Workshop (IH 2001)}, year = {2001}, month = {April}, pages = {245--257}, editor = {Ira S. Moskowitz}, publisher = {Springer-Verlag, LNCS 2137}, www_important = {1}, www_tags = {selected}, www_section = {Traffic analysis}, www_pdf_url = {http://www.cypherspace.org/adam/pubs/traffic.pdf}, } @inproceedings{hs-attack06, title = {Locating Hidden Servers}, author = {Lasse {\O}verlier and Paul Syverson}, booktitle = {Proceedings of the 2006 IEEE Symposium on Security and Privacy}, year = {2006}, month = {May}, publisher = {IEEE CS}, www_important = {1}, www_tags = {selected}, www_pdf_url = {http://www.onion-router.net/Publications/locating-hidden-servers.pdf}, www_remarks = {Motivates and describes Tor's entry guard design.}, www_section = {Traffic analysis}, } @MastersThesis{maestriaRSumoza, author = {Rodolfo Sumoza}, title = {Sistemas Anónimos en Escenarios Globales}, school = {Universidad Complutense de Madrid}, year = {2008}, } @inproceedings{traffic_analysis, author = {J. F. Raymond}, editor = {H. Federrath}, title = {Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}, booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability - Springer-Verlag, LNCS}, year = {2000}, } @inproceedings{timing_ssh, author = {Dawn Xiaodong Song; David Wagner; Xuqing Tian}, editor = {USENIX Association}, title = {Timing Analysis of Keystrokes and Timing Attacks on SSH}, booktitle = {Proceedings of the 10th USENIX Security Symposium}, year = {2001}, } @Electronic{cenditel_anonimato, author = {Endira Mora et. al}, title = {Gestión de Anonimato}, year = {2014}, howpublished = {https://tibisay.cenditel.gob.ve/gestionanonimato/wiki/PlanDeTrabajo%3A}, } @inproceedings{cebolla, title = {{Cebolla: Pragmatic IP Anonymity}}, author = {Zach Brown}, booktitle = {Proceedings of the 2002 Ottawa Linux Symposium}, year = {2002}, month = {June}, www_tags = {selected}, www_pdf_url = {http://cypherspace.org/cebolla/cebolla.pdf}, www_remarks = {Written by a former Freedom developer, Cebolla has a UDP-based design similar to second-generation Freedom. The initiator incrementally builds her circuit, giving her end-to-end forward-secrecy and also better recovery from broken nodes.}, www_section = {Anonymous communication}, } @Electronic{ SCHNEIER:14, title = "Choosing Secure Passwords", howpublished = "http://boingboing.net/2014/02/25/choosing-a-secure-password.html", year = "2014", author = {Bruce Schneier} } % referencias capitulo 4 @online{CHALBAUD:13, author = {Chalbaud, R.}, title = {Derechos Humanos y su protección Constitucional}, year = {2013}, url = {http}, } @Article{ OBERTO-GOVEA, title = {Algunas Consideraciones sobre {Habeas Data}}, author = "Oberto, M., Govea, M.", journal = "Revista Telematique", year = "2008", pages = {}, volume = "7", number = "3", } @online{UTAH:2014, author = {Horacio Fernandez Delpech}, title = {Ley del Estado de {Utah} sobre la {Firma Digital}. {Código Comentado. Título 46, Capítulo 3}}, year = {1996}, url = {http://www.hfernandezdelpech.com.ar/LegislacionYproExtEEEUUELeyEstadoUtahFirmaDig.htm}, } @Book{ PAREDES:2008, title = "Transformación de la cultura de servicios de información: una visión legal y de tecnologías", author = "Paredes, A.", publisher = "", year = "2008", } @Book{ SALAZAR, title = "Habeas Data en el derecho Comparado", author = "Salazar, E.", publisher = "", year = "2008", } @Book{ OBERTO-GUERRERO, title = "Algunas consideraciones sobre Habeas Data en Venezuela", author = "Oberto y Guerrero", publisher = "", year = "2008", } @Book{ ZAGARRA:2010, title = "Marco Legal de las Tecnologías de la Información y comunicación", author = "Zagarra R. Marco", publisher = "", year = "2010", } @Book{ FUENTES:2007, title = "Marco Legal de la Informática y la computación", author = "Fuentes, F.", publisher = "Vadell Hermanos", year = "2007", country="Venezuela", } @Electronic{UNIVERSIDADABIERTA:MEXICO, author = {Beatriz Di Totto}, title = {Delitos Informáticos}, year = {}, howpublished = {http://www.universidadabierta.edu.mx}, } @Electronic{Bracho:2010, author = {Pedro Bracho}, title = {Jurísprudencia. {Concepto y Características}}, year = {2010}, howpublished = {http://es.scribd.com/doc/81250967/JURISPRUDENCIA-Concepto-y-Caracteristicas}, } @Electronic{TIPOSPENALES:2014, author = {René De Sola}, title = {Los tipos penales en la {Ley Especial contra Delitos Informáticos}}, year = {}, howpublished = {http://beatrizditotto.net/2010/01/01/introduccion/}, urldate = {01-08-2014} } @Book{ LOGRERIA:2008, title = "Análisis critico de la tipicidad prevista en algunos artículos de la {Ley Especial Contra Delitos Informáticos Venezolana}", author = "Logreria, C., Fuentes F.", publisher = "Revista Electrónica de Estudios Telemáticos URBE", year = "2008", country="Venezuela", } @Book{ PENARANDA:2011, title = "{La Firma Electrónica Digital en Venezuela}", author = "Peñaranda, H., Héctor R.", publisher = "Universidad del Zulia", year = "2011", country="Venezuela", } @Book{ ODREMAN:2003, title = "{Eficacia Probatoria del mensaje de datos y de la Firma electrónica según la nueva Ley de Mensaje de Datos y Firmas Electrónicas}", author = "Odreman, G.", publisher = "UCAB", year = "2003", country="Venezuela", } @Book{ LONRENZETTI:2000, title = "{Comercio Electrónico}", author = "Lonrenzetti, R.", publisher = "Abeledo-Perrot", year = "2000", country="Argentina", } @Book{ URDANETA:2010, title = "{Los Mensajes de Datos y la Firma Electrónica (Seguridad Jurídica que ofrecen y Valor Probatorio)}", author = "Urdaneta B., José V.", publisher = "", year = "2010", country="Venezuela", } @Book{ RONDON, title = "{Comentarios generales al Decreto ley de Mensaje de Datos y Firmas electrónicas de la República Bolivariana de Venezuela}", author = "Rondón, A.", publisher = "", year = "0000", country="Venezuela", } @online{LEYMODELOCNUDMI:1996, author = {Comisión de las Naciones Unidas para el Derecho Mercantil Internacional}, title = {{Ley Modelo de la CNUDMI sobre Comercio Electrónico con la Guía para su incorporación al derecho interno}}, year = {1996}, url = {http://www.uncitral.org/pdf/spanish/texts/electcom/05-89453_S_Ebook.pdf}, } @Article{CLIC:13, title = "{Ley de Infogobierno}", author = "Montilla, M. and Roca, S.", journal = "Revista El Clic", year = "2013", pages = "", volume = "6", } @online{GOBIERNOELECTRONICOENVENEZUELA, author = {UCV}, title = {Gobierno Eelctrónico}, year = {2014}, url = {}, } @Book{ COLINA:05, title = "Seducir y Controlar.", author = "Colina, C.", publisher = "UCV", year = "2005", country="Venezuela", } @Article{CRISTOS:03, title = "{Privacidad y Protección de Datos Personales en Internet, ¿Es necesario contar con una regulación específica en México?}", author = "Cristos Velasco", journal = "Boletín de Política Informática I", year = "2003", pages = "", volume = "", } @Book{ FLORES:09, title = "Derecho Informático.", author = "Flores, L.", publisher = "Grupo Editorial Patria", year = "2009", country="México", } @Book{ GAMBA:10, title = "Panorama del derecho Informático en América Latina y el Caribe.", author = "Gamba, J.", publisher = "CEPAL", year = "2010", country="", } % referencias del prologo @Article{GOMARA:07, title = "Frankenstein, un espejo de la identidad humana", author = "Ramalle Gómara, E.", journal = "Berceo", year = "2007", pages = "81-96", volume = "153", } @Electronic{BOLIVAR:1819, author = "Bolívar, S.", title = "{Discurso ante el Congreso de Angostura el 15 de Febrero de 1819}", year = "1819", howpublished = {http://es.wikisource.org/}, } @Book{ ANDERSON:1983, title = "Imagined Communities. Reflections on the Origin and Spread of Nationalism.", author = "Anderson, B.", publisher = "Verso", year = "1998", country="EE.UU.", address="New York" } @Book{ MACINTYRE:1981, title = "After Virtue. A Study in Moral Theory.", author = "MacIntyre, A", publisher = "University of Notre Dame Press", address = "Indiana", year = "1984", country="EE.UU." } @Book{ ARENDT:1958, title = "The Human Condition.", author = "Arendt, H.", publisher = "The University of Chicago Press", year = "1998", country="EE.UU." } @online{SHELLEY:1818, author = {Shelley, M.}, title = {Frankenstein o el Moderno Prometeo}, year = {2004}, url = {http://www.librosenred.com/}, translator = {La edición no menciona el nombre del traductor} } @Book{ IDENTIDADDIGITAL:2014, title = "Seguridad Informática y la Identidad Digital", author = "Araujo, A., Bravo, V., Sumoza, R.", publisher = "Centro Nacional de Desarrollo e Investigación en Tecnologías Libres", year = "2014", country="Venezuela" } @Book{ MATTHEWS:2008, title = "Identity and Information Technology. En Information Technology and Moral Philosophy", author = "Matthews, S.", publisher = "Cambridge", year = "2006", country="EE.UU." } @Book{ NAIM:2006, title = "Ilícito. Cómo traficantes, contrabandistas y piratas están cambiando el mundo.", author = "Naím, M.", publisher = "Debate", year = "2006", country="Caracas, Venezuela", translator = "Francisco Ramos" } @Book{ ETZIONI:1999, title = "The Limits of Privacy", author = "Etzioni, A.", publisher = "Basic Book", year = "2006", country="New York, EE.UU." } @Article{FUENMAYOR:1991, title = "The Roots of Reductionism: a Counter-Ontoepistemology for a Systems Approach", author = "Fuenmayor, R.", journal = "Systems Practice", year = "1991", pages = "", volume = "4", } @Book{ PETTIT:2008, title = "Trust, reliance and the internet. En Information Technology and Moral Philosophy", author = "Pettit, P.", publisher = "Cambridge", year = "2008", country="EE.UU." } @Article{SANDEL:1989, title = "Moral Argument and Liberal Toleration: Abortion and Homosexuality.", author = "Sandel, M.", journal = "California Law Review.", year = "1989", pages = "", volume = "77", } @Article{OHARROW:1998, title = "Health Plans' Access to Pharmacy Data Raises Concerns about Privacy.", author = "O'harrow, R.", journal = "The Seattle Times", year = "1998", pages = "", volume = "", } @Article{MARKOFF:2002, title = "Pentagon Plans a Computer Systems that Would Peek at Personal Data of Americans.", author = "Markoff, J.", journal = "The New York Times", year = "2002", pages = "", volume = "", } @Article{GREENWALD:2013, title = "NSA collecting phone records of millions of Verizon customers daily.", author = "Greenwald, G.", journal = "The Guardian", year = "2013", pages = "", volume = "", } @Book{ GREENWALD:2014, title = "No Place to Hide. Edward Snowden, the NSA and the Surveillance State.", author = "Greenwald, G.", publisher = "Penguin Books Ltd.", year = "2014", country="United Kingdom" } @Article{GELLMANSOLTANI:2013, title = "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.", author = "Gellman, B. y Soltani, A.", journal = "The Washington Post.", year = "2013", pages = "", volume = "", } @Article{NEWYORKTIMES:2013, title = "Documents Show N.S.A. Efforts to Spy Both Enemies and Allies.", author = "New York Times", journal = "New York Times.", year = "2013", pages = "", volume = "", } @Book{ VANDENHOVEN:2008, title = "Information Technology, privacy, and the protection of personal data. En Information Technology and Moral Philosophy", author = "Van den Hoven, J.", publisher = "Cambridge", year = "2008", country="EE.UU." } @Article{RORTY:1996, title = "Who are we? Moral Universalism and Economic Triage.", author = "Rorty, R.", journal = "Segundo Foro de Filosofía de la Unesco", year = "1996", pages = "", volume = "", } % referencias del capitulo 10 @Electronic{DRAE:CIBERNETICA, author = {Real Academia de la Lengua Española}, title = {Diccionario de la Lengua Española (DRAE)}, year = {2001}, howpublished = {http://lema.rae.es/drae/?val=cibernética}, } @Book{ WIENER:1998, title = "Human use of human beings: Cybernetics and society.", author = "Wiener, N.", publisher = "Da Capo Press", year = "1998", country="" } @Article{BURTSEVA:2013, title = "Norbert Wiener: Padre de la cibernética.", author = "Burtseva, L., Tyrsa, V., Ríos, B., Flores, L.", journal = "Revista UABC", year = "2013", pages = "48", volume = "4", number = "54", } @Book{ ASHBY:1957, title = "An introduction to cybernetics", author = "Ashby, R", publisher = "Chapman \& Hall", year = "1957", country="" } @Book{ GIBSON:1984, title = "Neuromante", author = "Gibson, W.", publisher = "Minotauro", year = "1984", country="" } @Article{CICOGNANI:1998, title = "On the linguistic nature of cyberspace and virtual communities", author = "Cicognani, A.", journal = "Virtual reality", year = "1998", pages = "20", volume = "3", number = "1", } @Article{POST:2013, title = "Against’Against Cyberanarchy", author = "Post, D.", journal = "Berkeley Technology Law Journal", year = "2002", pages = "10", volume = "17", number = "", } @Article{ANDERS:2001, title = "Anthropic cyberspace: Defining electronic space from first principles", author = "Andres, P.", journal = "Leonardo", year = "2001", pages = "405", volume = "34", number = "5", } @Article{FLORES:2012, title = "Los Ámbitos no Terrestres en la Guerra Futura: Ciberespacio", author = "Flores, H.", journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden", year = "2012", pages = "18", volume = "", number = "128", } @Article{FRITZ:2013, title = "The Semantics of Cyber Warfare", author = "Fritz, J.", journal = "East Asia Security Symposium and Conference", year = "2013", pages = "2", volume = "1", number = "7", } @Book{ WINTERFELD:2012, title = "The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice", author = "Winterfeld, S., Andress, J.", publisher = "Elsevier Inc.", year = "2012", country="" } @Article{MCGRAW:2013, title = "Cyber War is Inevitable (Unless We Build Security In)", author = "McGraw, G.", journal = "Journal of Strategic Studies", year = "2013", pages = "111--112", volume = "36", number = "1", } @inproceedings{ALI:2013, author = {Kostyuk N. and Alí M.}, editor = {The Society of Digital Information and Wireless Communication}, title = {The Cyber Dogs of War: Joint Efforts of Future World Leaders in The Prevention of Cyberwarfare}, booktitle = {The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)}, year = {2013}, } @Article{LEWIS:2010, title = "The cyber war has not begun", author = "Lewis, J.", journal = "Center for Strategic and International Studies", year = "2010", pages = "", volume = "", number = "", } @Article{FERRERO:2013, title = "La Ciberguerra. Génesis y Evolución", author = "Ferrero, J.", journal = "Revista General de Marina", year = "2013", pages = "87", volume = "", number = "Enero-Febrero", } @Article{KIRAVUO:2013, title = "Offensive Cyber-capabilities against Critical Infrastructure", author = "Kiravuo, T.", journal = "Cyber Warfare. National Defence University. Department of Military Technology", year = "2013", pages = "90", volume = "", number = "34", } @Article{FOJON:2011, title = "Ciberespacio: La Nueva Dimensión del Entorno Operativo", author = "Sanz, A., Fojón, E.", journal = "Centro Superior de Estudios de la Defensa Nacional Monografías del Ceseden", year = "2011", pages = "43", volume = "", number = "44", } @Article{SALMINEN:2013, title = "The Fog of Cyber Defence", author = "Rantapelkonen, J., Salminen, M.", journal = "National Defence University. Department of Leadership and Military Pedagogy", year = "2013", pages = "11", volume = "", number = "2", } @Article{STARR:2009, title = "Towards an Evolving Theory of Cyberpower", author = "Starr, S.", journal = "The Virtual Battlefield: Perspectives on Cyber Warfare", year = "2013", pages = "22--24", volume = "3", number = "", } @Article{OLSON:2012, title = "El boxeo con un contrincante imaginario. La guerra cibernética y el ataque económico estratégico", author = "Olson, S.", journal = "Military Review", year = "2012", pages = "67", volume = "", number = "Noviembre-Diciembre", } @Article{COLOM:2009, title = "El nuevo concepto estadounidense para el empleo de la fuerza militar", author = "Colom, G.", journal = "ARI: Seguridad y Defensa", year = "2009", pages = "2", volume = "", number = "70", } @Electronic{DoD:2012, author = {Panetta, L.}, title = {Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security}, year = {2012}, howpublished = {http://www.defense.gov/transcripts/transcript.aspx?transcriptid=5136}, } @Electronic{CHINESE:2013, author = {Chinese People's Liberation Army}, title = {Pentagon's cyberattack accusations irresponsible: expert}, year = {2013}, howpublished = {http://eng.chinamil.com.cn/news-channels/pla-daily-commentary/2013-05/08/content\_5333521.htm}, } @Article{STONE:2013, title = "Cyber War Will Take Place!", author = "Stone, J.", journal = "Journal of Strategic Studies", year = "2013", pages = "107", volume = "36", number = "1", } @Book{ HARRISON:2012, title = "Cyber Warfare and the Laws of War", author = "Harrison, H.", publisher = "Cambridge University Press", year = "2012", country="" } @Article{RID:2012, title = "Cyber war will not take place", author = "Stone, J.", journal = "Journal of Strategic Studies", year = "2013", pages = "9", volume = "35", number = "1", } @Article{JUNIO:2013, title = "How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate", author = "Junio, T.", journal = "Journal of Strategic Studies", year = "2013", pages = "130", volume = "36", number = "1", } @misc{BEIDLEMAN:2009, author = "Beidleman, S.", title = "Defining and Deterring Cyber War", year = "2009", } @Article{SANCHEZ:2010, title = "La nueva estrategia comunicativa de los grupos terroristas", author = "Sánchez, G.", journal = "Revista Enfoques", year = "2010", pages = "203", volume = "VIII", number = "12", } @Article{GOLDSMITH:2010, title = "The New Vulnerability (How Cyber Changes the Laws of War).", author = "Goldsmith, J.", journal = "The New Republic", year = "2010", pages = "", volume = "", number = "", } @Article{BRENNER:2007, title = "“At light speed”: Attribution and response to cybercrime/terrorism/warfare", author = "Brenner, S.", journal = "The Journal of Criminal Law and Criminology", year = "2007", pages = "382", volume = "", number = "", } @Book{ JANCZEWSKI:2008, title = "Cyber warfare and cyber terrorism", author = "Janczewski, L., Colarik, A.", publisher = "IGI Global", year = "2008", country="" } @misc{ONU:1945, author = "Organización de las Naciones Unidas", title = "Carta de las Naciones Unidas. Entrada en vigor: 24 de octubre de 1945, de conformidad con el artículo 110", year = "1945", } @Article{HOISINGTON:2009, title = "Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense", author = "Hoisington, M.", journal = "Boston College International and Comparative Law Review", year = "2009", pages = "446", volume = "32", number = "", } @Article{BANKS:2013, title = "The Role of Counterterrorism Law in Shaping Ad Bellum Norms for Cyber War", author = "Banks, W.", journal = "89 INT’L L. STUD. 157. Available at SSRN 2160078", year = "2013", pages = "162", volume = "", number = "", } @Article{BERNAL:1999, title = "Mercosur ¿Regionalismo o globalización? Tres aspectos para la decisión de políticas", author = "Bernal-Meza, R.", journal = "Revista Realidad Económica", year = "1999", pages = "2", volume = "", number = "165", } @Article{BIZZOZERO:2011, title = "América Latina a inicios de la segunda década del siglo XXI: entre el regionalismo estratégico y la regionalización fragmentada", author = "Bizzozero, Lincoln", journal = "Revista Brasileira de Política Internacional", year = "2011", pages = "36", volume = "54", number = "1", } @misc{UNASUR:2008, author = "UNASUR", title = "Tratado Constitutivo de la Unión de Naciones Suramericanas", year = "2008", } @Article{SAINTPIERRE:2008, title = "El Consejo Sudamericano de Defensa", author = "Saint-Pierre, H.; Castro, G.", journal = "Boletín RESDAL", year = "2008", pages = "1", volume = "6", number = "29", } @Book{ CLAUSEWITZ:2002, title = "De La Guerra.", author = "Clausewitz, C.", publisher = "Editorial Librodot", year = "2002", country="" } @Electronic{CDS:2008, author = {Consejo de Defensa Sudamericano}, title = {Objetivos Consejo de Defensa Suramericano UNASUR}, year = {2008}, howpublished = {http://www.unasursg.org/inicio/organizacion/consejos/cds}, } @misc{CEED:2012, author = "CEED", title = "Informe de Avance a diciembre de 2012 sobre Conceptos e Institucionalidad de Seguridad y Defensa, Amenazas, Factores de Riesgo y Desafíos del Consejo Sudamericano de Defensa", year = "2012", } @Article{MENEZES:2010, author = "Menezes, A.", title = "Regionalismo y seguridad sudamericana: ¿son relevantes el Mercosur y la Unasur? Íconos", journal = "Revista de Ciencias Sociales", year = "2010", pages = "41--53", volume = "", number = "38", } @Electronic{DANTAS:2013, author = {Dantas, C. y Jeronimo, J.}, title = {Como eles espionam. Istoe.}, year = {2013}, howpublished = {http://www.istoe.com.br/reportagens/paginar/323087\_COMO+ ELES+ESPIONAM/12}, } @Article{LIMNELL:2013, title = "Limnéll, J.", author = "Offensive Cyber Capabilities are Needed Because of Deterrence", journal = "The Fog of Cyber Defence", year = "2013", pages = "202--205", volume = "", number = "10", } @misc{FORTI:2013, author = "Forti, A.", title = "El papel de la Defensa en una Estrategia Suramericana para el Aprovechamiento de los Recursos Naturales. Conferencia Suramericana Visiones Hacia Una Estrategia Para El Aprovechamiento de Los Recursos Naturales", year = "2013", } @misc{CDS:2012, author = "Consejo de Defensa Sudamericano", title = "Plan de Acción 2012 – CDS", year = "2012", } @Book{ ZEDONG:1976, title = "Problemas de la Guerra y de La Estrategia. ", author = "Zedong, M.", publisher = "Ediciones En Lenguas Extranjeras Pekín", year = "1976", country="" } @Electronic{ZIBECHI:2011, author = {Zibechi, R.}, title = {La silenciosa revolución suramericana}, year = {2011}, howpublished = {http://www.jornada.unam.mx/2011/12/02/politica/025a1pol}, } @Article{HUOPIO:2013, title = "A Rugged Nation", author = "Hupio, S.", journal = "The Fog of Cyber Defence", year = "2013", pages = "127", volume = "", number = "10", } @Book{ LIANG:1999, title = "Unrestricted Warfare", author = "Liang, Q. y Xiangsui, W.", publisher = "PLA Literature and Arts Publishing House", year = "1999", country="China" } @misc{UNASUR:2013, author = "UNASUR", title = "{VII} Reunión Ordinaria del Consejo de Jefas y Jefes de Estado y de Gobierno de la Unión de Naciones Suramericanas Declaración de Paramaribo", year = "2013", } @Article{KARKKAINEN:2013, title = "The Origins and the Future of Cyber Security in the Finnish Defence Forces", author = {K\"arkk\"ainen, A.}, journal = "The Fog of Cyber Defence", year = "2013", pages = "", volume = "", number = "10", } @misc{UNASUR:2009, author = "UNASUR", title = "Declaración de Santiago de Chile. Primera Reunión del Consejo de Defensa Suramericano (CDS) de la Unión de Naciones Suramericanas (UNASUR)", year = "2009", } @Electronic{TELAM:2014, author = {Assange, J.}, title = {No hay elección, tenemos que pasarnos al software libre para nuestra mejor protección}, year = {2014}, howpublished = {http://www.telam.com.ar/notas/201409/79058-julian-assan-software-libre-ciberseguridad-espionaje.html}, } @Book{ LIDDELL:1946, title = "La Estrategia de Aproximación Indirecta", author = "Liddell, B.", publisher = "Atalaya: Iberia-Joaquín Gil, Editores, S.A.", year = "1946", country="" } @Book{LENIN:1973, title = {Vladímir Lenin Obras Tomo XII (1921-1923)}, publisher = {PROGRESO}, year = {1973}, address = {MOSCU}, } @Book{NATO:2013, author = {NATO Cooperative Cyber Defence Centre of Excellence Tallinn}, title = {Tallinn Manual on the International Law Applicable to Cyber Warfare}, publisher = {Schmitt}, year = {2013}, note = {www.ccdcoe.org/249.html}, } @Manual{NSA:2012, title = {Presidential Policy Directive 20}, author = {NSA}, year = {2012}, note = {"https://www.hsdl.org/?abstract\&did=725668"}, } @Misc{Infogobierno:2013, author = {Asamblea Nacional}, title = {Ley de Infogobierno}, howpublished = {Gaceta Oficial de la República Bolivariana de Venezuela Número: 40.274 del 17/10/2013}, year = {2013}, } @Electronic{NSA:2009, author = {NSA}, title = {SIGINT Frequently Asked Questions}, year = {2009}, howpublished = {https://www.nsa.gov/sigint/faqs.shtml\#sigint1}, }