Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


EXHIBIT F - Publications 


MSI0156840-45 

MSI017361-62 

MSI017548-556 

MSI017864-70 

MSI017899-911 

MSI018529-74 

MSI018811-19 

MSI019082-99 

MSI020348-370 

MSI020373-384 

MSI020389-396 

MSI021744 

MSI022371-380 

MSI022440-455 

MSI022766-23028 

MSI027045-068 

MSI036052-92 

MSI0361 13-28 

MSI067984-8007 

MSI068022 et seq. 

MSI07%1 1-656 

MSI079796-806 

MSI079844-49 

MSI079850-56 

MSI079850-56 

MSI080030-40 

MSI080O41-42 

MSI080043-97 

MSI080098-102 

MSI080103-116 

MSI0801 17-119 

MSI080120-31 

MSI080160-164 

MSI080173-188 

MSI080194-2O4 

MSI08020S-222 

MSI080254-260 

MSI080261-276 

MSI08029O-302 

MSI080337-348 

MSI080349-55 

MSI080356-397 

MSI080410-419 

MSI080420-422 


MSI08044 1-445 

MSI080456-478 

MSI080562-574 

MSI080575-696 

MSI080697-712 

MSI080779-784 

MSI080875-909 

MSI080910-26 

MSI080927-973 

MSI080974-81007 

MSI081052-66 

MSI081140etseq 

MSI081240etseq. 

MSI081464 et seq. 

MSI081464-717 

MSI082792-826 

MSI082958-30O2 

MSI083003-13 

MSI083 105-107 

MSI083108-179 

MSI083356 et seq. 

MSI083356-99 

MSI083400 

MSI083410 

MSI083423 

MSI083423-443 

MSI083444 et seq. 

MSI085035-6 

MSI085043-48 

MSI085049-58 

MSI085078-114 

MSI0851 15-35 

MSI085 136-149 

MSI085189-200 

MSI085211 

MSI085217-29 

MSI085230-44 

MSI085245-350 

MSI085479-521 

MSI085551-68 

MSI085569 

MSI085569-92 

MSI085593-653 

MSI085654 


MSI085704etseq. 

MSI085756 

MSI085831-33 

MSI085834-36 

MSI085837-39 

MSI085840-42 

MSI085843-44 

MSI086146-55 

MSI086641-52 

MSI086653-62 

MSI086675-86 

MSI086687-703 

MSI086704-727 

MSI086845-863 

MSI086864-67 

MSI086893-904 

MSI086905-919 

MSI086923-25 

MSI086926-32 

MSI086946-950 

MSI086951-73 

MSI086985-87006 

MSI087007-36 

MSI087007-36 

MSI087037-43 

MSI087044-46 

MSI087047-6O 

MSI087061-80 

MSI087081-88 

MSI087089-106 

MSI087107-14 

MSI087153-54 

MSI087160-62 

MSI087341-51 

MSI087352-364 

MSI087365-86 

MSI087392-407 

MSI087408-421 

MSI087422-443 

MSI087444-447 

MSI087448-453 

MSI087454-465 v 

MSI087519-31 

MSI087532-45 


EXHIBIT F - MICROSOFT'S CORPORATION'S 
_1 - PATENT LOCAL RULE 4-2 DISCLOSURE 
(LIMITED TO "MINI-MARKMAN" CLAIMS), 
CASE NO. C 01-1640 SBA 


EXHIBIT F - Publications 


MSI087558-75 

MSI089O68-165 

MSI163358-59 

MSI087576-85 

MSI089191-200 

MSI163519-23 

MSI087586-592 

MSI089974-90004 

MSI163935-4204 

MSI087598-623 

MSI090025-45 

MSI164205-4281 

MSI087681-693 

MSI090055-66 

MSI164771-800 

MSI087694-707 

MSI090091-114 

MSI164842-46 

MSI087717-24 

MSI090181-244 

MSI1681 15-131 

MSI087725-36 

MSI093870-94277 

MSI168132-56 

MSI087737-47 

MSI094278 

MSI168350-385 

MSI087748-64 

MSI094738 et seq. 

MSI173839-868 

MSI087765-75 

MSI095044 et seq. 

MSI173884-886 

MSI087776-793 

MSI095787 et seq. 

MSI173887-892 

MSI08781 1-820 

MSI096004 et seq. 

MSI173893-904 

MSI087821-838 

MSI120670-720 

MSI173905-906 

MSI087839-51 

MSI132777-87 

MSI175647-669 

MSI087852-65 

MSI156788-93 

MSI175666-704 

MSI088177-79 

MSI156834-39 

MSI175722-730 

MSI088186-203 

MSI161724-31 

MSI17573-739 

MSI088297 

MSI161742-52 

MSI175738-763 

MSI088297-313 

MSI161753-60 

MSI175740-748 

MSI088314 

MSI161761-96 

MSU75764-787 

MSI088342 

MSI161797-800 

MSI175788-795 

MSI088363 

MSI161856-65 

MSI175818-839 

MSI088368 

MSI 16 1886-94 

MSI 175 840-903 

MSI088508512 

MSI161 895-901 

MSI175869-934 

MSI088562-759 

MSI161921-42 

MSI175904-911 

MSI088773-80 

MSI161943-68 

MSI175912-944 

MSI088781-95 

MSI161969-85 

MSI175935-943 

MSI088820-73 

MSI1 62040-60 

MSI175944-978 

MSI088876-78 

MSI162061-75 

MSI176004-070 

MSI088876-78 

MSI162132etseq. 

MSI1 76033-073 

MSI088879-80 

MSI162160-355 

MSI176183-204 

MSI088881-83 

MSI162646 

MSI192494-509 

MSI088884-8S 

MSI162654-69 

MSI192652-60 

MSI088886-87 

MSI162698-710 

MSI192773-87 

MSI088888-89 

MSI162729-45 

MSI197506-8536 

MSI088890-91 

MSI162756-76 

MSI198537-8578 

MSI088892-94 

MSI162788-800 

MSI198579-8690 

MSI088896-902 

MSI162820-23 

MSI198691-8846 

MSI088903-13 

MSI162830-37 

MSI199341 

MSI088914-18 

MSI162841-45 

MSI199404 

MSI088919-33 

MSI163014-79 

MSI199417 

MSI088938-9026 

MSI163338-39 

MSI1 99425 

MSI088953 

MSI163355-57 

MSI199480 


EXHIBIT F - MICROSOFT'S CORPORATION'S 
" 2 " PATENT LOCAL RULE 4-2 DISCLOSURE 
(LIMITED TO "MINI-MARKMAN" CLAIMS), 
CASE NO. C 01-1640 SBA 


EXHIBIT F - Publications 


MSI199485 
MSI1 99525 
MSI199536 
MSI199550 
MSI199576 
MSI199605 
MSI199612 
MSI1 99618 
MSI199633 
MSI199645 
MSI199681 
MSI199700 
MSI199736 
MSI199738 
MSI199743 
MSI199755 
MSI204966 
MSI204983 
MSI205081 
MSI205118 
MSI205137 
MSI205190 
MSI205529 
MSI205548 
MSI205621 
MSI205633 
MSI205648 
MSI205650 
MSI205659 
MSI205660 
MSK05749 
MSI205967 
MSI205981 
MSI206028 
MSI206144 
MSI206178 
MSI206672 
MSI206764-76 
MSI206777 
MST206951 
MSI206952 
MSI206982 
MSI207089 
"MSt207745-80 


MSI207781-819 

MSI207820-46 

MSI207847-72 

MSI207873-901 

MSI207998-8022 

MSI208023-45 

MSI208222-79 

MSI208280-320 

MSI208321-63 

MSI208364-98 

MSI208434-64 

MSI208465-501 

MSI208843-67 

MSI209487-95 

MSI209496-524 

MSI209525-46 

MSI209547-58 

MSI209692-712 

MSI209713-26 

MSI209854-68 

MSI209981-90 

MSI210379-402 

MSI210403-20 

MSI210421-27 

MSI210447 

MSI210496-516 

MSI210517-21 

MSI210522-30 

MSI210838-55 

MSI210856-899 

MSI210900-40 

MSI210941-83 

MSI210984-90 

MSI21 1023-24 

MSI21 1026-27 

MSI21 1071-132 

MSKl 1133-79 

MSI21 1180-324 

MSI21 1325-465 

MSI21 1504-5 

MSI21 1515-17 

MSI21 1582-610 

MSI213017-25 

MSI213026-41 


MSI213042-65 
MSI213076-87 
MSI213088-96 
MSI213206-10 
MSI2132 11-13 
MSI213214-20 

(see also cited production 
documents such as LINN, 
NIST) 


EXHIBIT F - MICROSOFT'S CORPORATION'S 
-3" PATENT LOCAL RULE 4-2 DISCLOSURE 
(LIMITED TO "MINI-MARKMAN" CLAIMS), 
CASE NO. C 01-1640 SBA 


Exhibit F Publications 


Bates Number 

Author and Title 

MSI01 56840 

Willett, S., "Metered PCs: Is Your System Watching You?, Wave Systems 
Beta Tests New Technology," May 2, 1994. 

MSI017361 

Cox, B., "Superdistribution," January 1996. 

MSI017548 

Hauser, Ralf, C, "Does Licensing Require New Access Control 
Techniques?," August 12, 1993. 

MSI017864 

Purdy, G.B., et al., "A Software Protection Scheme," April 1982. 

MSI017899 

Sibert, O., et al., "The DigiBox: A Self-Protecting Container for 
Information Commerce," July 1995. 

MSI018529 

Lampson, B., et al. "Authentication in Distributed Systems in Theory 
and Practice," November 4, 1992. 

MSI018811 

Newman, B.C., "Proxy-Based Authorization and Accounting for 
Distributed Systems," 1993. 

MSI019082 

CUPID, "Protocols and Services (Version 1): An Architectural Overview," 
November 1997. 

MSI020348 

Herzberg, A., et al., "Public Protection of Software," November 1987. 

MSI020373 

Hot Java: "The Security Story," 1996 

MSI020389 

JavaSoft, "Frequently Asked Questions-Applet Security," June 7, 1996. 

MSI021744 

Arneke, D., "AT&T Encryption System Protects Information Services" News 
Release, January 9, 1995. 

MSI022371 

Low, S.H., et al., "Anonymous Credit Cards," November 1994. 

MSI022440 

Kristol, D.M., et al., "Anonymous Internet Mercentile Protocol," March 17, 
1994. 

MSI022766 

The First USENIX Workshop on Electronic Commerce Proceedings, 
July 1995. 

MSI027045 

Denning, Dorothy E., et al., "Data Security," September 1979; 

MSI036052 

Wobber, E., et al. "Authenticating in the Taos Operating System," 
Digital Systems Research Center," December 10, 1993. 

MSI036113 

Olson, M., et al., "Concurrent Access Licensing," 1988. 


Exhibit F Publications 


MSI067984 

Kahn, D., "The Codebreakers: The Story of Secret Writing," December 
1996. 

MSI068022 

Cohen, F.B., "Protection and Security on the Information 
Superhighway," 1995. 

MSI079611 

Brockschmidt Kraia "Inside OLE 2." 1994. 

m& ■ %J X# ■ ^ %^ \f 1 III II \M %q 1 % 1 %A 1 ■ III I VI v mm mm mm 1 ■ %f %F » • 

MSI079796 

loannidis, J., et al. t The Architecture and Implementation of Network-Layer 

MSI079844 

Berners-Lee, T.J., et al., "Networked Information Services: The World-Wide 

\A/oh " 1 QQO 

IVIOIU / C/OUU 

Rivp<5t R I pt al "A Mpfhod for Obtainina Diaital Sianatures and Public- 
Key Cryptosystems," 1978. 

MSI079850 

Rivest, R.L., et al., "A Method for Obtaining Digital Signatures and Public- 
Key Cryptosystems," 1978. 

MSI080030 

Ferraiolo, D., et al., "Role-Based Access Control," 1992. 

IVIOIVJOVUH 1 

NIST "Role Based Access Control " 1992 

MSI080043 

U.S. Department of Commerce (NIST), "Security Requirements for 
orypioyrapniu iviuuuico, unuaieu. 

IVIOIU0UUC70 

Krpufypr A N "An Dn-I inp Sv^tpm for Controllinn and Monitorina 
Software Usage in a Microcomputer Laboratory," August 1988. 

MSI080103 

Millen, J.K., et al., "Security for Object-Oriented Database Systems," 
May 1992. 

MSI080117 

Kim, L, et al., "Novell Cuisine," 1991. 

MSI080120 

Koenia. A.. "Automatic Software Distribution." June 1984. 

MSI080160 

Leiss, E., "On Authorization Systems with Grantor-Controlled 

Pronunciation on PrivilpnpQ " 1Qft^ 

MSI080173 

Strack, Hermann, "Extended Access Control in UNIX System V-ACLs 
and Context " Auaust 1990 

MSI080194 

Polk, T.W., "Approximating Clark-Wilson "Access Triples" with Basic 
UNIX Controls," October 1993. 

MSI080205 

Kamens, J. I., "Retrofitting Network Security to Third-Party Applications-The 
SecureBase Experience," October 1993. 


Exhibit F Publications 


MSI080254 

Gamble, Todd, "Implementing Execution Controls in Unix," 1993. 

MSI080261 

Epstein, J., "A Trusted X Window System Server for Trusted Mach," 
August 30, 1990. 

MSI080290 

Kelter, U., "Discretionary Access Controls in a High-Performance Object 
Manaaement Svstem " 1991 

I v I Wi t l 29 ill r ll j \J illy i \J \f i * 

MSI080337 

Downs, D.D., et al., "Issues in Discretionary Access Control," April 1985. 

MSI080349 

Solomon, Daniel, J., "Processing Multilevel Secure Objects," April 
1981. 

MSI080356 

Kim, Won, et al., "Object-Oriented Concepts, Databases, and 
Applications," 1989. 

MSI080410 

Maude, T., et al., "Hardware Protection Against Software Piracy," 
September 1984. 

MSI080420 

Lipson, S., "Little Black Box 'Blocks' Illicit Software Copying," September 
14 1986 

MSI080441 

Sandhu, Ravi, S., et al., "Implementation Considerations for the Typed 
Access Matrix Model in a Distributed Environment," October 1992. 

MSI080456 

Rescorla, E., et al., "The Secure HyperText Transfer Protocol," June 1994. 

MSI080562 

Keefe, T.F., et al., "Prototyping the SODA Security Model," 1990. 

MSI080575 

National Security Agency, "A Guide to Understanding Security 
Modelino in Trusted Svstems " October 1992. 

MSI080697 

Sandhu, R.S., "The Typed Access Matrix Model," May 1992. 

MSI080779 

Lunt, Teresa, "Multilevel Security for Object-Oriented Database 
Systems," 1990. 

MSI080875 

Tygar, J.D., et al., "Strongbox: A System for Self-Securing Programs," 
1991. 

MSI080910 

Yee, B., et al., "Secure Coprocessors in Electronic Commerce 
Applications." Julv 1995. 

* *P* f ■ * ^v»*w mm ^vr m m mj j mj mm m w 9 mr mw mwm 

MSI080927 

Franklin, M., et al., "An Overview of Secure Distribution Computing," 
March 24, 1992. 

MSI080974 

Anderson, R., "Why Cryptosystems Fail," November 1993. 

MSI081052 

Bishop, M., "Anatomy of a Proactive Password Changer," 1992. 


Exhibit F Publications 


MSI081140 

Time-Life Books, "Understanding Computers: Computer Security," 
1986. 

MSI081240 

Wood, P.H., et al., "UNIX System Security," 1985. 

MSI081464 

Custer, Helen, "Inside Windows NT," 1993. 

MSI081464 

Custer, Helen, "Inside Windows NT," 1993. 

MSI082792 

Symantec Corporation, "THINK Pascal: The Fastest Way to Finished 
Software," 1990. 

MSI082958 

Olivier, M.S., et al., "A Taxonomy for Secure Object-Oriented 
Databases," 1994. 

MSI083003 

McCollum, C.J., et al., "Beyond the Pale of MAC and DAC-Defining 
New Forms of Access Control," 1990. 

MSI083105 

"Mach Books," viewed on February 6, 2002 at 

<httrv/A/u\A/w9 r«s rmn priii/afc/r^/nroipet/maeh/Dublic/www/doc/books html > 

MSI083108 

Department of Defense, "Trusted Computer System Evaluation 
Criteria," Dece.ber 1985. 

MSI083356 

LaLonde Wilf, R., et al., "Inside Smalltalk," Volume 1, 1990. 

MSI083356 

LaLonde Wilf, R., et al., "Inside Smalltalk," Volume 1, 1990. 

MSI083400 

Muftic, Sead, "Security Mechanisms for Computer Networks," 1989. 

MS I08 34 10 

Konheim, Alan, G., et al., "Cryptography: A Primer," 1981. 

MSI083423 

Davies, D.W., et al., "Security for Computer Networks," 1984. 

MSI083423 

Davies, D.W., et al., "Security for Computer Networks," 1984. 

MSI083444 

Castano, S., et al., "Database Security," 1995. 

MSI085035 

OOPSLA 1993: Addendum to the Proceedings, "Security for Object- 
Oriented Svstems." September 26-October 1. 1993. 

MSI085043 

Thuraisingham, B., et al., "Parallel Processing and Trusted Database 
Management Systems," 1993. 

MSI085049 

Secure Computing, "Constructing a High Assurance Mail Guard," 1994. 

MSI085078 

Sandhu, R.S., et al., "Data and Database Security and Controls," 1993. 


Exhibit F Publications 


MSI085115 

Thomas, R.K., et at., "Implementing the Message Filter Object-Oriented 

Qopi iritw Mr\rlol iA/ithm it Tri ictoH Qi iKio^tc " Aimiiot 

Occuniy iviuuci wiuiuui i ruoicu ouujcuio, r\uyuoi ly^t. 

MSI085136 

Sandhu, R., et al., "A Secure Kernelized Architecture for Multilevel Object- 
crienieu uaiaijases, juiit? iyyi. 

ivioiuoD ioy 

^ihprt O pf a\ "Thp Infpl fiOyftfi Prnrp^nr Arrhitppfurp' Pitfalls for 

OIUCI I, \_/ . , dell., I I IC IIHCI OuAOU riUUCOOUl r\l \sl MlCVslUI w. i III CI MO IVJI 

Secure Systems," May 1995. 

MolUOOZ 1 1 

Well C, VV ., Of la II 1 lid) 1 ix/AINL/ v>UI fJUl allUI 1 r al ICi. 1 1 IC ll lid 1 1 uoi uui 1 1 1 1 ICI UC 

Architecture," 1997. 

MSI085217 

Fine, T.,et al, "Assuring Distributed Trusted Mach," 1993. 

MolUoo^oU 

iviineaT, o.c.j "roviuiny ruiiuy ooruroi v^vei v^ujcui ^fjt?icuiui io hi a ivictuii 
Based System," April 28, 1995. 

MSI085245 

Harris, J., et al., "Bento Specification/' July 15, 1993. 

MSI085479 

Young, W.D., "Verifiable Computer Security and Hardware: Issues," 
Seotember 1991 

MSI085551 

Denning, A., "OLE Controls Inside Out," 1995. 

MSI085569 

Denning, D., "Crytography and Data Security," 1982. 

MSI085569 

Denning, D., "Crytography and Data Security," 1982. 

K/icinoccno 

ocnneier, diucb, Mppiieu orypiograpny. rruiQuuio, Miyunuiiiid, cuiu 
Source Code in C," 1994. 

iMicinocccvi 
IVIolUo0004 

ftarfinkal Qimcon ot al "Prartiral UNIX 9pruritv " 1QQ1 
oariiriKei, oimsun, ©i ai-, r radical uiiia ocuuniy, iwu 

MSI085704 

Dougherty, D., et al., "The Mosaic Handbook for the X Window 
oystem, i 994. 

MSI085756 

Curry, D.A., "UNIX System Security: A Guide for Users and System 
Aominisiraiors, 

MSI085831 

International Infrastructure Standards Panel, "MSP Need #31 -Containers or 

cpn irp parkaninn " ^pntpmhpr 1ft 1QQ^ 

MSI085834 

International Infrastructure Standards Panel, "MSP Need #32- 
Authentication of Content," September 18, 1995. 

MSI085837 

International Infrastructure Standards Panel, "IISP Need #33-Control 
Enforcement," September 18, 1995. 


Exhibit F Publications 


MSI085840 

International Infrastructure Standards Panel, "MSP Need #34-Billing and 
Payment," September 18, 1995 

MSI085843 

International Infrastructure Standards Panel, "HSP Need #35-Reporting," 
September 18, 1995. 

MSI086146 

Kaplan, M., "IBM Cryptolopes, Super Distribution and Digital Rights 
Management," December 30, 1996. 

MSI086641 

Sebes, E.J., et al., "The Triad System: The Design of a Distributed, Real- 
Time, Trusted System," January 22, 1998. 

MSI086653 

Sebes, E.J., et al., "The Architecture of Triad: A Distributed, Real-Time, 
Trusted System," (undated). 

MSI086675 

Sebes, E.J., "Overview of the Architecture of Distributed Trusted Mach," 
undated. 

MSI086687 

Vickers Benzel, T.C., et al., "Identification of Subjects and Objects in a 
Trusted Extensible Client Server Architecture," undated. 

MSI086704 

Borenstein, N., "MIME Extensions for Mail-Enabled Applications: 
Application/Safe-Tel and Multipart/Enabled-Mail," November 1993. 

MSI086845 

Bellare, M., "iKP-A Family of Secure Electronic Payment Protocols," April 
16 1995 

MSI086864 

Harn, Lein, et al., "A Software Authentication System for the 
Prevention of Computer Viruses," 1992. 

MSI086893 

Deutsch, P., "GZIP File Format Specification Version 4.3," May 1996. 

MSI086905 

Gong, Li, "A Secure Identity-Based Capability System," January 1989. 

MSI086923 

Merkle, R.C., "Secure Communications Over Insecure Channels," April 
1978. 

MSI086926 

Denning, D.E., "Secure Personal Computing in an Insecure Network," 
August 1979. 

MSI086946 

Medvinsky, G., et al., "NetCash: A Design for Practical Electronic 
Currency on the Internet," 1993. 

MSI086951 

Franz, M., Technological Steps Toward a Software Component Industry," 
undated. 

MSI086985 

Kent, S., et al., "Privacy Enhancement for Internet Electronic Mail: Part II- 
Certificate-Based Key Management," August 1989. 


Exhibit F Publications 


MSI087007 

Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part I— 
Message Encipherment and Authentication Procedures," August 1989. 

MSI087007 

Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part I— 
Message Encipherment and Authentication Procedures," August 1989. 

MSI087037 

Chaum, D., "Achieving Electronic Privacy," August 1992. 

MSI087044 

Microsoft Press, OLE 2 Programmer's Reference; Volume 1 , "Working with 

VVIII\JUWO V-/U|COlO, I J7k7*t. 

MSI087047 

Brockschmidt, K., "A Primer on Designing Custom Controls," 

MSI087061 

Klemond, P., "Taking the Bull by the Horns: Investigating Object Linking 

anH FmhpHriinn Part 1 " Marrh/Anril 1QQ9 
dl IU CI I lUGUUMiy , rail I, IVldl Ol \lr\\J\ ll \<j<3c.. 

IVIOIWO 1 \J\J 1 

KIpmnnH P "Invp^tiaatina Obiect Linkina and Embeddina Part II" Addina 
Server Support," May/June 1992. 

MSI087089 

DiLascia, Paul, "OLE Made Almost Easy: Creating Containers and 
Servers Using MFC 2.5," April 1994. 

MSI087107 

Coad, Peter, "Object-Oriented Patterns," September 1992. 

MSI087153 

Zelnick Nate "Keeoina Business Safe on the Internet " Aoril 25. 1995 

VmS 1 1 1 |wl\| 1 1 V* Iw } 1 \W Wk/I I iy L^U Wl 1 1 WWW V-/ 1—4 1 W 1 VI 1 III IWI 1 1 W h, 1 ■p / * 1 < aw w , 1 W w \+ * 

MSI087160 

Lucent Technologies, "AT&T Encryption System Protects Information 

Qor\/iroc " Isniisrv/Q 1 QQ ^ 

Ocl VIUCO) OdllUdiy 9, I9«79< 

MSI087341 

Birrell, Andrew, D., et al., "A Global Authentication Service Without 

MSI087352 

Gasser, M., et al., "The Digital Distributed System Security Architecture," 

1Q8Q 

1 s?OI7. 

MSI087365 

Abadi, M., et al., "Authentication and Delegation with Smart-Cards," 
1990 

MSI087392 

Zeleznick, MP., "Security Design in Distributed Computing Applications," 
December 1993. 

MSI087408 

Moffett, Jonathan, D., et al., "An Introduction to Security Distributed 
Systems," August 1993. 

MSI087422 

Netscape, "SSL 2.0 Protocol Specification," February 9, 1995. 


Exhibit F Publications 


MSI087444 

Davis, D., et al., "Network Security via Private-Key Certificates," October 
1990. 

MSI087448 

Gruber, R., et al., "Disconnected Operation in the Thor Object-Oriented 
Database System," December 1994. . 

MSI087454 

Ting, T.C., et al., "Requirements, Capabilities and Functionalities of 
User Role Based Security for an Object-Oriented Design Model," 
1992 

MS 108751 9 

Gifford, David, K., "Crytographic Sealing for Information Secrecy and 
Authentication," 1982. 

MSI087532 

Boly, J.P., et al., "The ESPIRIT Project CAFE: High Security Digital 
Payment Systems," 1994. 

MSI087558 

Kluepfel, H.M., "Securing a Global Village and its Resources: Baseline 
Security for Interconnected Signaling System #7 Telecommunications 
Networks " 1993 

MSI087576 

Uhler, Stephen A., "PhoneStation, Moving the Telephone onto the 
Virtual Deskton " Januarv 1993 

VII IUQI ^wOI\lWftJ, vallUul y • w w w ■ 

MSI087586 

Brown, Patrick W., "Digital Signatures: Can They Be Accepted as 
L Anal Sianatures in EDI? " November 1993. 

MSI087598 

Popek, Gerald, J., et al., "Encryption and Secure Computer 

Nptu/ork^ " Hpr.pmhpr 1979 

MSI087681 

Picciotto, J., et al., "Extended Labeling Policies for Enhanced Application 
Sunnort " 1994 

MSI087694 

Born, E, et al., "Discretionary Access Control by Means of Usage 
Conditions " 1994 

MSI087717 

Russell, S., "Paradigms for Verification of Authorization at Source of 
Electronic Documents in an Intearated Environment," 1993. 

Lalwwll wl llw L^wwUI 1 Iwl llw II 1 HI 1 II llwyi MlwU L«l 1 » It \S* II I I Wl ■ ■ vww. 

MSI087725 

Olivier, M.S., et al., "Building a Secure Database Using Self-Protecting 
Obiects " 1992. 

MSI087737 

Press, J., "Secure Transfer of Identity and Privilege Attributes in an 
Open Systems Environment," 1991. 

MSI087748 

Fugini, M.G., et al., "Authorization and Access Control in the Office- 
Net System," 1989. 

MSI087765 

Hardjono, Thomas, "Record Encryption in Distributed Databases," 
January 1990. 


Exhibit F Publications 


MSI087776 

Calas, C, "Distributed File System Over a Multilevel Secure Architecture 

Prnhlpm^ and Solutions " 1QQ4 

MS I0878 11 

Russell, S., "Planning for the EDI of Tomorrow Using Electronic 
Hnrumpnt Authorization " 1993 

M^IOR7821 

IVIOIwO r <J£ 1 

Lin P "The EncaDSulated Security Services Interface (ESSI)," 1993. 

IVIOIUOr 009 

Fuaini M et al "Securitv Manaaement in Office Information 
Systems," 1984. 

MCi|nft7fi59 

IVIOlVJOf 00£. 

Montini G et al "Access Control Models and Office Structures." 1984. 

MSI088177 

Multics, Home; viewed on November 12, 2001 at 
^nup.//v\ww.rnuiiiuidn5.org^. 

MSI088186 

Corbato, F.J., et al., "Introduction and Overview of the Multics System," 
1992. 

MSI088297 

Moffett, J., et al., "Specifying Discretionary Access Control Policy for 
Distributed Systems," September 18, 1990. 

MSI088297 

Moffett, J., et al., "Specifying Discretionary Access Control Policy for 
Distributed Systems," September 18, 1990. 

MSI088314 

Moffett, J.D., "Specification of Management Policies and Discretionary 
Access Control," June 28, 1994. 

MSI088342 

Moffett, J.D., "Specification of Management Policies and Discretionary 
Access Control," 1994. 

MSI088363 

Moffett, J.D.,et al., "Policy Hierarchies for Distributed Systems 
ivianagemeni, uecernuer iyyo. 

IVIOIUOOOOO 

Mnffett J D et al "The Reoresentation of Policies as Svstem Objects " 
November 1991. 

IVIOIUOOUVO 

L amDson B W "A Note on the Confinement Problem." 1973. 

MSI088562 

Olivier, M.S., "Secure Object-Oriented Databases," December 1991. 

MSI088773 

Thuraisingham, M.B., "Mandatory Security in Object-Oriented Database 
Svstems " October 1 989 

MSI088781 

Chaum, D., "Security Without Identification: Transaction Systems to 
Make Big Brother Obsolete," October 1985. 

MSI088820 

Lampson, B., "Computer Security," 1991. 


Exhibit F Publications 


MSI088876 

Walker, S., "Notes from RSA Data Security Conference," January 18, 

1QQ4 

MSI088876 

Walker, S., "Notes from RSA Data Security Conference," January 18, 
1994. 

MSI088879 

RSA Security; News; <http://rsasecurity.com/news/pr/9401 .html.>, dated 
January 12, 1994. 

MSI088881 

RSA Security; News; "iPower's Data Security Approach," 
<http://rsasecurity.com/news/pr/940112-10.html.>, dated January 12, 

1QQA 

MSI088884 

RSA Security; News; "General Magic Picks RSA," 

^nup.//rsasecuniy.com/nswb/pr/yM-u i i^-ojiuiii."*, uaicu ucuiuaiy i£, luyn. 

MSI088886 

RSA Security; News; "Enterprise Solutions Announces RSA Mail," 
<http://rsasecurity.com/news/pr/940112-2.html.>, dated January 12, 1994. 

MSI088888 

RSA Security; News; "Hewlett-Packard Chooses RSA," 
<http://rsasecurity.com/news/pr/940112-5.html.>, dated January 12, 1994. 

MSI088890 

RSA Security; News; "Hilgraeve Ships Secure Version of 
HyperACCESS/5," <http://rsasecurity.com/news/pr/9401 12-8.html.>, dated 

km ion/ 10 

January i^, iyy4. 

MSI088892 

RSA Security; News; "RSA Enters Wireless Arena," 

<nup.//rs3secuniy. com/ news/ pr/y^u i iz-o.nimi.^, uaieu January i^, iyyn. 

MSI088896 

Williams, S., "An MSJ Interview with Microsoft's Chief Architect of OLE, 
i ony vviiiiams, uciooer iyyo. 

MSI088903 

Brockschmidt, K., "OLE 2.0 Part II: Implementing a Simple Windows Object 
using tuner u or 0++, L/ciouer iyyo. 

IVIOIU009 IH 

Rrnrk<irhmirit K "Intrnducina OLE 2 0 Part 1" Windows Objects and the 

LJI UvlxOwl II 1 IIUl, II IU UUUwII lU U. I— ^.w, I call i> * * 11 vvjuwm %ai wi iv 

Component Object Model," August 1 993. 

MSI088919 

Brockschmidt, K., "Implementing OLE 2.0, Part III: Uniform Data Transfer 
with Data Objects," December 1993. 

MSI088938 

Townsend, J.E., "NIST on Internet Security," March 22, 1994. 

MSI088953 

Curry, David A., "Improving the Security of Your Unix System," April 1990. 

MSI089068 

Kohl, J., "The Kerberos Network Authentication Services (V5), M September 
1993. 


Exhibit F Publications 


MSI089191 

Bertino, Elisa, "Data Hiding and Security in Object-Oriented Databases," 
1992 

MSI089974 

Kim, W., et al., "Features of the ORION Object-Oriented Database 

1 V 1 0 1 VJ \7 VJ W A. *J 

Kelter, U., et al., "Type Level Access Controls for Distributed Structurally 
Object-Oriented Database Systems," November 1992. 

MSI090055 

Wong, R., et al., "The SIDOS System: A Secure Distributed Operating 
Svstem Prototvne " October 1 989 

MSI090091 

IVIUIwvvvw 1 

OMG Security Working Group, "OMG White Paper on Security," April 1994. 

MSI090181 

National Computer Security Center, "Trusted Unix Working Group 
(TRUSIX) Rationale for Selecting Access Control List Features for the 
UNIX (R) System," August 18, 1989. 

MSI093870 

UNKNOWN 

MSI094278 

UNKNOWN 

MSI094738 

UNKNOWN 

MSI095044 

Tanenbaum, A.S., "Operating Systems: Design and Implementation," 1987. 

MSI095787 

Date, C.J., "An Introduction to Database Systems," 4 th . Ed., Vol. 1, 1987. 

MSI096004 

Tanenbaum, A.S., "Modern Operating Systems," 1992. 

MqMor)fi7n 

IVIOI 1 £.\J\J 1 \J 

UNKNOWN 

MSI1 32777 

E-mail from Caglar Gunyakti entitled: "Private Test Needed," April 28, 

M^I15fi7R8 

IVIOI 1 JUi oo 

Clark Paul C et al "BITS* A Smartcard Protected Ooeratina 
System," November 1994. 

MSI1 56834 

O'Connor, MaryAnn, "New Distribution Option for Electronic 
Publishers," March 1994. 

MSI161724 

Blaze, Matt, "A Crytographic File System for Unix," November 1993. 

MSI161742 

Ferraiolo, D., et al., "Role-Based Access Control," 1992. 

MSI161753 

Hardy, N., "The Keykos Architecture," December 1990. 

MSI161761 

Miller, S.P., et al., "Kerberos Authentication and Authorization System," 
October 27, 1998. 


Exhibit F Publications 



October 27, 1998. 

MSI161797 

IBM, "OpenDoc vs. OLE 2.0: Superior by Design," January 1994. 

MSI161856 

Brickell, E.F., et al., "The SKIPJACK Algorithm," July 28, 1993. 

MSI161886 

Blaze, M., "Key Management in an Encrypting File System," 1994. 

MSI161895 

Woo, Thomas, Y.C., et al., "A Framework for Distributed 
Authorization," November 1993. 

MSI161921 

Davin, J., et al., "SNMP Administrative Model," July 1992. 

MSI161943 

Galvin, J., et al., "SNMP Security Protocols," July 1992. 

MSI161969 

McCloghrie, K., et al., "Definitions of Managed Objects for Administration of 
SNMP Parties," July 1992. 

MSI1 62040 

Case, J., "A Simple Network Management Protocol (SNMP)," May 1990. 

MSI1 62061 

Information Systems Audit and Control Association-Montreal Chaper, 
"Authentification dans les environnements de traitement distributes," 
undated. 

MSI162132 

Meyer, C.H., et al., "Cryptography: A New Dimension in Computer 
Data Security," 1982. 

MSI162160 

Hewlett Packard Co., "Manager's Guide to MPE/iX Security," April 1994. 

MS1 162646 

Hansen, S.E., et al., "Automated System Monitoring and Notification with 
Swatch," November 1993. 

MS1 162654 

Bellovin, S.M., "There Be Dragons," August 15, 1992. 

MSI1 62698 

Bellovin, S.M., "Encrypted Key Exchange: Password-Based Protocols 
Secure Against Dictionary Attacks," May 1992. 

MS1 162729 

Brands, S., "Untraceable Off-line Cash in Wallets with Observers," 1993. 

MSI1 62756 

White, J.E., "Telescript: The Foundation for the Electronic Marketplace," 
November 30, 1993. 

MS1 162788 

White, J.E., "Telescript Technology: An Introduction to the Language," 
1994. 

MS1 162820 

Johnson, R., "Info on Telescript," December 6, 1994. 


Exhibit F Publications 


MSI1 62830 

"An Introduction to Safety and Security in Telescript," undated. 

MSI1 62841 

Gosling, J., "Oak Intermediate Bytecodes," 1995. 

MSI163014 

Kohl, J., et al, "The Kerberos Network Authentication Service," June 30,. 
1991. 

MSI1 63338 

"A Brief History of the Green Project," viewed on March 12, 2002 at 
<http://java.sun.com/people/jag/green/index.html>. 

MSI1 63355 

IBM,"IBM Cryptolope Technology-Executive Summary," viewed on March 
13 2002 at 

<http://www-3jbmxom/software/security/cryptolope. about. html>. 

MSI1 63358 

IBM, "Key Cryptolope Components," viewed on March 13, 2002 at 
<httr>7/www-3 ibm Gom/software/securitv/cn/DtoloDe about html> 

MSI163519 

Stubblebine, S.G., "Security Services for Multimedia Conferencing," 
Spntember 1 993 

MSI1 63935 

NIST & NSA, "Federal Criteria Information Technology Security," Vol. II, 
Vpr^inn 1 0 Dprpmhpr 

MS1 164205 

Rashid, R.F., "CMU Computer Science: A 25 th Anniversary 
Commemorative," 1 991 . 

MSI1 64771 

Multtcs History, visited on October 8, 1991 at 
<http://www.multicians.org/history.html>. 

MSI1 64842 

Half hill, Tom, R., et al., "Just Like Magic?," February 1994. 

MSI168115 

Chaum, D., et al., "Wallet Databases with Observers," 1998. 

MSI168132 

Walker, Bruce, J., et al., "Computer Security and Protection 
Structures," 1977. 

MSI1 68350 

Stallings, W., "Cryptography and Network Security: Principles and 
Practice," 1999. 

MSI1 73839 

Levine, P.H., et al., "Apollo Network License Server," October 1987. 

MS1 173884 

Cabell, D., et al., "Software Protection," May 1985. 

MS1 173887 

Glatzer, H., "The Promise of LANs MIS Back in Control," March 1985. 

MS1 173893 

Cook, S., "Net Results," December 1985. 

MS1 173905 

Kramer, M., "Strength in Numbers," July 22, 1986. 


Exhibit F Publications 


MSI1 75647 

Custer, H., "Inside the Windows NT File System," 1994. 

MS1 175666 

Appendix for Custer, H., "Inside the Windows NT File System," 1994. 

MS1 175722 

Index for Custer, H., "Inside the Windows NT File System," 1994. 

MSI17573 

Solomon, A., "PC Viruses: Detection, Analysis and Cure," November 1991. 

MSI1 75738 

Glossary for Solomon, A., "PC Viruses: Detection, Analysis and Cure," 
November 1991. 

MS1 175740 

Roberts, R., et al., Computers "Computer Security," 1989. 

MSI1 75764 

Bibliography for Shaffer, S.L., et al., "Network Security," 1994. 

MSI1 75788 

Contents for Denning, P.J., "Computers Under Attack; Intruders, Worms & 
Viruses," 1990. 

MSI175818 

Keyword Index for Horster, P., "Communications and Multimedia Security 
II," 1996. 

MS1 175840 

Index for Park, J.S., "AS/400 Security in a Client/Server Environment," 
1995. 

MS1 175869 

Diffie, et al., "Privacy on the Line: The Politics of Wiretapping and 
Encryption," 1998. 

MS1 175904 

Bibliography for Diffie, et al., "Privacy on the Line: The Politics of 
WiretaDDina and EncrvDtion " 1 998 

MSI175912 

Index for Diffie, et al., "Privacy on the Line: The Politics of Wiretapping and 
Encryption," 1998. 

MSI1 75935 

Baker, R.H., "The Computer Security Handbook," 1985. 

MS1 175944 

Hoffman, L.J., "Modern Methods for Computer Security and Privacy," 1977. 

MS1 176004 

Krol, E., "The Whole Internet User's Guide and Catalog," 2 nd . Ed., 1992. 

MSI1 76033 

Glossary for Krol, E., "The Whole Internet User's Guide and Catalog," 2 nd . 
Ed., 1992. 

MSI176183 

Holsinger, E., "How Music and Computers Work," 1994. 

MSI192494 

Bell-Labs Secure Technologies, "Information Vending Encryption 
System (IVES)™," May 31, 2002. 

MSI1 92652 

Rubin, A.D., "Trusted Distribution of Software Over the Internet," 1995. 


Exhibit F Publications 


MSI1 92773 

Kohl, J.T., et aL f "The Evolution of the Kerberos Authentication Service," 
undated. 

MS1 197506 

CardTech/SecurTech 94 Conference Proceedings, "Building Foundations 
for Innovation " Aoril 1994 

MS1 198537 

Smart Card 1993 Conference Proceedings, "Day 1: Communications and 
Marketina Svstpms & Market Overview " 1993 

IVIul l\ w 11 1 |U WVwlCI 1 Iw w* IVICil i\ w I / V w 1 VIWVV, 1 www. 

MS1 198579 

Chaum, D., "Smart Card 2000," 1991. 

MSI1 98691 

Global Projects Group, "Smart Card Technology International: The Global 
Journal of Advanced Card Technology," undated. 

MSI1 99341 

Vittal, J., "Active Message Processing: Messages as Messengers," 1980. 

MSI1 99404 

Chaum, D., "Achieving Electronic Privacy," August 1992. 

MSI199417 

Chaum, D., "Untraceable Electronic Cash," Extended. Abstract, 1988. 

MS1 199425 

Schaumuller-Bichl, S„ "IC-Cards in High-Security Applications," undated. 

MS1 199480 

Medvinsky, G. t et al., "NetCash: A Design for Practical Electronic Currency 
nn thp Intprnpf " 

MS1 199485 

IVIWI 1 \J \J^\J\J 

Dukach S "SNPP* A SimDle Network Pavment Protocol " December 

Wl 1 X M \J 1 1 j * j 1^1 1 • / » 1 1 f 1 1 \J 1 ™ 1 l\ 1 Till V Mil 1 \f L V^V^ 1 j \* V^V^ III \+ 1 

1992. 

MSI1 99525 

Gifford D et al "The Cirrus Bankina Network " Auaust 1985 

III VI \A | ■ , wk \A 1 . , II 1 W V^ll 1 \A W k^bt 1 1 1 \ 1 1 1 1 » W i»» V** 1 IX, # luU U W I 1 WWW ■ 

MS1 199536 

National Semiconductor "iPower Technology," undated. 

MSI1 99550 

Abadi, M., et al., "Authentication and Delegation with Smart-Cards," 

Ortnhpr 99 1QQ0 rpvi^pd Jnlv *3f) 1QQP 

wwlUUCI fit , 1 w\7V/, 1 wVIOCU UUiy JU, 1 ww£.. 

MS1 199576 

1 V 1 S*J 1 1 \J\J\J 1 \J 

Carnegie Mellon University, "Internet Billing Server," Prototype Scope 
Document, INI Tech Report, October 14, 1993. 

MSI199605 

Krajewski, Jr., M., et al., Concept for a Smart Card Kerberos," 1992. 

MSI199612 

Krajewski, Jr., M., "Smart Card Augmentation of Kerberos," February 1993. 

MSI199618 

Krahewsjum Jr., M., "Applicability of Smart Cards to Network User 
Authentication," 1994. 

MS1 199633 

Harty, K., et al., "Case Study: The VISA Transaction Processing System," 
undated. 


Exhibit F Publications 


MS1 199645 

International Standard, "Bank Card Originated Messages: Interchange 

Mpecarip RnpHfiration Clnntpnt fnr FinanHal Transactions " Anniist 1 ^ 
iviwooci^c o^GwiiiwOUi/i I uui I ici ii iwi i ii icu iwigi i i cii iogwiiui io, nuyuoi 

1987. 

ivioi i yyoo i 

rxlvcbl, rv, I fie IVIL/u ivitJooayc-LJiy col AMyui in ii 1 1, r\piii 

Moiiyy ( uu 

\/r\\fr\r\r i \f \/ 1 at ol "Caw iriK/ IVyiaf*nQnicmc in 1— linh_l o\/ol MotxA/nrlf 

voyuuoi\ f v.L., ci di. t osuuriiy iviccridriibiiib in niyn-Lcvci iNeiwuift 
Protocols," June 1983. 

MOM QQ7QC 

iNeeunam, rvivi., Muing oapauiiiiy Mucebb lu ouiivtjnuuiidi rue oc?r verb, 
January 1979. 

ItAGH QQ70Q 

oiigor, v.u., si ai., wpjeci Migration anu Muinoruicdiiun, iNUVcinuer iyf y. 

MSI1 99743 

Chaum, D.L., et al., "Implementing Capability-Based Protection Using 
Encryption, July 17, 1978. 

r jiom nn7cc 

Mbnyy/oo 

oiTToro, u.tv, oryptograpmc oeaimg ror miormation oecrecy ana 
Authentication," April 1982. 

ityioionvmcc 
MolzU4ybD 

jonnson, n.L., ei ai., a oecure uisiriDUieu L/apauiiiiy oaseu oysiem, 
1985. 

MSI204983 

Tanenbaum, A.S., et al., "Distributed Operating Systems," December 1985. 

MIOIOACf>0 <1 

MolAJoUol 

voyaocK, v.L., ei ai., oecumy iviecnanisrns in nign-Levei iNeiworK 
Protocols," June 1983. 

MSI205118 

Rushby, J.M., "Design and Verification of Secure Systems," 1981. 

MSI205137 

Clark, P.C., et al., "BITS: A Smartcard Protected Operating System," 
November 1994 

MSI205190 

Brumm, P., et al., "80386/80486 Assembly Language Programming," 1993. 

MSI205529 

Hutt, A.E., et al., "Computer Security Handbook," 1988. 

Mol^UDo4o 

Drown, o.vv., o6uuniy iur iviiniouiiipuicio diiu iviiuiuuuui|juu?ib, ^unudmuj. 


I 116 rxlolNo Uiyool, PUlUlll Uil r\ibr\o IU lllc r UUllo IN v^UIMfJUlclo dllU r\cldlcU 

Systems," Vol. 15; Issue 39, January 21 , 1994 

MSI205633 

The Risks Digest, "Forum on Risks to the Public in Computers and Related 
Systems," Vol. 15; Issue 47, February 9, 1994. 

MSI205648 

Halfhill, T.R., et al., "Agents on the Loose," February 1994. 

MSI205650 

Wayner, P., "Agents Away," May 1994. 


Exhibit F Publications 


MSI205659 

Hawk, H.S., "RSA & General Magic," email to Good Guys, January 6, 
1994. 

MSI205660 

Byte.com, "Speaking the Same Language," May 1994. 

MSI205749 

Atkins, D., et al., "The Magic Words are Squeamish Ossifrage," (undated). 


Schill A et al "Mobility Aware Multimedia X 400 e-mail: A SamDle 
Application Based on a Support Platform for Distributed Mobile 
Computing," undated. 

MSI205981 

National Institute of Standards and Technology, "History of Computer 
Security: Early Computer Security Papers, Part 1," 1998. 

MSI206028 

Department of Defense Standard, "Department of Defense Trusted 
Computer System Evaluation Criteria," December 1985. 

MSI206144 

Department of Defense Computer Security Center, "Department of 
npfpn^p Password Manaapment Guideline " ADril 12 1985 

MSI206178 

"Guidance for Applying the Department of Defense Trusted Computer 
System Evaluation Criteria in Specific Environments," 
http://www.radium.ncsc.mil/tpep/library/rainbow/CSC-STD-004-85.html, 
June 25 1985 

MSI206672 

Forcht, KA, "Computer Security Management," 1994. 

MSI206764 

Olivier, M.S., et al., "DISCO: A Discretionary Security Model for Object- 
Oriented Databases " 1992 

MSI206777 

Olivier, M.S., "A Multilevel Secure Federated Database," 1994. 

MSI206951 

"iOpener," Registered Trademark of National Semiconductor Corporation, . 
Registration date October 4, 1994. 

MSI206952 

U.S. Patent and Trademark Coversheet for National Semiconductor 
Corporation "iOpener" Trademark, Registration date October 4, 1994. 

MSI206982 

UNKNOWN 

MSI207089 

Leary, P., "Are There Ciphers in Shakespeare?," 1995. 

MSI207745 

Toohey, J., "Using OLE 2.X in Application Development," 1994 

MSI207781 

Holzner, S., "Heavy Metal OLE 2.0 Programming," 1994. 

MSI207820 

Sheridan Software Systems, "Data Widgets 2.0: OLE Controls for 
Database Application Development," 1993-1995. 



Exhibit F Publications 


MSI207847 

van Gilluwe, F., "The Undocumented PC: A Programmer's Guide to I/O, 
Cpus, and Fixed Memory Areas," 1994. 

MSI207873 

Short, K.L., "Microprocessors and Programmed Logic," 1981. 

MSI207998 

Table of Contents: Motorola MC68030 User's Manual, undated. 

MSI208023 

Mullender, S., "Distributed Systems," 1989. 

MSI208222 

Orfali, R., et al., "The Essential Distributed Objects Survival Guide," 1996. 

MSI208280 

Lockhart, Jr., H.W., "OSF DCE Guide to Developing Distributed 
Applications," 1994. 

MSI208321 

Open Software Foundation, "OSF DCE Administration Guide-Core 
Components," 1993. 

MSI208364 

Rosenberry, W., et al., "Distributing Applications Across DCE and Windows 
NT," 1993. 

MSI208434 

Shirley, J., "Guide to Writing DCE Applications," 1 st Ed. 1992. 

MSI208465 

Shirley, J., et al., "Guide to Writing DCE Applications," 2 na Ed. 1994. 

MSI208843 

Honeyman, P., "Digest of the First UNSENIX Workshop on Electronic 
Commerce (EC 95)," July 1995. 

MSI209487 

Rubin, A.D., "Trusted Distribution of Software Over the Internet," 1995. 

MSI209496 

Tanenbaum, A.S., et al., "Experiences with the Amoeba Distributed 
Operating System," 1990. 

MSI209525 

Tanenbaum, A.S., et al., "The Amoeba Distributed Operating System-A 
Status Report," 1991. 

MSI209547 

Tanenbaum, A.S., et al., "The Amoeba Distributed Operating System," 
1990. 

MSI209692 

Kim, G.H., et al., "The Design and Implementation of Tripwire: A File 
System Integrity Checker," November 19, 1993. 

MSI209713 

Farmer, D., "The COPS Security Checker System," July 10, 1992. 

MSI209854 

Kohl, J.T., et al., "The Evolution of the Kerberos Authentication System," 
1991. 

MSI209981 

Lewontin, S., et al., "The DCE Web Project: Providing Authorization and 
Other Distributed Services to the World Wide Web," February 22, 2002. 



Exhibit F Publications 


MSI210379 

Mann, C.C., "Homeland Insecurity," September 2002. 

MSI210403 

Boone, J.V.,et al., "The Start of Digital Revolution: SIGSALY Secure Digital 
Voice Communications in World War II," December 10, 2002. 

MSI210421 

Weadon, P.D., "The SIGSALY Story," December 10, 2002. 

MSI210447 

"iOpener," Registered Trademark of National Semiconductor Corporation, 
Registration date October 4, 1994. 

MSI210496 

Schill, A.B., et al., "DC++: Distributed Object-Oriented System Support on 
topofOSF DCE," 1993. 

MSI210517 

Schill, A.B., et al., "DCE-The OSF Distributed Computing Environment 
Client Server Model and Beyond," October 1993. 

MSI210522 

Rosenberry, W., et al., "Understanding DCE," 1992. 

MSI210838 

Karger, P.A., et al., "A VMM Security Kernel for the VAX Architecture," 
1990. 

MSI210856 

Landwehr, C.E, et al., "A Taxonomy of Computer Program Security Flaws," 
September 1994. 

MSI210900 

Landwehr, C.E., "Formal Models for Computer Security," September 1981. 

MSI210941 

Young, W.D., "Verifiable Computer Security and Hardware: Issues," 
September 1991. 

MSI210984 

Cybenko, G, et al., "Cognitive Hacking: A Battle for the Mind," 2002. 

MSI211023 

National Security Agency, "Security Enhanced LINUX," December 10, 
2002. 

MSI211026 

National Security Agency, "Korean War Commemoration," December 10, 
2002. 

MSI211071 

National Security Agency, "Guide to the Secure Configuration and 
Administration of Microsoft Exchange 5.x® 1 " June 20, 2002. 

MSI211133 

National Security Agency, "Microsoft Office 97 Executable Content Security 
Risks and Countermeasures," December 20, 1999. 

MSI211180 

Bartock, P.F., et al., "Guide to Securing Microsoft Windows NT Networks," 
September 18, 2001. 

MSI211325 

Bickel, R., et al., "Guide to Securing Microsoft Windows XP," October 30, 
2002. 


• 


Exhibit F Publications 


MSI211504 

National Security Agency, "SIGSALY Secure Digital Voice 
Communications in World War II," December 10, 2002. 

MSI211515 

Distributed Computing Environment, "DCE Technology at Work," 
December 13, 2002. 

MSI211582 

Kent, S., "Part II: Certificate-Based Key Management," February 1993. 

MSI213017 

Saydjari, O.S., et al., "LOCK Trek: Navigating Unchartered Space," 1989. 

MSI213026 

Saydjari, O.S., et al., "LOCK Trek: Navigating Unchartered Space," 1989. 

MSI213042 

Karger, P.A., et al., "Multics Security Evaluation: Vulnerability Analysis," 
June 1974i 

MSI213076 

Aucsmith, D., et al., "Common Data Security Architecture," January 22, 
1996. 

MSI213088 

Jaeger, T, et al., "Support for the File System Security Requirements of 
Computational E-Mail Systems," November 1994. 

MSI213206 

Tirkel, A.Z. et al., "Electronic Water Mark," (undated). 

MSI213211 

van Schyndel, R.G., et al., "A Digital Watermark," (undated). 

MSI213214 

Kurak, C, et al., "A Cautionary Note On Image Downgrading," 1992.