Bàsica

Módul 1: Identificació, autenticació i control d'accés

Bell, D.E., y LaPadula, L.J. (1973) MITRE Documento Técnico 2547, Volumen 1, Secure Computer Systems: Mathematical Foundations. (Versión digital actualizada por Len LaPadula en 1996: http://www.albany.edu/acc/courses/ia/classics/belllapadula1.pdf)

Departamento de Defensa de los EEUU. (1985) Trusted Computer System Evaluation Criteria. DoD Standard 5200.28-STD.

Gollmann, D. (2005) Computer Security (2nd edition). Wiley.

Harrison, M.A., Ruzzo, W.L., y Ullman, J.D., (1976) Protection in Operating Systems. Communications of the ACM. 19(8) 461-471.

Herrera Joancomartí, J. (2006) Aspectos avanzados de seguridad en redes. Editorial UOC.

Holderness, H., Davies, G., Chamberlain, A., y Donahue, R., (2006) A Conservation Audit of Archaeological Cave Resources in the Peak District and Yorkshire Dales. Documento Técnico. CAPRA. URL: http://capra.group.shef.ac.uk/7/743Research.pdf.

ISO. (2009) Common Criteria for Information Technology Security Evaluation(ISO-IEC-15408). URL:http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf

Samarati, P., y De Capitani di Vimercati, S., (2001) Access Control: Policies, Models, and Mechanisms. FOSAD. Lecture Notes in Computer Science , Volumen 2171/2001, 137-196.

Stallings, W. (2008) Computer security: principles and practice. Pearson/Prentice Hall.

Windley, P. (2005) Digital Identity. O'Reilly.

Módul 3: Seveis de directori

Desmond, R. et al. (2008) Active Directory: Designing, Deploying and Running Active Directory. O'Reilly.

Raya, J. L. et al.  (2008) Aprenda Microsoft Windows Server 2008. Ra-Ma.

Howes, T. A. et al. (2003) Understanding and Deploying LDAP Directory Services (2nd Edition). Addison-Wesley.

Módul 4: Single sign-on i federació d'identitats

Harris, S.  (2008) All in one CISSP Exam Guide. New York : McGraw Hill.

Stoneburner, G. (2011) Underlining Technical Models for Information Technology Security, Recommendations of the National Institute of Standards and Techonology. [Online] [Citat: 19/06/2011.] http://csrc.nist.gov/publications/nistpubs/800-33/sp800-33.pdf.

Windley, P. J. (2005) Digital Identity. s.l. : O'Reilly Media, Inc., 2005. 978-0-596-00878-9.

MIT (2011). MIT Kerberos Papers and Documentation web page. [Online] [Citat el: 19/06/2011.] http://mit.edu/afs/.

Keuleuven Univ. (2011) SESAME in a Nutshell. [Online] [Citat el: 19/06/2011.] http://www.cosic.esat.kuleuven.be/sesame/html/sesame_what.html.

(ISC)2. (2007). Official (ISC)2 Guide to the CISSP CBK. New York: Auerbach Publications.

Liberty Alliance. (2011). Liberty Alliance Project.[Online] [Citat el: 107/07/2011.] http://projectliberty.org/liberty/content/download/3063/20504/file/liberty-cross-framework-v1.1.pdf

RFC 2865. IETF. (2011) [Online] [Citat el: 22/07/2011] http://www.faqs.org/rfcs/rfc2865.html.

RFC Charter. (2006) IETF. [En línea] [Citado el: 22 de 07 de 2011.] http://www.ietf.org/html.charters/HISTORY/aaa-charter.2006-08-01.15.html.

EduRoam. (2011) EduRoam. [Online] [Citat el: 22/07/2011] http://www.eduroam.es.

Melgar, D., Hondo, M. y Nadalin, A. (2002) Web Services Security: Moving up the stack. IBM DeveloperWorks. [Online] [Citat el: 22/07/2011] http://www.ibm.com/developerworks/library/ws-secroad/.

OASIS (2011) OASIS. Advanced Open Standards for Information Society. [Online] [Citat el: 22/07/2011] http://www.oasis-open.org.

Internet 2 (2011) Internet 2. [Online] [Citat el: 22/07/2011.] http://www.internet2.edu.

Shibboleth (2011) [Online] [Citat el: 22/07/2011] http://shibboleth.internet2.edu.

Open PERMIS Project. (2011) Open PERMIS Project.  [Online] [Citat el: 22/07/2011] http://www.openpermis.org/.

Projecte HERAS. (2011) Projecte HERAS. [Online] [Citat el: 22/07/2011] http://www.herasaf.org/ .

Backhouse, J. (2006) Interoperability of identity and identity management systems. Data Protection and Data Security.

Blackhouse, J. i Halperin, R. (2009) Approaching interoperability for identity management systems. Capítol del llibre The Future of Identity in the Information Society, pp. 245-268, DOI: 10.1007/978-3-642-01820-6_6

Satchell, C; Shanks, G.; Howard, S.; i Murphy, J. (2006) Knowing Me Knowing You - User Perceptions of Federated Digital Identity Management Systems. In Proceedings of the 14th European Conference on Information System, Göteborg, Sweden.

Baldwin, A.; Casassa Mont, M. i Shiu, S. (2007) On Identity Assurance in the Presence of Federated Identity Management Systems. HP Labs, Filton Road, Bristol, BS34 8QZ, UK.

Mòdul 5: Privadesa

Coutu, D.; Palfrey, Jr., J. G.; Joerres, J. A.; Boyd, D. M. and Fertik, M. (2007) We Googled You. Harvard Business Review, 00178012, Jun 2007, Vol. 85, Issue 6.

"How Unique Is Your Browser?", Peter Eckersley, Proceedings of the Privacy Enhancing Technologies Symposium (PETS 2010), 2010.

"On the leakage of personally identifiable information via online social networks", B. Krishnamurthy, C. E. Wills, ACM SIGCOMM Computer Communication Review, vol. 40, no. 1, pp. 112-117, 2010.

"Annual State of the Net Survey ", Consumer Reports National Research Center, Consumer Reports, vol. 75, no. 6, 2010.

"The Semantic Web - A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities", T. Berners-Lee, J. Hendler, O. Lassila, Scientific American, vol. 284, no. 5, pp. 34-43, 2001.

"Tag-based information retrieval of video content", M. Melenhorst, M. Grootveld, M. van Setten, M. Veenstra, Proceeding of the 1st international conference on Designing interactive user experiences for TV and video, 2008.

"Automatic tag generation for photos using contextual information and description logics", J. Soderberg, E. Kakogianni, 2010 International workshop on content-based multimedia indexing, pp. 1-7, 2010.

 "The dynamics of viral marketing", J. Leskovec, L. A. Adamic, B. A. Huberman, Proceedings of the 7th ACM Conference on Electronic Commerce, 2006.

"Predicting the Future with Social Media", S. Asur, B. A. Huberman, Proceedings of the 2010 International Conference on Web Intelligence and Intelligent Agent Technology, pp. 492-499, 2010.

"Privacy & Human Rights 2003 - An international survey of privacy laws and developments", C. Laurant,  Electronic Privacy Information Center, 2003.

"Preserving user's privacy in web search engines", J. Castellà-Roca, A. Viejo, J. Herrera-Joancomartí, Computer Communications, vol. 32, no.13-14, pp. 1541-1551, 2009

Complementària