This volume presents papers from a DIMACS workshop on network threats. The workshop brought together computer scientists (theorists and practitioners) working in this area to discuss topics such as network security, prevention and detection of security attacks, modeling threats, risk management, threats to individual privacy, and methods of security analysis. The book demonstrates the wide and diverse range of topics involved in electronic interactions and transactions-including the less desirable aspects: security breaches. The volume offers a timely assessment of avoiding or minimizing network threats. Presented here is an interdisciplinary, system-oriented approach that encompasses security requirements, specifications, protocols, and algorithms.The text includes implementation and development strategies using real-world applications that are reliable, fault-tolerant, and performance oriented. The book would be suitable for a graduate seminar on computer security. It features: discussion of Internet, Web and Java security; information on new attacks and weaknesses; and formal and informal analysis methods to identify, quantify, and combat security threats.
Reihe
Sprache
Verlagsort
Zielgruppe
Gewicht
ISBN-13
978-0-8218-0832-0 (9780821808320)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
A representation of protocol attacks for risk assessment by C. Meadows Verifying privacy enhanced mail functions with higher order logic by D. Zhou and S.-K. Chin Cryptanalysis of RSA-type cryptosystems: A visit by M. Joye and J.-J. Quisquater Information leakage in encrypted key exchange by S. Patel Observed weaknesses in security dynamics' client/server protocol by A. Shostack Web security: A high level view by D. Dean Flexible, extensible Java security using digital signatures by D. S. Wallach, J. A. Roskind, and E. W. Felten Trust and security: A new look at the Byzantine generals problem by M. Burmester, Y. Desmedt, and G. Kabatianski Channels: Avoiding unwanted electronic mail by R. J. Hall Demonstration of hacker techniques by C. Cullen.