Limit search to available items
Book Cover
E-book

Title Computer security in the 21st century / edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Published New York : Springer, ©2005

Copies

Description 1 online resource (xi, 268 pages) : illustrations
Contents Cover -- Table of Contents -- List of Figures -- Chapter 1 Introduction -- Part I Security Protocol Design -- Chapter 2 Challenges in Protocol Design and Analysis -- 1. Introduction -- 2. Purpose of Analysis -- 3. The Environment -- 4. Case Studies -- 5. Conclusions and Challenges -- References -- Chapter 3 Private Matching -- 1. Introduction -- 2. Problem Statement -- 3. Threat Models -- 4. Terminology and Assumptions -- 5. Techniques -- 6. Data Ownership Certificate (DOC) -- 7. Security Analysis -- 8. Cost Analysis -- 9. Related Work -- 10. Future Work -- References -- Chapter 4 Authentication Protocol Analysis -- I. Introduction -- 2. Modeling Computational Operations -- 3. Diffie-Hellman and Group Protocols -- 4. Deeper Models of Encryption -- 5. Decidable Formal Methods -- 6. Future Directions -- References -- Chapter 5 Self-certified Approach for Authenticated Key Agreement -- 1. Introduction -- 2. Proposed 2-PAKA Protocol -- 3. Proposed n-PAKA Protocol -- 4. Security Analysis -- 5. Conclusion -- References -- Part II P2P and Ad Hoc Networks -- Chapter 6 Experimenting with Admission Control in P2P Networks -- 1. Introduction -- 2. Background -- 3. Bouncer: Admission Control Toolkit -- 4. Integration with Peer Group Systems -- 5. Experiments -- 6. Discussion -- 7. Future Directions -- References -- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- 1. Introduction -- 2. Adaptive Random Pre-distribution Scheme -- 3. Uniquely Assigned One-way Hash Function Scheme -- 4. Evaluation -- 5. Conclusion -- References -- Part III Intrusion Detection, Defense, Measurement -- Chapter 8 Measuring Relative Attack Surfaces -- 1. Introduction -- 2. Terminology and Model -- 3. Dimensions of an Attack Surface -- 4. Security Bulletins -- 5. Analyzing Attack Surfaces -- 6. An Example Attack Surface Metric -- 7. Discussion of the RASQ Approach -- 8. Related Work -- 9. Future Work -- References -- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability -- 1. Introduction -- 2. Traditional IDS model -- 3. A New model based on Identification (IDSIC) -- 4. Conclusion -- References -- Chapter 10 A Source-End Defense System against DDoS Attacks -- 1. Introduction -- 2. Review of D-WARD -- 3. Proposed System -- 4. Performance Evaluation -- 5. Conclusion and Future Work -- References -- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults -- 1. Introduction -- 2. The Detection of Control State Corruption -- 3. The BEAGLE System Design and Implementation -- 4. Experiments and Assessment -- 5. Related Work -- 6. Conclusions -- References -- Part IV Multimedia Security -- Chapter 12 Web Application Security-Past, Present, and Futu -- 1. Introduction -- 2. Common Web Application Vulnerabilities -- 3. Current Countermeasures -- 4. Concluding Remarks and Future Work -- References -- Chapter 13 Securing JPEG2000 Code-Streams
Summary Computer security has opened a variety of new frontiers in the new millennium. This book explores the spectrum of newly merging areas in security, in topics ranging over privacy, intellectual property protection, communications, operating system design, programming languages and security, and mobile security. It includes contributions from an international collection of both experienced and young researchers in computer security. The book will be useful to computer network security professionals and researchers
Bibliography Includes bibliographical references and index
Notes English
Print version record
In Springer e-books
Subject Computer security
Computer Security
Data encryption (Computer science)
Data structures (Computer science)
Telecommunication.
Computer science.
Communications Engineering, Networks.
Computer Communication Networks.
Data Encryption.
Data structures.
Data Structures, Cryptology and Information Theory.
Informatique.
Computer security
Form Electronic book
Author Lee, D. T
Shieh, S. P., 1960-
Tygar, J. D
LC no. 2005042554
ISBN 0387240055
9780387240053
0387240063
9780387240060
1280234075
9781280234071
6610234078
9786610234073
1441936793
9781441936790
Other Titles Computer security in the twenty-first century