Computer Security in the 21st Century (eBook)
XII, 268 Seiten
Springer US (Verlag)
978-0-387-24006-0 (ISBN)
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of :
- Fundamental new security
- Cryptographic protocols and design,
- A new way of measuring network vulnerability: attack surfaces,
- Network vulnerability and building impenetrable systems,
- Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Computer Security in the 21st Century
Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include presentations of:
* Fundamental new security
* Cryptographic protocols and design,
* A new way of measuring network vulnerability: attack surfaces,
* Network vulnerability and building impenetrable systems,
* Multimedia content protection including a new standard for photographic images, JPEG2000.
Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
ABOUT THE AUTHORS
D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.
S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.
J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department's Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.Highlights include presentations of :- Fundamental new security- Cryptographic protocols and design,- A new way of measuring network vulnerability: attack surfaces,- Network vulnerability and building impenetrable systems, - Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Computer Security in the 21st Century Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of: * Fundamental new security * Cryptographic protocols and design, * A new way of measuring network vulnerability: attack surfaces, * Network vulnerability and building impenetrable systems, * Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns. ABOUT THE AUTHORS D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security. S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems. J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.
Contents 5
List of Figures 9
INTRODUCTION 12
SECURITY PROTOCOL DESIGN 15
CHALLENGES IN PROTOCOL DESIGN AND ANALYSIS 16
AUTHENTICATION PROTOCOL ANALYSIS 60
SELF-CERTIFIED APPROACH FOR AUTHENTICATED AGREEMENT 70
ADAPTIVE RANDOM 97
DISTRIBUTION SCHEMES 97
FOR WIRELESS SENSOR NETWORKS 97
INTRUSION DETECTION, DEFENSE, MEASURE- MENT 112
MEASURING RELATIVE ATTACK SURFACES 113
A MODELING OF'INTRUSION DETECTION SYSTEMS WITH IDENTIFICATION CAPABILITY 142
A SOURCE-END DEFENSE SYSTEM AGAINST DDOS ATTACKS 149
BEAGLE: TRACKING SYSTEM FAILURES FOR REPRODUCING SECURITY FAULTS 171
WEB APPLICATION SECURITY-PAST, PRESENT, AND FUTURE 184
SECURING JPEG2000 CODE-STREAMS 229
A SECRET INFORMATION HIDING SCHEME BASED ON SWITCHING TREE CODING 254
Index 263
Erscheint lt. Verlag | 5.12.2005 |
---|---|
Zusatzinfo | XII, 268 p. 77 illus. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Naturwissenschaften | |
Technik ► Nachrichtentechnik | |
Schlagworte | attack surfaces • Code • Coding • cryptographic protocols • cryptography • database matching • data structures • denial of service • Distributed denial of service • Information • jpeg2000 • Multimedia • multimedia security • privacy • sensor network • Viruses |
ISBN-10 | 0-387-24006-3 / 0387240063 |
ISBN-13 | 978-0-387-24006-0 / 9780387240060 |
Haben Sie eine Frage zum Produkt? |
Größe: 13,8 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich