The Resource Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Resource Information
The item Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- Computer security has opened a variety of new frontiers in the new millennium. This book explores the spectrum of newly merging areas in security, in topics ranging over privacy, intellectual property protection, communications, operating system design, programming languages and security, and mobile security. It includes contributions from an international collection of both experienced and young researchers in computer security. The book will be useful to computer network security professionals and researchers
- Language
- eng
- Extent
- 1 online resource (xi, 268 pages)
- Contents
-
- Cover
- Table of Contents
- List of Figures
- Chapter 1 Introduction
- Part I Security Protocol Design
- Chapter 2 Challenges in Protocol Design and Analysis
- 1. Introduction
- 2. Purpose of Analysis
- 3. The Environment
- 4. Case Studies
- 5. Conclusions and Challenges
- References
- Chapter 3 Private Matching
- 1. Introduction
- 2. Problem Statement
- 3. Threat Models
- 4. Terminology and Assumptions
- 5. Techniques
- 6. Data Ownership Certificate (DOC)
- 7. Security Analysis
- 8. Cost Analysis
- 9. Related Work
- 10. Future Work
- References
- Chapter 4 Authentication Protocol Analysis
- I. Introduction
- 2. Modeling Computational Operations
- 3. Diffie-Hellman and Group Protocols
- 4. Deeper Models of Encryption
- 5. Decidable Formal Methods
- 6. Future Directions
- References
- Chapter 5 Self-certified Approach for Authenticated Key Agreement
- 1. Introduction
- 2. Proposed 2-PAKA Protocol
- 3. Proposed n-PAKA Protocol
- 4. Security Analysis
- 5. Conclusion
- References
- Part II P2P and Ad Hoc Networks
- Chapter 6 Experimenting with Admission Control in P2P Networks
- 1. Introduction
- 2. Background
- 3. Bouncer: Admission Control Toolkit
- 4. Integration with Peer Group Systems
- 5. Experiments
- 6. Discussion
- 7. Future Directions
- References
- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks
- 1. Introduction
- 2. Adaptive Random Pre-distribution Scheme
- 3. Uniquely Assigned One-way Hash Function Scheme
- 4. Evaluation
- 5. Conclusion
- References
- Part III Intrusion Detection, Defense, Measurement
- Chapter 8 Measuring Relative Attack Surfaces
- 1. Introduction
- 2. Terminology and Model
- 3. Dimensions of an Attack Surface
- 4. Security Bulletins
- 5. Analyzing Attack Surfaces
- 6. An Example Attack Surface Metric
- 7. Discussion of the RASQ Approach
- 8. Related Work
- 9. Future Work
- References
- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability
- 1. Introduction
- 2. Traditional IDS model
- 3. A New model based on Identification (IDSIC)
- 4. Conclusion
- References
- Chapter 10 A Source-End Defense System against DDoS Attacks
- 1. Introduction
- 2. Review of D-WARD
- 3. Proposed System
- 4. Performance Evaluation
- 5. Conclusion and Future Work
- References
- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults
- 1. Introduction
- 2. The Detection of Control State Corruption
- 3. The BEAGLE System Design and Implementation
- 4. Experiments and Assessment
- 5. Related Work
- 6. Conclusions
- References
- Part IV Multimedia Security
- Chapter 12 Web Application Security-Past, Present, and Futu
- 1. Introduction
- 2. Common Web Application Vulnerabilities
- 3. Current Countermeasures
- 4. Concluding Remarks and Future Work
- References
- Chapter 13 Securing JPEG2000 Code-Streams
- Isbn
- 9781280234071
- Label
- Computer security in the 21st century
- Title
- Computer security in the 21st century
- Statement of responsibility
- edited by D.T. Lee, S.P. Shieh, J.D. Tygar
- Title variation
- Computer security in the twenty-first century
- Subject
-
- Communications Engineering, Networks
- Computer Communication Networks
- Computer science
- Computer security
- Computer security
- Data Encryption
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data structures
- Data structures (Computer science)
- Informatique
- Telecommunication
- Language
- eng
- Summary
- Computer security has opened a variety of new frontiers in the new millennium. This book explores the spectrum of newly merging areas in security, in topics ranging over privacy, intellectual property protection, communications, operating system design, programming languages and security, and mobile security. It includes contributions from an international collection of both experienced and young researchers in computer security. The book will be useful to computer network security professionals and researchers
- Cataloging source
- COO
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- Language note
- English
- LC call number
- QA76.9.A25
- LC item number
- C648 2005
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1960-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Lee, Der-Tsai
- Shieh, S. P.
- Tygar, J. D
- http://library.link/vocab/subjectName
-
- Computer security
- Data encryption (Computer science)
- Data structures (Computer science)
- Telecommunication
- Computer science
- Communications Engineering, Networks
- Computer Communication Networks
- Data Encryption
- Data structures
- Data Structures, Cryptology and Information Theory
- Informatique
- Computer security
- Label
- Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cover -- Table of Contents -- List of Figures -- Chapter 1 Introduction -- Part I Security Protocol Design -- Chapter 2 Challenges in Protocol Design and Analysis -- 1. Introduction -- 2. Purpose of Analysis -- 3. The Environment -- 4. Case Studies -- 5. Conclusions and Challenges -- References -- Chapter 3 Private Matching -- 1. Introduction -- 2. Problem Statement -- 3. Threat Models -- 4. Terminology and Assumptions -- 5. Techniques -- 6. Data Ownership Certificate (DOC) -- 7. Security Analysis -- 8. Cost Analysis -- 9. Related Work -- 10. Future Work -- References -- Chapter 4 Authentication Protocol Analysis -- I. Introduction -- 2. Modeling Computational Operations -- 3. Diffie-Hellman and Group Protocols -- 4. Deeper Models of Encryption -- 5. Decidable Formal Methods -- 6. Future Directions -- References -- Chapter 5 Self-certified Approach for Authenticated Key Agreement -- 1. Introduction -- 2. Proposed 2-PAKA Protocol -- 3. Proposed n-PAKA Protocol -- 4. Security Analysis -- 5. Conclusion -- References -- Part II P2P and Ad Hoc Networks -- Chapter 6 Experimenting with Admission Control in P2P Networks -- 1. Introduction -- 2. Background -- 3. Bouncer: Admission Control Toolkit -- 4. Integration with Peer Group Systems -- 5. Experiments -- 6. Discussion -- 7. Future Directions -- References -- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- 1. Introduction -- 2. Adaptive Random Pre-distribution Scheme -- 3. Uniquely Assigned One-way Hash Function Scheme -- 4. Evaluation -- 5. Conclusion -- References -- Part III Intrusion Detection, Defense, Measurement -- Chapter 8 Measuring Relative Attack Surfaces -- 1. Introduction -- 2. Terminology and Model -- 3. Dimensions of an Attack Surface -- 4. Security Bulletins -- 5. Analyzing Attack Surfaces -- 6. An Example Attack Surface Metric -- 7. Discussion of the RASQ Approach -- 8. Related Work -- 9. Future Work -- References -- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability -- 1. Introduction -- 2. Traditional IDS model -- 3. A New model based on Identification (IDSIC) -- 4. Conclusion -- References -- Chapter 10 A Source-End Defense System against DDoS Attacks -- 1. Introduction -- 2. Review of D-WARD -- 3. Proposed System -- 4. Performance Evaluation -- 5. Conclusion and Future Work -- References -- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults -- 1. Introduction -- 2. The Detection of Control State Corruption -- 3. The BEAGLE System Design and Implementation -- 4. Experiments and Assessment -- 5. Related Work -- 6. Conclusions -- References -- Part IV Multimedia Security -- Chapter 12 Web Application Security-Past, Present, and Futu -- 1. Introduction -- 2. Common Web Application Vulnerabilities -- 3. Current Countermeasures -- 4. Concluding Remarks and Future Work -- References -- Chapter 13 Securing JPEG2000 Code-Streams
- Control code
- 209828673
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 268 pages)
- Form of item
- online
- Isbn
- 9781280234071
- Lccn
- 2005042554
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/b104203
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-0-387-24005-3
- Specific material designation
- remote
- System control number
- (OCoLC)209828673
- Label
- Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cover -- Table of Contents -- List of Figures -- Chapter 1 Introduction -- Part I Security Protocol Design -- Chapter 2 Challenges in Protocol Design and Analysis -- 1. Introduction -- 2. Purpose of Analysis -- 3. The Environment -- 4. Case Studies -- 5. Conclusions and Challenges -- References -- Chapter 3 Private Matching -- 1. Introduction -- 2. Problem Statement -- 3. Threat Models -- 4. Terminology and Assumptions -- 5. Techniques -- 6. Data Ownership Certificate (DOC) -- 7. Security Analysis -- 8. Cost Analysis -- 9. Related Work -- 10. Future Work -- References -- Chapter 4 Authentication Protocol Analysis -- I. Introduction -- 2. Modeling Computational Operations -- 3. Diffie-Hellman and Group Protocols -- 4. Deeper Models of Encryption -- 5. Decidable Formal Methods -- 6. Future Directions -- References -- Chapter 5 Self-certified Approach for Authenticated Key Agreement -- 1. Introduction -- 2. Proposed 2-PAKA Protocol -- 3. Proposed n-PAKA Protocol -- 4. Security Analysis -- 5. Conclusion -- References -- Part II P2P and Ad Hoc Networks -- Chapter 6 Experimenting with Admission Control in P2P Networks -- 1. Introduction -- 2. Background -- 3. Bouncer: Admission Control Toolkit -- 4. Integration with Peer Group Systems -- 5. Experiments -- 6. Discussion -- 7. Future Directions -- References -- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- 1. Introduction -- 2. Adaptive Random Pre-distribution Scheme -- 3. Uniquely Assigned One-way Hash Function Scheme -- 4. Evaluation -- 5. Conclusion -- References -- Part III Intrusion Detection, Defense, Measurement -- Chapter 8 Measuring Relative Attack Surfaces -- 1. Introduction -- 2. Terminology and Model -- 3. Dimensions of an Attack Surface -- 4. Security Bulletins -- 5. Analyzing Attack Surfaces -- 6. An Example Attack Surface Metric -- 7. Discussion of the RASQ Approach -- 8. Related Work -- 9. Future Work -- References -- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability -- 1. Introduction -- 2. Traditional IDS model -- 3. A New model based on Identification (IDSIC) -- 4. Conclusion -- References -- Chapter 10 A Source-End Defense System against DDoS Attacks -- 1. Introduction -- 2. Review of D-WARD -- 3. Proposed System -- 4. Performance Evaluation -- 5. Conclusion and Future Work -- References -- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults -- 1. Introduction -- 2. The Detection of Control State Corruption -- 3. The BEAGLE System Design and Implementation -- 4. Experiments and Assessment -- 5. Related Work -- 6. Conclusions -- References -- Part IV Multimedia Security -- Chapter 12 Web Application Security-Past, Present, and Futu -- 1. Introduction -- 2. Common Web Application Vulnerabilities -- 3. Current Countermeasures -- 4. Concluding Remarks and Future Work -- References -- Chapter 13 Securing JPEG2000 Code-Streams
- Control code
- 209828673
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 268 pages)
- Form of item
- online
- Isbn
- 9781280234071
- Lccn
- 2005042554
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/b104203
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-0-387-24005-3
- Specific material designation
- remote
- System control number
- (OCoLC)209828673
Subject
- Communications Engineering, Networks
- Computer Communication Networks
- Computer science
- Computer security
- Computer security
- Data Encryption
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data structures
- Data structures (Computer science)
- Informatique
- Telecommunication
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Computer-security-in-the-21st-century-edited-by/5hZDEHizyoY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Computer-security-in-the-21st-century-edited-by/5hZDEHizyoY/">Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Computer-security-in-the-21st-century-edited-by/5hZDEHizyoY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Computer-security-in-the-21st-century-edited-by/5hZDEHizyoY/">Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>