Coverart for item
The Resource Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar

Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar

Label
Computer security in the 21st century
Title
Computer security in the 21st century
Statement of responsibility
edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Title variation
Computer security in the twenty-first century
Contributor
Subject
Language
eng
Summary
Computer security has opened a variety of new frontiers in the new millennium. This book explores the spectrum of newly merging areas in security, in topics ranging over privacy, intellectual property protection, communications, operating system design, programming languages and security, and mobile security. It includes contributions from an international collection of both experienced and young researchers in computer security. The book will be useful to computer network security professionals and researchers
Is part of
Cataloging source
COO
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.A25
LC item number
C648 2005
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1960-
http://library.link/vocab/relatedWorkOrContributorName
  • Lee, Der-Tsai
  • Shieh, S. P.
  • Tygar, J. D
http://library.link/vocab/subjectName
  • Computer security
  • Data encryption (Computer science)
  • Data structures (Computer science)
  • Telecommunication
  • Computer science
  • Communications Engineering, Networks
  • Computer Communication Networks
  • Data Encryption
  • Data structures
  • Data Structures, Cryptology and Information Theory
  • Informatique
  • Computer security
Label
Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cover -- Table of Contents -- List of Figures -- Chapter 1 Introduction -- Part I Security Protocol Design -- Chapter 2 Challenges in Protocol Design and Analysis -- 1. Introduction -- 2. Purpose of Analysis -- 3. The Environment -- 4. Case Studies -- 5. Conclusions and Challenges -- References -- Chapter 3 Private Matching -- 1. Introduction -- 2. Problem Statement -- 3. Threat Models -- 4. Terminology and Assumptions -- 5. Techniques -- 6. Data Ownership Certificate (DOC) -- 7. Security Analysis -- 8. Cost Analysis -- 9. Related Work -- 10. Future Work -- References -- Chapter 4 Authentication Protocol Analysis -- I. Introduction -- 2. Modeling Computational Operations -- 3. Diffie-Hellman and Group Protocols -- 4. Deeper Models of Encryption -- 5. Decidable Formal Methods -- 6. Future Directions -- References -- Chapter 5 Self-certified Approach for Authenticated Key Agreement -- 1. Introduction -- 2. Proposed 2-PAKA Protocol -- 3. Proposed n-PAKA Protocol -- 4. Security Analysis -- 5. Conclusion -- References -- Part II P2P and Ad Hoc Networks -- Chapter 6 Experimenting with Admission Control in P2P Networks -- 1. Introduction -- 2. Background -- 3. Bouncer: Admission Control Toolkit -- 4. Integration with Peer Group Systems -- 5. Experiments -- 6. Discussion -- 7. Future Directions -- References -- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- 1. Introduction -- 2. Adaptive Random Pre-distribution Scheme -- 3. Uniquely Assigned One-way Hash Function Scheme -- 4. Evaluation -- 5. Conclusion -- References -- Part III Intrusion Detection, Defense, Measurement -- Chapter 8 Measuring Relative Attack Surfaces -- 1. Introduction -- 2. Terminology and Model -- 3. Dimensions of an Attack Surface -- 4. Security Bulletins -- 5. Analyzing Attack Surfaces -- 6. An Example Attack Surface Metric -- 7. Discussion of the RASQ Approach -- 8. Related Work -- 9. Future Work -- References -- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability -- 1. Introduction -- 2. Traditional IDS model -- 3. A New model based on Identification (IDSIC) -- 4. Conclusion -- References -- Chapter 10 A Source-End Defense System against DDoS Attacks -- 1. Introduction -- 2. Review of D-WARD -- 3. Proposed System -- 4. Performance Evaluation -- 5. Conclusion and Future Work -- References -- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults -- 1. Introduction -- 2. The Detection of Control State Corruption -- 3. The BEAGLE System Design and Implementation -- 4. Experiments and Assessment -- 5. Related Work -- 6. Conclusions -- References -- Part IV Multimedia Security -- Chapter 12 Web Application Security-Past, Present, and Futu -- 1. Introduction -- 2. Common Web Application Vulnerabilities -- 3. Current Countermeasures -- 4. Concluding Remarks and Future Work -- References -- Chapter 13 Securing JPEG2000 Code-Streams
Control code
209828673
Dimensions
unknown
Extent
1 online resource (xi, 268 pages)
Form of item
online
Isbn
9781280234071
Lccn
2005042554
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b104203
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-24005-3
Specific material designation
remote
System control number
(OCoLC)209828673
Label
Computer security in the 21st century, edited by D.T. Lee, S.P. Shieh, J.D. Tygar
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cover -- Table of Contents -- List of Figures -- Chapter 1 Introduction -- Part I Security Protocol Design -- Chapter 2 Challenges in Protocol Design and Analysis -- 1. Introduction -- 2. Purpose of Analysis -- 3. The Environment -- 4. Case Studies -- 5. Conclusions and Challenges -- References -- Chapter 3 Private Matching -- 1. Introduction -- 2. Problem Statement -- 3. Threat Models -- 4. Terminology and Assumptions -- 5. Techniques -- 6. Data Ownership Certificate (DOC) -- 7. Security Analysis -- 8. Cost Analysis -- 9. Related Work -- 10. Future Work -- References -- Chapter 4 Authentication Protocol Analysis -- I. Introduction -- 2. Modeling Computational Operations -- 3. Diffie-Hellman and Group Protocols -- 4. Deeper Models of Encryption -- 5. Decidable Formal Methods -- 6. Future Directions -- References -- Chapter 5 Self-certified Approach for Authenticated Key Agreement -- 1. Introduction -- 2. Proposed 2-PAKA Protocol -- 3. Proposed n-PAKA Protocol -- 4. Security Analysis -- 5. Conclusion -- References -- Part II P2P and Ad Hoc Networks -- Chapter 6 Experimenting with Admission Control in P2P Networks -- 1. Introduction -- 2. Background -- 3. Bouncer: Admission Control Toolkit -- 4. Integration with Peer Group Systems -- 5. Experiments -- 6. Discussion -- 7. Future Directions -- References -- Chapter 7 Adaptive Random Key Distribution Schemes for Wireless Sensor Networks -- 1. Introduction -- 2. Adaptive Random Pre-distribution Scheme -- 3. Uniquely Assigned One-way Hash Function Scheme -- 4. Evaluation -- 5. Conclusion -- References -- Part III Intrusion Detection, Defense, Measurement -- Chapter 8 Measuring Relative Attack Surfaces -- 1. Introduction -- 2. Terminology and Model -- 3. Dimensions of an Attack Surface -- 4. Security Bulletins -- 5. Analyzing Attack Surfaces -- 6. An Example Attack Surface Metric -- 7. Discussion of the RASQ Approach -- 8. Related Work -- 9. Future Work -- References -- Chapter 9 A Modeling of Intrusion Detection Systems with Identification Capability -- 1. Introduction -- 2. Traditional IDS model -- 3. A New model based on Identification (IDSIC) -- 4. Conclusion -- References -- Chapter 10 A Source-End Defense System against DDoS Attacks -- 1. Introduction -- 2. Review of D-WARD -- 3. Proposed System -- 4. Performance Evaluation -- 5. Conclusion and Future Work -- References -- Chapter 11 BEAGLE: Tracking System Failures for Reproducing Security Faults -- 1. Introduction -- 2. The Detection of Control State Corruption -- 3. The BEAGLE System Design and Implementation -- 4. Experiments and Assessment -- 5. Related Work -- 6. Conclusions -- References -- Part IV Multimedia Security -- Chapter 12 Web Application Security-Past, Present, and Futu -- 1. Introduction -- 2. Common Web Application Vulnerabilities -- 3. Current Countermeasures -- 4. Concluding Remarks and Future Work -- References -- Chapter 13 Securing JPEG2000 Code-Streams
Control code
209828673
Dimensions
unknown
Extent
1 online resource (xi, 268 pages)
Form of item
online
Isbn
9781280234071
Lccn
2005042554
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b104203
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
978-0-387-24005-3
Specific material designation
remote
System control number
(OCoLC)209828673

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...