Computer Security in the 21st Century

Front Cover
D.T. Lee, S. P. Shieh, J. Doug Tygar
Springer Science & Business Media, Dec 5, 2005 - Computers - 268 pages

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of :

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

3
25
4
51
5
61
7
91
with t 10 s 10
95
Intrusion Detection Defense Measurement
109
9
138
10
147
Tracking System Failures for Reproducing Security Faults
169
12
182
13
229
14
254
Index
265
Copyright

Other editions - View all

Common terms and phrases

About the author (2005)

Computer Security in the 21st Century

Edited by D.T. Lee, S.P. Shieh, and J.D. Tygar

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: secure security protocol design, secure peer-to-peer P2P and ad hoc networks Ad Hoc Networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

* Fundamental new security

* Cryptographic protocols and design,

* A new way of measuring network vulnerability: attack surfaces,

* Network vulnerability and building impenetrable systems,

* Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this volume book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

ABOUT THE AUTHORS

D. T. Lee is a Distinguished Research Fellow and Director of the Institute of Information Science at Academia Sinica. He is also a Professor in the Department of Computer Science and Information Engineering at National Taiwan University. His research interests include design and analysis of algorithms, algorithm visualization and software security.

S. P.hiuh-Pyng Shieh is a Professor in the Department of Computer Science and Information Engineering at National Chiao Tung University, and the President of Chinese Cryptographic and Information Security Association. His research interests include network security and distributed systems.

J. D. Tygar is a Professor of Computer Science and Information Management at UC Berkeley. He served as chair of the Defense Department’s Study Group on Security with Privacy. He works in the areas of computer security, privacy, and electronic commerce. His current research includes strong privacy protections, security issues in sensor webs, and digital rights management.