[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Fundamentals of computer security technologyAugust 1994
Publisher:
  • Prentice-Hall, Inc.
  • Division of Simon and Schuster One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-108929-7
Published:01 August 1994
Pages:
404
Skip Bibliometrics Section
Reflects downloads up to 25 Dec 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Vidal F, Ivaki N and Laranjeiro N (2024). OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities, Empirical Software Engineering, 29:4, Online publication date: 1-Jul-2024.
  2. ACM
    Dimova Y, Kode M, Kalantari S, Wuyts K, Joosen W and Mühlberg J From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling Proceedings of the 22nd Workshop on Privacy in the Electronic Society, (17-29)
  3. Swambo J and Poinsot A Risk Framework for Bitcoin Custody Operation with the Revault Protocol Financial Cryptography and Data Security. FC 2021 International Workshops, (3-20)
  4. Knüpfer M, Bierwirth T, Stiemert L, Schopp M, Seeber S, Pöhn D and Hillmann P Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems Model-driven Simulation and Training Environments for Cybersecurity, (3-21)
  5. Hines P A Diagrammatic Approach to Information Flow in Encrypted Communication Graphical Models for Security, (166-185)
  6. Lallie H, Debattista K and Bal J (2020). A review of attack graph and attack tree visual syntax in cyber security, Computer Science Review, 35:C, Online publication date: 1-Feb-2020.
  7. Buldas A, Gadyatskaya O, Lenin A, Mauw S and Trujillo-Rasua R (2022). Attribute evaluation on attack trees with incomplete information, Computers and Security, 88:C, Online publication date: 1-Jan-2020.
  8. Bilur M, Gari A and Shyamasundar R Threat Assessment of Enterprise Applications via Graphical Modelling Network and System Security, (146-166)
  9. El-Attar M (2019). A comparative study of students and professionals in syntactical model comprehension experiments, Software and Systems Modeling (SoSyM), 18:6, (3283-3329), Online publication date: 1-Dec-2019.
  10. Lanet J, Bouder H, Benattou M and Legay A (2018). When time meets test, International Journal of Information Security, 17:4, (395-409), Online publication date: 1-Aug-2018.
  11. Lallie H, Debattista K and Bal J (2018). An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception, IEEE Transactions on Information Forensics and Security, 13:5, (1110-1122), Online publication date: 1-May-2018.
  12. ACM
    Matos D, Pardal M, Adão P, Silva A and Correia M Securing Electronic Health Records in the Cloud Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, (1-6)
  13. Raspotnig C, Karpati P and Opdahl A (2018). Combined Assessment of Software Safety and Security Requirements, Journal of Cases on Information Technology, 20:1, (46-69), Online publication date: 1-Jan-2018.
  14. (2017). A survey on the usability and practical applications of Graphical Security Models, Computer Science Review, 26:C, (1-16), Online publication date: 1-Nov-2017.
  15. Iturbe M, Garitano I, Zurutuza U, Uribeetxeberria R and Lopez J (2017). Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  16. El-Attar M, Luqman H, Karpati P, Sindre G and Opdahl A (2015). Extending the UML Statecharts Notation to Model Security Aspects, IEEE Transactions on Software Engineering, 41:7, (661-690), Online publication date: 1-Jul-2015.
  17. (2014). DAG-based attack and defense modeling, Computer Science Review, 13:C, (1-38), Online publication date: 1-Nov-2014.
  18. Hernandez-Ardieta J, Gonzalez-Tablas A, De Fuentes J and Ramos B (2013). A taxonomy and survey of attacks on digital signatures, Computers and Security, 34, (67-112), Online publication date: 1-May-2013.
  19. Raspotnig C and Opdahl A (2013). Comparing risk identification techniques for safety and security requirements, Journal of Systems and Software, 86:4, (1124-1151), Online publication date: 1-Apr-2013.
  20. Kordy B, Mauw S and Schweitzer P Quantitative questions on attack Proceedings of the 15th international conference on Information Security and Cryptology, (49-64)
  21. Roy A, Kim D and Trivedi K (2012). Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees, Security and Communication Networks, 5:8, (929-943), Online publication date: 1-Aug-2012.
  22. Martin N and Rice J (2011). Cybercrime, Computers and Security, 30:8, (803-814), Online publication date: 1-Nov-2011.
  23. Kordy B, Pouly M and Schweitzer P Computational aspects of attack---defense trees Proceedings of the 2011 international conference on Security and Intelligent Information Systems, (103-116)
  24. Kordy B, Mauw S, Radomirović S and Schweitzer P Foundations of attack-defense trees Proceedings of the 7th International conference on Formal aspects of security and trust, (80-95)
  25. ACM
    Roy A, Kim D and Trivedi K Cyber security analysis using attack countermeasure trees Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  26. Dalton G, Edge K, Mills R and Raines R (2010). Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees, International Journal of Security and Networks, 5:2/3, (87-95), Online publication date: 1-Mar-2010.
  27. Jin S, Wang Y, Cui X and Yun X A review of classification methods for network vulnerability Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics, (1171-1175)
  28. ACM
    Birge C Enhancing research into usable privacy and security Proceedings of the 27th ACM international conference on Design of communication, (221-226)
  29. Brinkmeier M, Rossberg M and Schaefer G Towards a denial-of-service resilient design of complex IPsec overlays Proceedings of the 2009 IEEE international conference on Communications, (948-953)
  30. ACM
    Derrick E, Tibbs R and Reynolds L Investigating new approaches to data collection, management and analysis for network intrusion detection Proceedings of the 45th annual ACM Southeast Conference, (283-287)
  31. Halkidis S, Chatzigeorgiou A and Stephanides G Quantitative evaluation of systems with security patterns using a fuzzy approach Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (554-564)
  32. ACM
    Kongsli V Towards agile security in web applications Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, (805-808)
  33. Kim H, Shin W, Ramakrishna R and Sakurai K Design and implementation of an extended reference monitor for trusted operating systems Proceedings of the Second international conference on Information Security Practice and Experience, (235-247)
  34. Mouratidis H, Weiss M and Giorgini P Security patterns meet agent oriented software engineering Proceedings of the 24th international conference on Conceptual Modeling, (225-240)
  35. ACM
    Im G and Baskerville R (2005). A longitudinal study of information system threat categories, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 36:4, (68-79), Online publication date: 7-Oct-2005.
  36. ACM
    Al-Hamdani W and Griskell I A proposed curriculum of cryptography courses Proceedings of the 2nd annual conference on Information security curriculum development, (4-11)
  37. Kim K, Hong J and Lim J Fast and secure communication resume protocol for wireless networks Proceedings of the 11th international Euro-Par conference on Parallel Processing, (1120-1129)
  38. van Lamsweerde A Elaborating Security Requirements by Construction of Intentional Anti-Models Proceedings of the 26th International Conference on Software Engineering, (148-157)
  39. ACM
    Kavakli E Modeling organizational goals Proceedings of the 2004 ACM symposium on Applied computing, (1339-1343)
  40. Han S and Cho S (2003). Refereed Detecting intrusion with rule-based integration of multiple models, Computers and Security, 22:7, (613-623), Online publication date: 1-Oct-2003.
  41. Undercoffer J, Joshi A, Finin T and Pinkston J (2003). Using DAML+OIL to classify intrusive behaviours, The Knowledge Engineering Review, 18:3, (221-241), Online publication date: 1-Sep-2003.
  42. Da Cruz D, Rumpe B and Wimmel G Retrofitting security into a web-based information system Proceedings of the 2003 international conference on Web engineering, (301-305)
  43. Álvarez G and Petrović S (2003). Refereed paper, Computers and Security, 22:5, (435-449), Online publication date: 1-Jul-2003.
  44. ACM
    McEvilley M (2002). The essence of information assurance and its implications for the Ada community, ACM SIGAda Ada Letters, XXIII:1, (35-39), Online publication date: 1-Mar-2003.
  45. Howard M and Lipner S (2003). Inside the Windows Security Push, IEEE Security and Privacy, 1:1, (57-61), Online publication date: 1-Jan-2003.
  46. ACM
    McEvilley M The essence of information assurance and its implications for the Ada community Proceedings of the 2002 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies, (35-39)
  47. Sindre G, Opdahl A and Brevik G Generalization/specialization as a structuring mechanism for misuse cases Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, (1-16)
  48. ACM
    van den Akker T, Snell Q and Clement M The YGuard access control model Proceedings of the sixth ACM symposium on Access control models and technologies, (75-84)
  49. Cowan C, Beattie S, Kroah-Hartman G, Pu C, Wagle P and Gligor V SubDomain: Parsimonious Server Security Proceedings of the 14th USENIX conference on System administration, (355-368)
  50. van Lamsweerde A and Letier E (2000). Handling Obstacles in Goal-Oriented Requirements Engineering, IEEE Transactions on Software Engineering, 26:10, (978-1005), Online publication date: 1-Oct-2000.
  51. ACM
    van Lamsweerde A Requirements engineering in the year 00 Proceedings of the 22nd international conference on Software engineering, (5-19)
  52. van Lamsweerde A, Letier E and Darimont R (1998). Managing Conflicts in Goal-Driven Requirements Engineering, IEEE Transactions on Software Engineering, 24:11, (908-926), Online publication date: 1-Nov-1998.
  53. van Lamsweerde A and Letier E Integrating obstacles in goal-driven requirements engineering Proceedings of the 20th international conference on Software engineering, (53-62)
  54. ACM
    Salter C, Saydjari O, Schneier B and Wallner J Toward a secure system engineering methodolgy Proceedings of the 1998 workshop on New security paradigms, (2-10)
  55. ACM
    Chuang S and Wernick P A credibility-based model of computer system security Proceedings of the 1996 workshop on New security paradigms, (53-58)
Contributors
  • Nokia Bell Labs

Reviews

Yacov Yacobi

Security research and development is not a homogeneous area. In fact, it is composed of a few camps that are almost mutually exclusive. These camps are cryptography, and operating systems and networks security. The second group is further subdivided into government security and commercial security. Each of the groups has its own conferences and workshops, which are distinct in style and substance. Amoroso's textbook represents the government security camp. As such, it treats cryptography as the building material used, when necessary, in the construction of secure systems. The properties of the cryptographic building blocks are taken almost as axioms. The book is a fair representative of this camp (as manifested mainly by the annual IEEE symposium on Research in Security and Privacy in Oakland, California) at the undergraduate level. It covers all the subjects that are normally treated in this group, and the reader can get an idea of the kinds of questions asked and the kinds of solutions proposed. The author, though he is a researcher and a known contributor in the field, presents the material in a modest, almost objective way. Government security R&D emerged in the pre–personal computer age. It was cast at that time, when computation cost was relatively high and mutually suspicious parties had to share a single mainframe. These restrictions gave rise to many security problems that, although they still exist, are becoming less important. It is less well known that US government security is not the only branch in this field, and that at the same time the US government spent many millions of dollars annually on big research, the Royal Signals Corps (RSC) in Great Britain funded small-scale research that made a lot of sense and was cost effective and very usable. (I do not know how much impact US-funded research had on government systems; it was viewed as too expensive for commercial use.) Although some of the RSC work was published, it is not represented in this book. The biggest flaw of this book, as well as of every book in this field that I know of, is the lack of a big picture. It is a collection of problems and solutions, where each researcher tries to understand what the elephant looks like, based on what can be felt from a particular angle. (When I read the RSC-funded papers, I came closer to feeling that I could see the big picture.) The book does not assume a lot of mathematical knowledge, so some readers can skip the preparatory sections. This approach is fine, but the less-skilled person who invests effort in learning the background mathematical language may in some cases be disappointed. At the end of the learning process, she or he may find that the shorthand math notation did not express anything new, and in some cases it even made previously clear and simple ideas more obscure and cumbersome (though correct). The section on viruses correctly concentrates on compiler viruses, since excellent papers have been written on those by leading compiler scientists. Nonetheless, some bridging between compiler viruses and real viruses, such as the Morris virus, that are not compiler viruses would be useful. Another semantic problem that occurs here as well as in many other publications is the confusion among the terms “decrypt,” “decipher,” and “cryptanalyze.” According to the Oxford English Dictionary , the first two are synonyms (they are what the legitimate receiver of a cryptogram does, while the last is what the illegitimate eavesdropper tries to do). The summary on page 236 abuses the terminology, as well as doing injustice to Shannon's theory (secret keys are a must, not something that “assists in the practicality”). The chapter on RSA (the Rivest, Shamir, Adleman public key encryption standard used for authentication and data privacy) concludes with a statement that factoring a 200-digit integer that is the product of two 100-digit primes would take billions of years. According to A. K. Lenstra, a leading expert in the field, ten thousand Sun workstations would do it in at most a century, using today's algorithms. The index is incomplete. For example, an important subject, “firewall,” though mentioned on page 309, is missing from the index. The book is a fair representation of an important slice of the computer-security R&D in the US in the last two decades, including the strong as well as the weak points.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations