Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko1402033796, 9781402033797, 9781402033810
On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.
Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not “Should we do something for enhancing our digital assets security”, the question is “How to do it”.
Table of contents :
1402033796……Page 1
Table of Contents……Page 6
Preface……Page 9
Part 1 General Security Issues……Page 10
IT Security Development……Page 11
A Case for Public and Private Review of Developing IT Security Standards……Page 32
Assuring Critical Information Infrastructure……Page 50
Systemic Challenges for Critical Information Infrastructure Protection……Page 63
Decentralized Energy Supply to Secure Computer Systems……Page 80
Part 2 Dependability……Page 103
Safety Analysis Methods—Software Development Questions……Page 104
Trust Case—A Case for Trustworthiness of IT Infrastructures……Page 128
Dependability, Structure, and Infrastructure……Page 145
Design for Safety and Security of Complex Embedded Systems: A Unified Approach……Page 163
Part 3 Networks……Page 177
Design of Distributed Sensor Networks for Security and Defense……Page 178
A Distributed Approach to the Recognition of Geographically Located IP Devices……Page 194
Situational Awareness and Network Traffic Analysis……Page 209
Part 4 Early Warning Information Systems and Secure Access Control……Page 229
Honeynets: Foundations for the Development of Early Warning Information Systems……Page 230
IRIS Biometrics for Secure Remote Access……Page 257
New Directions in Access Control……Page 277
Part 5 Cryptography……Page 292
Improved Block Cipher Counter Mode of Operation Schemes……Page 293
Electronic Signature in Real World……Page 311
A Note on Two Significant Developments in Cyberspace Security and Defense……Page 318
A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol……Page 326
Part 6 Intrusion Detection……Page 341
An Infrastructure for Distributed Event Acquisition……Page 342
Some Aspects of Neural Network Approach for Intrusion Detection……Page 359
Reviews
There are no reviews yet.