Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Kurzban, Stanley
IBM
Thornwood, New York
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 28 reviews

   
  Five dimensions of information security awareness
 ACM SIGCAS Computers and Society 31(2): 24-29, 2001.  Type: Article

Although awareness of the importance of information has been growing rapidly for decades, many organizations still lack an appreciation of the different ways in which people can look at and measure the importance of information securit...

May 22 2002  
  Role-based access control on the web
 ACM Transactions on Information and System Security 4(1): 37-71, 2001.  Type: Article

Current approaches to access control on the Web servers do not scale to enterprise-wide systems because they are mostly based on individual user identities. Hence we were motivated by the need to manage and enforce the stro...
Apr 19 2002  
  White-hat security arsenal: tackling the threats
Rubin A., Addison-Wesley Longman Ltd., Essex, UK, 2001. 330 pp.  Type: Book (9780201711141)

Rubin has written a superb book on the topic of security, as the book delineates it. To a well-chosen and very useful level of detail, he tells system administrators, IT professionals, and end users all they need to know about attacks ...

Oct 1 2001  
  Information security: protecting the global enterprise
Pipkin D., Prentice-Hall, Inc., Upper Saddle River, NJ, 2000. 364 pp.  Type: Book (9780130173232)

Pipkin discusses almost every conceivable aspect of information security, all the way from the changing environment in which organizations now find themselves, through all aspects of business analysis, policies and procedures, implemen...

Apr 1 2000  
  On secure and pseudonymous client-relationships with multiple servers
Gabber E., Gibbons P., Kristol D., Matias Y., Mayer A. ACM Transactions on Information and System Security 2(4): 390-415, 1999.  Type: Article

Janus is a cryptographic engine that may reside either in the computer that serves as an interface between a local network and the Internet, or in each computer attached to the local network. In the latter case, each Janus engine inter...

Mar 1 2000  
  Flexible control of downloaded executable content
Jaeger T., Prakash A., Liedtke J., Islam N. ACM Transactions on Information and System Security 2(2): 177-228, 1999.  Type: Article

Effective access control is hardly a simple matter of specifying and enforcing permissions that apply to pairs of subjects and objects. Consideration must also be given to the programs that mediate access; authentication of users, prog...

Oct 1 1999  
  Trusted recovery
Jajodia S., McCollum C., Ammann P. Communications of the ACM 42(7): 71-75, 1999.  Type: Article

Although this short, well-written paper provides those responsible for system security with a generally useful typology of strategies for the defense of computers and for recovery from successful attacks, its primary focus is on databa...

Aug 1 1999  
  Information warfare and security
Denning D., Addison-Wesley Longman Ltd., Essex, UK, 1999.  Type: Book (9780201433036)

With this book, Denning brings to a wider audience the lucid style and insightful analysis that experts in computer security have long appreciated in her work. She has succeeded in her quest to provide a treatment of information securi...

Jan 1 1999  
  Fighting computer crime
Parker D., John Wiley & Sons, Inc., New York, NY, 1998.  Type: Book (9780471163787)

Parker’s book on computer security focuses on crime because he believes that “controls that protect against intentional acts also protect against unintentional acts” (p. 310). As Bill Murray notes in the f...

Oct 1 1998  
  Computer virus-antivirus coevolution
Nachenberg C. Communications of the ACM 40(1): 46-51, 1997.  Type: Article

Nachenberg has produced a reasonably clear and succinct, although poorly edited, overview for the nonspecialist of the current status of the conflict between those who create computer viruses and those who wish to avoid becoming their ...

Dec 1 1997  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy