|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 23
reviews
|
|
|
|
|
|
|
|
Information hiding: steganography and watermarking--attacks and countermeasures Johnson N., Duric Z., Jajodia S., Kluwer Academic Publishers, Norwell, MA, 2001. 137 pp. Type: Book (9780792372042)
This book is the first volume in a series entitled Advances in Information Security. The goal of the series is to capture the state of the art, set the course for future research and serve as a central reference for information securit...
|
Feb 1 2002 |
|
|
|
|
|
|
Configuring role-based access control to enforce mandatory and discretionary access control policies Osborn S., Sandhu R., Munawer Q. ACM Transactions on Information and System Security 3(2): 85-106, 2000. Type: Article
The authors show that a particular set of role-based access control (RBAC) models, known as RBAC96, can be used to define a variety of lattice-based access controls (LBACs), an abstraction and generalization of what is also known as th...
|
Feb 1 2001 |
|
|
|
|
|
|
Cryptography and network security (2nd ed.) Stallings W., Prentice-Hall, Inc., Upper Saddle River, NJ, 1999. Type: Book (9780138690175), Reviews: (2 of 2)
The problems of network security are many and varied. It is to Stallings’s credit that he has attempted to cover such a broad and deep subject in one book. The result is wonderfully informative: it covers the nooks and cranni...
|
Jan 1 1999 |
|
|
|
|
|
|
Secure computing Summers R., McGraw-Hill, Inc., Hightstown, NJ, 1997. Type: Book (9780070694194)
What a nice book! Summers undertook an ambitious project aimed at pulling together all of the relevant aspects of secure computing, and she has succeeded admirably. She has aimed the book at computer professionals, management, and stud...
|
Sep 1 1997 |
|
|
|
|
|
|
Commercial key recovery Walker S., Lipner S., Ellison C., Balenson D. Communications of the ACM 39(3): 41-47, 1996. Type: Article
A workable method for providing a key recovery capability for files and other long-term data items that are encrypted with a per-item key is offered....
|
Dec 1 1996 |
|
|
|
|
|
|
Network and internetwork security Stallings W., Prentice-Hall, Inc., Upper Saddle River, NJ, 1995. Type: Book (9780024154835)
Stallings covers the basics of network and Internet security by illuminating the issues and the technical responses to problems of network security. The book has ten chapters in two parts: “Internetwork Security Principles&am...
|
Apr 1 1996 |
|
|
|
|
|
|
Does licensing require new access control techniques? Hauser R. Communications of the ACM 37(11): 48-55, 1994. Type: Article
Hauser raises the problem of whether the notion of document licensing requires new techniques for access control. The author distinguishes between two kinds of licensing: consumptive licensing, which requires prepayment for the service...
|
Oct 1 1995 |
|
|
|
|
|
|
Schemes for slot reuse in CRMA Sharon O., Segall A. IEEE/ACM Transactions on Networking 2(3): 269-278, 1994. Type: Article
Several schemes for slot reuse in CRMA are discussed. The schemes, unsurprisingly, depend on the assumptions about the traffic load. Two methods are discussed extensively--a region scheme and an address scheme. Simulation resu...
|
Oct 1 1995 |
|
|
|
|
|
|
FDDI handbook Jain R. (ed), Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1994. Type: Book (9780201563764)
This great book is not only a Fiber Distributed Data Interface (FDDI) handbook, as advertised, but it covers enough of the lower-speed protocols and standards to convey a wide and sweeping overview of the general topic of network desig...
|
Aug 1 1995 |
|
|
|
|
|
|
Internet Privacy Enhanced Mail Kent S. Communications of the ACM 36(8): 48-60, 1993. Type: Article
Kent discusses PEM, PSRG, IAB, RFC, SRI, OSI, LAN, UA, MTA, POP, TCP, IP, SMTP, UI, MIME, X400, X500, BITNET, UUNET, RFC 822, RFC 821, RFC 1423, CCITT, X509, ISO, MIC, CRL, ASCII, ANSI, MD5, RSA, DEK, DES, CBC, CA, IPRA, DCA, RFC 1422,...
|
Nov 1 1994 |
|
|
|
|
|
|
|
|
|
|
|