Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004.

Front Cover
Janusz S. Kowalik, Janusz Gorski, Anatoly Sachenko
Springer Science & Business Media, May 19, 2005 - Computers - 382 pages

Cyberspace security is a critical subject of our times.

On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.

Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security", the question is "How to do it".

 

Contents

IT SECURITY DEVELOPMENT COMPUTERAIDED TOOL SUPPORTING DESIGN AND EVALUATION
3
A CASE FOR PUBLIC AND PRIVATE REVIEW OF DEVELOPING IT SECURITY STANDARDS
25
ASSURING CRITICAL INFORMATION INFRASTRUCTURE
43
SYSTEMIC CHALLENGES FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
57
DECENTRALIZED ENERGY SUPPLY TO SECURE COMPUTER SYSTEMS
75
DEPENDABILITY
99
SAFETY ANALYSIS METHODSSOFTWARE DEVELOPMENT QUESTIONS
101
TRUST CASEA CASE FOR TRUSTWORTHINESS OF IT INFRASTRUCTURES
125
EARLY WARNING INFORMATION SYSTEMS AND SECURE ACCESS CONTROL
229
HONEYNETS FOUNDATIONS FOR THE DEVELOPMENT OF EARLY WARNING INFORMATION SYSTEMS
231
IRIS BIOMETRICS FOR SECURE REMOTE ACCESS
259
NEW DIRECTIONS IN ACCESS CONTROL
279
CRYPTOGRAPHY
295
IMPROVED BLOCK CIPHER COUNTER MODE OF OPERATION SCHEMES
297
ELECTRONIC SIGNATURE IN REAL WORLD
315
A NOTE ON TWO SIGNIFICANT DEVELOPMENTS IN CYBERSPACE SECURITY AND DEFENSE
323

DEPENDABILITY STRUCTURE AND INFRASTRUCTURE
143
DESIGN FOR SAFETY AND SECURITY OF COMPLEX EMBEDDED SYSTEMS A UNIFIED APPROACH
161
NETWORKS
175
DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR SECURITY AND DEFENSE
177
A DISTRIBUTED APPROACH TO THE RECOGNITION OF GEOGRAPHICALLY LOCATED IP DEVICES
193
SITUATIONAL AWARENESS AND NETWORK TRAFFIC ANALYSIS
209
A CRYPTOGRAPHIC MOBILE AGENT IMPLEMENTING SECURE PERSONAL CONTENT DELIVERY PROTOCOL
331
INTRUSION DETECTION
347
AN INFRASTRUCTURE FOR DISTRIBUTED EVENT ACQUISITION
349
SOME ASPECTS OF NEURAL NETWORK APPROACH FOR INTRUSION DETECTION
367
Copyright

Other editions - View all

Common terms and phrases