Preface |
|
iii | |
Contributors |
|
xi | |
|
Development of Organizational Internet Security Policy: A Holistic Approach |
|
|
1 | (22) |
|
|
|
2 | (3) |
|
Organizational Internet Risks |
|
|
5 | (4) |
|
Holistic Factors in Internet Security Policy |
|
|
9 | (4) |
|
Framework for Developing Organizational Internet Security Policy |
|
|
13 | (3) |
|
Internet Security Policy Content Model |
|
|
16 | (1) |
|
Research Findings and Conclusion |
|
|
16 | (7) |
|
Managing Software Security Risks: Buffer Overflows and Beyond |
|
|
23 | (10) |
|
|
|
23 | (1) |
|
Understanding the Problem |
|
|
24 | (6) |
|
|
30 | (3) |
|
Experiments in Wireless Internet Security |
|
|
33 | (16) |
|
|
|
|
34 | (3) |
|
Secure Sockets Layer (SSL) |
|
|
37 | (3) |
|
|
40 | (3) |
|
Secure Mobile Enterprise Access |
|
|
43 | (1) |
|
|
44 | (1) |
|
Conclusions and Future Work |
|
|
45 | (4) |
|
The Neverending Saga of Internet Security: Why? How? and What to Do Next? |
|
|
49 | (8) |
|
|
Secure Compartmented Data Access over an Untrusted Network Using a Cots-Based Architecture |
|
|
57 | (14) |
|
|
|
|
|
58 | (2) |
|
|
60 | (4) |
|
Security Issues and Assumptions |
|
|
64 | (2) |
|
Comparison with Related Work |
|
|
66 | (2) |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (30) |
|
|
|
|
|
|
|
|
71 | (3) |
|
|
74 | (3) |
|
Trust and Vulnerabilities |
|
|
77 | (8) |
|
|
85 | (3) |
|
|
88 | (4) |
|
|
92 | (1) |
|
|
93 | (3) |
|
|
96 | (1) |
|
Conclusion: What of the Future |
|
|
97 | (4) |
|
Computer Security: The Good, the Bad, and the Ugly |
|
|
101 | (8) |
|
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (4) |
|
Architecture and Applications for a Distributed Embedded Firewall |
|
|
109 | (22) |
|
|
|
|
110 | (2) |
|
|
112 | (6) |
|
|
118 | (3) |
|
|
121 | (2) |
|
|
123 | (4) |
|
|
127 | (1) |
|
|
127 | (4) |
|
Using Operating System Wrappers to Increase the Resiliency of Commercial Firewalls |
|
|
131 | (26) |
|
|
|
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (4) |
|
Gauntlet Wrappers Using NAI Labs Wrappers |
|
|
138 | (8) |
|
Wrapping Nonsource Firewalls Using NAI Labs Wrappers |
|
|
146 | (5) |
|
Wrapping Gauntlet Using ISI Wrappers |
|
|
151 | (2) |
|
Current Status and Future Directions |
|
|
153 | (2) |
|
|
155 | (2) |
|
A Susceptible-Infected-Susceptible Model with Reintroduction for Computer Virus Epidemies |
|
|
157 | (12) |
|
|
|
158 | (1) |
|
|
159 | (1) |
|
Computer Virus SIS Modeling |
|
|
160 | (2) |
|
|
162 | (3) |
|
|
165 | (4) |
|
Man vs. Machine---A Study of the Ability of Statistical Methodologies to Discern Human Generated ssh Traffic from Machine Generated scp Traffic |
|
|
169 | (14) |
|
|
|
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (7) |
|
|
179 | (4) |
|
Passive Detection of Denial of Service Attacks on the Internet |
|
|
183 | (30) |
|
|
|
183 | (3) |
|
|
186 | (3) |
|
|
189 | (20) |
|
|
209 | (4) |
|
On the Extinction of the S-I-S Stochastic Logistic Epidemic |
|
|
213 | (16) |
|
|
|
|
214 | (2) |
|
On the Mean Time Until Extinction |
|
|
216 | (4) |
|
On the Quasi-Stationary Distribution |
|
|
220 | (9) |
|
Secure Introduction of One-way Functions |
|
|
229 | (20) |
|
|
|
229 | (4) |
|
The Language and Semantics |
|
|
233 | (4) |
|
|
237 | (1) |
|
|
238 | (6) |
|
Application to Password Systems |
|
|
244 | (3) |
|
|
247 | (2) |
|
Policy-Based Authentication and Authorization |
|
|
249 | (16) |
|
|
|
249 | (1) |
|
|
250 | (4) |
|
|
254 | (5) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
262 | (3) |
|
The Evolution of Viruses and Worms |
|
|
265 | (22) |
|
|
|
|
266 | (2) |
|
First Wave: Early Viruses and Worms |
|
|
268 | (2) |
|
Second Wave: Polymorphism and Toolkits |
|
|
270 | (1) |
|
Third Wave: Mass E-Mailers |
|
|
271 | (3) |
|
Fourth Wave: Modern Worms |
|
|
274 | (5) |
|
|
279 | (3) |
|
|
282 | (5) |
|
Infrastructure Web: Distributed Monitoring and Managing Critical Infrastructures |
|
|
287 | (22) |
|
|
|
|
|
288 | (2) |
|
The Infrastructure Protection Process |
|
|
290 | (7) |
|
|
297 | (8) |
|
|
305 | (1) |
|
|
306 | (3) |
|
Firewalls: An Expert Roundtable |
|
|
309 | (18) |
|
|
|
|
|
|
310 | (17) |
|
A New Model for Probabilistic Information Retrieval on the Web |
|
|
327 | (22) |
|
|
|
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
The Combination of Expert Opinion Model |
|
|
331 | (2) |
|
|
333 | (1) |
|
Probability Distributions in the Combination of Expert Opinion |
|
|
334 | (1) |
|
Computing the Mean and Standard Deviation of the Transformed Beta Distribution |
|
|
335 | (3) |
|
|
338 | (2) |
|
|
340 | (9) |
Index |
|
349 | |