AMS Bookstore LOGO amslogo
Return to List

AMS TextbooksAMS Applications-related Books

Network Threats
Edited by: Rebecca N. Wright, AT&T Labs Research, Florham Park, NJ, and Peter G. Neumann, SRI International, Menlo Park, CA
A co-publication of the AMS and DIMACS.
SEARCH THIS BOOK:

DIMACS: Series in Discrete Mathematics and Theoretical Computer Science
1998; 110 pp; hardcover
Volume: 38
ISBN-10: 0-8218-0832-X
ISBN-13: 978-0-8218-0832-0
List Price: US$36
Member Price: US$28.80
Order Code: DIMACS/38
[Add Item]

Request Permissions

This volume presents papers from a DIMACS workshop on network threats. The workshop brought together computer scientists (theorists and practitioners) working in this area to discuss topics such as network security, prevention and detection of security attacks, modeling threats, risk management, threats to individual privacy, and methods of security analysis. The book demonstrates the wide and diverse range of topics involved in electronic interactions and transactions--including the less desirable aspects: security breaches.

The volume offers a timely assessment of avoiding or minimizing network threats. Presented here is an interdisciplinary, system-oriented approach that encompasses security requirements, specifications, protocols, and algorithms. The text includes implementation and development strategies using real-world applications that are reliable, fault-tolerant, and performance oriented. The book would be suitable for a graduate seminar on computer security.

Features:

  • Discussion of Internet, Web and Java security
  • Information on new attacks and weaknesses
  • Formal and informal analysis methods to identify, quantify, and combat security threats

Co-published with the Center for Discrete Mathematics and Theoretical Computer Science beginning with Volume 8. Volumes 1-7 were co-published with the Association for Computer Machinery (ACM).

Readership

Graduate students, research mathematicians, computer scientists, and engineers interested in computer science.

Table of Contents

  • C. Meadows -- A representation of protocol attacks for risk assessment
  • D. Zhou and S.-K. Chin -- Verifying privacy enhanced mail functions with higher order logic
  • M. Joye and J.-J. Quisquater -- Cryptanalysis of RSA-type cryptosystems: A visit
  • S. Patel -- Information leakage in encrypted key exchange
  • A. Shostack -- Observed weaknesses in security dynamics' client/server protocol
  • D. Dean -- Web security: A high level view
  • D. S. Wallach, J. A. Roskind, and E. W. Felten -- Flexible, extensible Java security using digital signatures
  • M. Burmester, Y. Desmedt, and G. Kabatianski -- Trust and security: A new look at the Byzantine generals problem
  • R. J. Hall -- Channels: Avoiding unwanted electronic mail
  • C. Cullen -- Demonstration of hacker techniques
Powered by MathJax

  AMS Home | Comments: webmaster@ams.org
© Copyright 2014, American Mathematical Society
Privacy Statement

AMS Social

AMS and Social Media LinkedIn Facebook Podcasts Twitter YouTube RSS Feeds Blogs Wikipedia