Cyberspace Security and Defense: Research Issues

Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

Editors:

ISBN: 978-1-4020-3379-7 (Print) 978-1-4020-3381-0 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. General Security Issues

    1. No Access

      Book Chapter

      Pages 3-23

      IT Security Development

    2. No Access

      Book Chapter

      Pages 25-42

      A Case for Public and Private Review of Developing it Security Standards

    3. No Access

      Book Chapter

      Pages 43-55

      Assuring Critical Information Infrastructure

    4. No Access

      Book Chapter

      Pages 57-73

      Systemic Challenges for Critical Information Infrastructure Protection

    5. No Access

      Book Chapter

      Pages 75-97

      Decentralized Energy Supply to Secure Computer Systems

  2. Dependability

    1. No Access

      Book Chapter

      Pages 101-124

      Safety Analysis Methods—Software Development Questions

    2. No Access

      Book Chapter

      Pages 125-141

      Trust Case—A Case for Trustworthiness of IT Infrastructures

    3. No Access

      Book Chapter

      Pages 143-160

      Dependability, Structure, and Infrastructure

    4. No Access

      Book Chapter

      Pages 161-174

      Design for Safety and Security of Complex Embedded Systems: A Unified Approach

  3. Networks

    1. No Access

      Book Chapter

      Pages 177-192

      Design of Distributed Sensor Networks for Security and Defense

    2. No Access

      Book Chapter

      Pages 193-207

      A Distributed Approach to the Recognition of Geographically Located IP Devices

    3. No Access

      Book Chapter

      Pages 209-228

      Situational Awareness and Network Traffic Analysis

  4. Early Warning Information Systems and Secure Access Control

    1. No Access

      Book Chapter

      Pages 231-257

      Honeynets: Foundations for the Development of Early Warning Information Systems

    2. No Access

      Book Chapter

      Pages 259-278

      IRIS Biometrics for Secure Remote Access

    3. No Access

      Book Chapter

      Pages 279-293

      New Directions in Access Control

  5. Cryptography

    1. No Access

      Book Chapter

      Pages 297-314

      Improved Block Cipher Counter Mode of Operation Schemes

    2. No Access

      Book Chapter

      Pages 315-321

      Electronic Signature in Real World

    3. No Access

      Book Chapter

      Pages 323-330

      A Note on Two Significant Developments in Cyberspace Security and Defense

    4. No Access

      Book Chapter

      Pages 331-345

      A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol

  6. Intrusion Detection

    1. No Access

      Book Chapter

      Pages 349-365

      An Infrastructure for Distributed Event Acquisition

previous Page of 2