Cyberspace Security and Defense: Research Issues

Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004

  • Janusz S. Kowalik
  • Janusz Gorski
  • Anatoly Sachenko
Conference proceedings
Part of the NATO Science Series II: Mathematics, Physics and Chemistry book series (NAII, volume 196)

Table of contents

  1. Front Matter
    Pages i-ix
  2. General Security Issues

  3. Dependability

  4. Networks

    1. George Markowsky, Roman Romanyak, Anatoly Sachenko
      Pages 193-207
    2. John McHugh, Carrie Gates, Damon Becknel
      Pages 209-228
  5. Early Warning Information Systems and Secure Access Control

    1. F. Pouget, M. Dacier, V.H. Pham, H. Debar
      Pages 231-257
    2. Andrzej Pacut, Adam Czajka, Przemek Strzelczyk
      Pages 259-278
    3. Sabrina De Capitani Vimercati, Pierangela Samarati
      Pages 279-293
  6. Cryptography

    1. Ivan Gorbenko, Sergiy Golovashych
      Pages 297-314
    2. Vlasta Jošková
      Pages 315-321
    3. Bartłomiej Ziółkowski, Janusz Stokłosa
      Pages 331-345

About these proceedings

Introduction

Cyberspace security is a critical subject of our times.

On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.

Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security", the question is "How to do it".

Keywords

Access IT security access control biometrics communication cryptography database databases distributed computing information information system intrusion detection security

Editors and affiliations

  • Janusz S. Kowalik
    • 1
  • Janusz Gorski
    • 2
  • Anatoly Sachenko
    • 3
  1. 1.University of WashingtonSeattleUSA
  2. 2.Gdansk University of TechnologiesGdanskPoland
  3. 3.Institute of Computer Information TechnologiesTernopil Academy of EconomyTernopilUkraine

Bibliographic information

  • DOI https://doi.org/10.1007/1-4020-3381-8
  • Copyright Information Springer 2005
  • Publisher Name Springer, Dordrecht
  • eBook Packages Computer Science
  • Print ISBN 978-1-4020-3379-7
  • Online ISBN 978-1-4020-3381-0
  • Series Print ISSN 1568-2609