Cryptography and Competition Policy Issues with "Trusted Computing" (Englisch)
- Neue Suche nach: Anderson, R.
- Neue Suche nach: Anderson, R.
In:
COMPUTER SECURITY JOURNAL
;
20
;
1-14
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Cryptography and Competition Policy Issues with "Trusted Computing"
-
Beteiligte:Anderson, R. ( Autor:in )
-
Erschienen in:COMPUTER SECURITY JOURNAL ; 20 ; 1-14
-
Verlag:
- Neue Suche nach: COMPUTER SECURITY INSTITUTE
-
Format / Umfang:14 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 658.478
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 658.478 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 20
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Assessing the Impact of Security Countermeasures to the OrganizationStout, G. A. et al. | 2004
- 1
-
Cryptography and Competition Policy Issues with "Trusted Computing"Anderson, R. et al.
- 1
-
WEB SERVICES - Advanced Web Services Security specifications - While having an OASIS-published standard for securing SOAP messages is a major step forward for anyone developing secure and interoperable Web services, WSS is not sufficient, by itself, to provide all of the needed security functionalities for enterprise applications. Today, new standards are being proposed that define other functionalities such as obtaining security tokens, establishing a secure message context between endpoints, and declaring a Web service's security policies.Gailey, Jeannine Hall et al. | 2004
- 1
-
Advanced Web Services Security SpecificationsGailey, J. H. et al. | 2004
- 1
-
SECURE APPLICATIONS - Securing Web Services - While SOAP messages are usually sent via Hypertext Transport Protocol (HTTP) messages, specifications exist for binding SOAP to both the Simple Mail Transport Protocol (SMTP) and directly to TCP. While these transport protocols provide well-defined and relatively reliable transport for Web service communication, all are notoriously insecure and provide many of the security challenges that must be overcome when implementing Web services.Galley, Jeannine Hall et al. | 2004
- 1
-
Securing Web ServicesGailey, J. H. et al. | 2004
- 1
-
ISSUES AND TRENDS - Cryptography and Competition Policy Issues with "Trusted Computing" - The most significant strategic development in information technology over the past year has been "trusted computing." This is popularly associated with Microsoft's "Palladium" project, recently renamed "NGSCB." In this article, Ross Anderson gives an outline of the technical aspects of "trusted computing" and a sketch of some of the public policy consequences.Anderson, Ross et al. | 2004
- 1
-
INDUSTRY INSIGHT - Assessing the Impact of Security Countermeasures to the OrganizationStout, Glenn A. et al. | 2004
- 9
-
RISK ASSESSMENT - A Process That Means Business - Trying to mandate requirements to managers can be counter-productive. An effective risk assessment process will search for the business needs of the enterprise and will work with the business owners to identify safeguards to meet those needs.Peltier, Tom et al. | 2004
- 9
-
SCRIPTING - Message Triage with Perl - Want to look at lots of different log files using the same tool and without bothering with needless frills? Here's a nice tool that gets it done at the right price.Vossen, J.P. et al. | 2004
- 9
-
A Process That Means BusinessTom / Peltier, J. et al. | 2004
- 9
-
Message Triage with PerlVossen, J. P. et al. | 2004
- 15
-
INDUSTRY INSIGHT - Heaping on "The State of Cyber Security in the United States Government" - In mid-October, Akamai's chief scientist, Dr. F. Thomson Leighton, testified before a hearing of the House Committee on Government Reform. The hearing focused on "The State of Cyber Security in the United States Government" and, not surprisingly, Leighton felt there were some issues. We've reprinted here an appendix of additional information that Leighton provided to the House committee beyond his spoken testimony. The appendix is a short and coherent summary of the issues positioned at a slightly more technical level than the main testimony.Leighton, F.Thomas et al. | 2004
- 15
-
Alert Data: Network Security Monitoring Using SguilBejtlich, R. et al. | 2004
- 15
-
Attack PatternsHoglund, G. / McGraw, G. et al. | 2004
- 15
-
VULNERABILITIES - Alert Data: Network Security Monitoring Using Sguil - This excerpt from the new book The Tao of Network Security Monitoring: Beyond Intrusion Detection presents a powerful new open-source tool that hooks onto tools you're already familiar with, such as Snort.Bejtlich, Richard et al. | 2004
- 15
-
ATTACKS AND COUNTERMEASURES - Attack PatternsHoglund, Greg et al. | 2004
- 15
-
Hearing on "The State of Cyber Security in the United States Government"Leighton, F. T. et al.
- 23
-
ATTACKS AND COUNTERMEASURES - Hacking a SQL Server - In this article, Joel Scambray and Stuart McClure outline how attackers footprint, attack and compromise SQL Server, followed by solutions for mitigating these threats. They begin with a case study outlining common attack methodologies, followed by a more in-depth discussion of SQL security concepts, SQL hacking tools and techniques, and countermeasures. From there, they detail the technologies, tools and tips for making SQL Server secure.Scambray, Joel et al. | 2004
- 23
-
Hacking a SQL ServerScambray, J. / McClure, S. et al.
- 29
-
An Attack on an ISPBranigan, S. et al. | 2004
- 29
-
ATTACKS AND COUNTERMEASURES - An Attack on an ISP - Sometimes the largest cases start by investigating the smallest incidents. A simple phone call from an irritated customer launches an investigation that ultimately stretches all the way to the United Kingdom.Branigan, Steven et al. | 2004
- 33
-
ISSUES & TRENDS - 2004 CSI-FBI Computer Crime and Security Survey - How widespread is computer crime? What financial losses are most common and what defenses are most widely deployed? Do organizations really perform all those audits they talk about? These questions as well as many others are explored in the ninth annual CSI-FBI survey.Gordon, Lawrence A. et al. | 2004
- 33
-
RISK ASSESSMENT - Understanding Risks Through Attack Tree AnalysisIngoldsby, Terrance R. et al. | 2004
- 33
-
Understanding Risks Through Attack Tree AnalysisIngoldsby, T. R. et al. | 2004
- 33
-
2004 CSI/FBI Computer Crime and Security SurveyGordon, L. A. / Loeb, M. P. / Lucyshyn, W. / Richardson, R. et al. | 2004