Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Trust in cyberspace
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Trust in cyberspace

Trust in cyberspace

Fred B. Schneider

342 pages, parution le 31/12/1998

Résumé

In this text, experts from industry and academia provide a detailed assessment of the current state of the art for building trustworthy networked information systems. They propose new directions for research in computer and network security, software technology and system architecture.

Summary of contents
INTRODUCTION

  • Trustworthy Networked Information Systems
  • What Erodes Trust
  • This Study in Context
  • Scope of This Study
  • References
PUBLIC TELEPHONE NETWORK AND INTERNET TRUSTWORTHINESS
  • Network Design
  • The Public Telephone Network
  • Network Services and Design
  • Authentication
  • The Internet
  • Network Services and Design
  • Authentication (and other Security Protocols)
  • Findings
  • Network Failures and Fixes
  • Environmental Disruption
  • Link Failures
  • Congestion
  • Findings
  • Operational Errors
  • Findings
  • Software and Hardware Failures
  • Finding
  • Malicious Attacks
  • Attacks on the Telephone Network
  • Routing Attacks
  • Database Attacks
  • Facilities
  • Findings
  • Attacks on the Internet
  • Name Server Attacks
  • Routing System Attacks
  • Protocol Design and Implementation Flaws
  • Findings
  • Emerging Issues
  • Internet Telephony
  • Finding
  • Is the Internet Ready for "Prime Time"?
  • Findings
  • References
SOFTWARE FOR NETWORKED INFORMATION SYSTEMS
  • Introduction
  • Background
  • The Role of Software
  • Development of a Networked Information System
  • System Planning, Requirements, and Top-level Design
  • Planning and Program Management
  • Requirements at the Systems Level
  • Background
  • The System Requirements Document
  • Notation and Style
  • Where to Focus Effort in Requirements Analysis and Documentation
  • Top-Level Design
  • Critical Components
  • The Integration Plan
  • Project Structure, Standards, and Process
  • Barriers to Acceptance of New Software Technologies
  • Findings
  • Building and Acquiring Components
  • Component-level Requirements
  • Component Design and Implementation
  • Programming Languages
  • Systematic Reuse
  • Commercial Off-the-Shelf Software
  • The Changing Role of COTS Software
  • General Problems with COTS Components
  • Interfacing Legacy Software
  • Findings
  • Integrating Components into a Trustworthy System
  • System Integration
  • System Assurance
  • Review and Inspection
  • Formal Methods
  • Testing
  • System Evolution
  • Findings
  • References
REINVENTING SECURITY
  • Introduction
  • Evolution of Security Needs and Mechanisms
  • Access Control Policies
  • Shortcomings of Formal Policy Models
  • A New Approach
  • Findings
  • Identification and Authentication Mechanisms
  • Network-based Authentication
  • Cryptographic Authentication
  • Token-based Mechanisms
  • Biometric Techniques
  • Findings
  • Cryptography and Public-Key Infrastructure
  • Findings
  • The Key-Management Problem
  • Key-Distribution Centers
  • Certification Authorities
  • Actual Deployments of Large-scale Key-Distribution Centers and
  • Certification Authorities
  • Public-Key Infrastructure
  • Findings
  • Network Access Control Mechanisms
  • Closed User Groups
  • Virtual Private Networks
  • Firewalls
  • Limitations of Firewalls
  • Guards
  • Findings
  • Foreign Code and Application-level Security
  • The ActiveX Approach
  • The Java Approach
  • Findings
  • Fine-grained Access Control and Application Security
  • Findings
  • Language-based Security: Software Fault Isolation and
  • Proof-carrying Code
  • Findings
  • Denial of Service
  • Findings
  • References
TRUSTWORTHY SYSTEMS FROM UNTRUSTWORTHY COMPONENTS
  • Replication and Diversity
  • Amplifying Reliability
  • Amplifying Security
  • Findings
  • Monitor, Detect, Respond
  • Limitations in Detection
  • Response and Reconfiguration
  • Perfection and Pragmatism
  • Findings
  • Placement of Trustworthiness Functionality
  • Public Telephone Network
  • Internet
  • Minimum Essential Information Infrastructure
  • Findings
  • Nontraditional Paradigms
  • Finding
  • References
THE ECONOMIC AND PUBLIC POLICY CONTEXT
  • Risk Management
  • Risk Assessment
  • Nature of Consequences
  • Risk Management Strategies
  • Selecting a Strategy
  • Findings
  • Consumers and Trustworthiness
  • Consumer Costs
  • Direct Costs
  • Indirect Costs
  • Failure Costs
  • Imperfect Information
  • Issues Affecting Risk Management
  • Some Market Observations
  • Findings
  • Producers and Trustworthiness
  • The Larger Marketplace and the Trend Toward Homogeneity
  • Risks of Homogeneity
  • Producers and Their Costs
  • Costs of Integration and Testing
  • Identifying the Specific Costs Associated with Trustworthiness
  • Time to Market
  • Other Issues
  • The Market for Trustworthiness
  • Supply and Demand Considerations
  • Findings
  • Standards and Criteria
  • The Character and Context of Standards
  • Standards and Trustworthiness
  • Security-based Criteria and Evaluation
  • Findings
  • Cryptography and Trustworthiness
  • Export Controls
  • Key Recovery
  • Factors Inhibiting Widespread Deployment of Cryptography
  • Cryptography and Confidentiality
  • Findings
  • Federal Government Interests in NIS Trustworthiness
  • Public-Private Partnerships
  • The Changing Market-Government Relationship
  • Findings
  • The Roles of the NSA, DARPA, and other Federal Agencies in NIS
  • Trustworthiness Research and Development
  • National Security Agency
  • Partnerships with Industry
  • R2 Program
  • Issues for the Future
  • Findings
  • Defense Advanced Research Projects Agency
  • Issues for the Future
  • Findings
  • References
CONCLUSIONS AND RESEARCH RECOMMENDATIONS
  • Protecting the Evolving Public Telephone Network and the Internet
  • Meeting the Urgent Need for Software That Improves Trustworthiness
  • Reinventing Security for Computers and Communications
  • Building Trustworthy Systems from Untrustworthy Components
  • Social and Economic Factors That Inhibit the Deployment of Trustworthy Technology
  • Implementing Trustworthiness Research and Development
APPENDIXES
  • A Study Committee Biographies
  • B Briefers to the Committee
  • C Workshop Participants and Agendas
  • D List of Position Papers Prepared for the Workshops
  • E Trends in Software
  • F Some Related Trustworthiness Studies
  • G Some Operating System Security Examples
  • H Types of Firewalls
  • I Secrecy of Design
  • J Research in Information System Security and Survivability Funded by the NSA and DARPA
  • K Glossary
INDEX

Caractéristiques techniques

  PAPIER
Éditeur(s) The National Academies Press
Auteur(s) Fred B. Schneider
Parution 31/12/1998
Nb. de pages 342
EAN13 9780309065580

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription