Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Anderson, James

Fort Washington, Pennsylvania
  Follow this Reviewer
Date Reviewed  
- 10 of 23 reviews

  Information hiding: steganography and watermarking--attacks and countermeasures
Johnson N., Duric Z., Jajodia S.,  Kluwer Academic Publishers, Norwell, MA, 2001. 137 pp. Type: Book (9780792372042)

This book is the first volume in a series entitled Advances in Information Security. The goal of the series is to capture the state of the art, set the course for future research and serve as a central reference for information security rese...

Feb 1 2002  
  Configuring role-based access control to enforce mandatory and discretionary access control policies
Osborn S., Sandhu R., Munawer Q.  ACM Transactions on Information and System Security 3(2): 85-106, 2000. Type: Article

The authors show that a particular set of role-based access control (RBAC) models, known as RBAC96, can be used to define a variety of lattice-based access controls (LBACs), an abstraction and generalization of what is also known as the hierarchic...

Feb 1 2001  
  Cryptography and network security (2nd ed.)
Stallings W.,  Prentice-Hall, Inc., Upper Saddle River, NJ, 1999.Type: Book (9780138690175), Reviews: (2 of 2)

The problems of network security are many and varied. It is to Stallings’s credit that he has attempted to cover such a broad and deep subject in one book. The result is wonderfully informative: it covers the nooks and crannies of modern cry...

Jan 1 1999  
  Secure computing
Summers R.,  McGraw-Hill, Inc., Hightstown, NJ, 1997.Type: Book (9780070694194)

What a nice book! Summers undertook an ambitious project aimed at pulling together all of the relevant aspects of secure computing, and she has succeeded admirably. She has aimed the book at computer professionals, management, and students, and ha...

Sep 1 1997  
  Commercial key recovery
Walker S., Lipner S., Ellison C., Balenson D.  Communications of the ACM 39(3): 41-47, 1996. Type: Article

A workable method for providing a key recovery capability for files and other long-term data items that are encrypted with a per-item key is offered....

Dec 1 1996  
  Network and internetwork security
Stallings W.,  Prentice-Hall, Inc., Upper Saddle River, NJ, 1995.Type: Book (9780024154835)

Stallings covers the basics of network and Internet security by illuminating the issues and the technical responses to problems of network security. The book has ten chapters in two parts: “Internetwork Security Principles” and “...

Apr 1 1996  
  Does licensing require new access control techniques?
Hauser R.  Communications of the ACM 37(11): 48-55, 1994. Type: Article

Hauser raises the problem of whether the notion of document licensing requires new techniques for access control. The author distinguishes between two kinds of licensing: consumptive licensing, which requires prepayment for the service or trusted ...

Oct 1 1995  
  Schemes for slot reuse in CRMA
Sharon O., Segall A.  IEEE/ACM Transactions on Networking 2(3): 269-278, 1994. Type: Article

Several schemes for slot reuse in CRMA are discussed. The schemes, unsurprisingly, depend on the assumptions about the traffic load. Two methods are discussed extensively--a region scheme and an address scheme. Simulation results are given fo...

Oct 1 1995  
  FDDI handbook
Jain R. (ed),  Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1994.Type: Book (9780201563764)

This great book is not only a Fiber Distributed Data Interface (FDDI) handbook, as advertised, but it covers enough of the lower-speed protocols and standards to convey a wide and sweeping overview of the general topic of network design and protoc...

Aug 1 1995  
  Internet Privacy Enhanced Mail
Kent S.  Communications of the ACM 36(8): 48-60, 1993. Type: Article

Kent discusses PEM, PSRG, IAB, RFC, SRI, OSI, LAN, UA, MTA, POP, TCP, IP, SMTP, UI, MIME, X400, X500, BITNET, UUNET, RFC 822, RFC 821, RFC 1423, CCITT, X509, ISO, MIC, CRL, ASCII, ANSI, MD5, RSA, DEK, DES, CBC, CA, IPRA, DCA, RFC 1422, MIC-ONLY, a...

Nov 1 1994  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy