메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-290

Foundations of security: What every programmer needs to know

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84889956367     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4302-0377-3     Document Type: Book
Times cited : (49)

References (152)
  • 3
    • 70350750399 scopus 로고    scopus 로고
    • Advanced SQL injection in SQL server applications
    • Anley, Chris. 2002. Advanced SQL injection in SQL Server applications. Next Generation Security Software, www.ngssoftware.com/papers/advanced-sql- injection.pdf.
    • (2002) Next Generation Security Software
    • Anley, C.1
  • 12
    • 84889966195 scopus 로고    scopus 로고
    • Oblivious key escrow. 2002
    • Cambridge, U.K., May 30-June 1, 1996, Proceedings (LNCS 1174) Berlin: SpringerVerlag
    • Blaze, Matt. Oblivious key escrow. 2002. In Information Hiding: First International Workshop, Cambridge, U.K., May 30-June 1, 1996, Proceedings (LNCS 1174), 335-343. Berlin: SpringerVerlag.
    • Information Hiding: First International Workshop , pp. 335-343
    • Matt, B.1
  • 13
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • Boneh, Dan. 1999. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS 46 (2): 203-213.
    • (1999) Notices of the AMS , vol.46 , Issue.2 , pp. 203-213
    • Dan, B.1
  • 16
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing StackGuard and stack-shield
    • Bulba and Killar. 2000. Bypassing StackGuard and Stack-Shield. Phrack Magazine 56 (5). www.phrack.org/archives/56/p56-0x05.
    • (2000) Phrack Magazine , vol.56 , Issue.5
    • Bulba1    Killar2
  • 17
    • 84889994247 scopus 로고    scopus 로고
    • Cross site reference forgery
    • Burns, Jesse. 2005. Cross site reference forgery. Information Security Partners, www.isecpartners.com/files/XSRF-Paper-0.pdf.
    • (2005) Information Security Partners
    • Burns, J.1
  • 18
    • 4244062863 scopus 로고    scopus 로고
    • Authenticated byzantine fault tolerance without public-key cryptography
    • MIT Laboratory for Computer Science, June
    • Castro, Miguel, and Barbara Liskov. 1999a. Authenticated Byzantine fault tolerance without public-key cryptography. Technical Memo MIT/LCS/TM-589, MIT Laboratory for Computer Science, June. www.pmg.lcs.mit.edu/~castro/tm589.pdf.
    • (1999) Technical Memo MIT/LCS/TM-589
    • Castro, M.1    Liskov, B.2
  • 21
    • 0019636432 scopus 로고
    • Current strategies for computer auditing within an organisation
    • Chambers, A D. 1981. Current strategies for computer auditing within an organisation. Computer Journal 24 (4): 290-294.
    • (1981) Computer Journal , vol.24 , Issue.4 , pp. 290-294
    • Chambers, A.D.1
  • 23
    • 50149108469 scopus 로고    scopus 로고
    • CNNMoney.com, May 23
    • CNN/Money 2005. Bank security breach may be biggest yet. CNNMoney.com, May 23. http://money.cnn.com/2005/05/23/news/fortune500/bank-info.
    • (2005) Bank Security Breach May be Biggest Yet
  • 24
    • 0029732592 scopus 로고    scopus 로고
    • Non-repudiation with mandatory proof of receipt
    • Coffey, Tom, and Puneet Saidha. 1996. Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Computer Communication Review 26 (1): 6-17.
    • (1996) ACM SIGCOMM Computer Communication Review , vol.26 , Issue.1 , pp. 6-17
    • Tom, C.1    Saidha, P.2
  • 25
    • 84956860375 scopus 로고    scopus 로고
    • Experimenting with electronic commerce on the PalmPilot
    • Anguilla, British West Indies, February 1999, Proceedings (LNCS 1648), ed. Matthew K. Franklin Berlin: Springer-Verlag
    • Daswani, Neil, and Dan Boneh. 1999. Experimenting with electronic commerce on the PalmPilot. In Financial Cryptography: Third International Conference, FC '99, Anguilla, British West Indies, February 1999, Proceedings (LNCS 1648), ed. Matthew K. Franklin, 1-16. Berlin: Springer-Verlag.
    • (1999) Financial Cryptography: Third International Conference, FC '99 , pp. 1-16
    • Neil, D.1    Boneh, D.2
  • 26
    • 0020707921 scopus 로고
    • Applying the RSA digital signature to electronic mail
    • Davies, Donald W. 1983. Applying the RSA digital signature to electronic mail. IEEE Computer 16 (2): 55-62.
    • (1983) IEEE Computer , vol.16 , Issue.2 , pp. 55-62
    • Davies Donald, W.1
  • 27
    • 84889961901 scopus 로고
    • Quality auditing: The necessary step towards the required quality objectives
    • Stockholm, Sweden, May 1990, Proceedings (LNCS 436), ed. Bo Steinholtz, Arne Solvberg, and Lars Bergman Berlin: Springer-Verlag
    • -. 1990. Quality auditing: The necessary step towards the required quality objectives. In Advanced Information Systems Engineering: Second Nordic Conference CAiSE '90, Stockholm, Sweden, May 1990, Proceedings (LNCS 436), ed. Bo Steinholtz, Arne Solvberg, and Lars Bergman, 286. Berlin: Springer-Verlag.
    • (1990) Advanced Information Systems Engineering: Second Nordic Conference CAiSE '90 , pp. 286
    • Davies Donald, W.1
  • 30
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusiondetection systems
    • Debar, Herve, Marc Dacier, and Andreas Wespi. 1999. Towards a taxonomy of intrusiondetection systems. Computer Networks 31 (8): 805-822.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 33
  • 34
    • 84889975749 scopus 로고    scopus 로고
    • White house web site hacked by anti NATO hactivists?
    • March 30
    • Dennis, Sylvia, and Steve Gold. 1999. White House web site hacked by anti NATO hactivists? Newsbytes, March 30. wwwfindarticles.com/p/articles/mi-m0HDN/ is-1999-March-30/ai-54275915.
    • (1999) Newsbytes
    • Dennis, S.1    Gold, S.2
  • 38
    • 84889957805 scopus 로고    scopus 로고
    • August 3
    • Evers, Joris. 2005. Key bugs in core Linux code squashed. CNET News, August 3. http://news.com.com/Key+bugs+in+core+Linux+code+squashed/2100-1002-3- 5817471.html.
    • (2005) Key Bugs in Core Linux Code Squashed
    • Evers, J.1
  • 48
    • 33846540174 scopus 로고    scopus 로고
    • Ajax: A new approach to web applications
    • February 18
    • Garrett, Jesse James. 2005. Ajax: A new approach to web applications. Adaptive Path, February 18 www.adaptivepath.com/publications/essays/archives/ 000385.php.
    • (2005) Adaptive Path
    • Garrett, J.J.1
  • 50
    • 84889954513 scopus 로고
    • Extract from a speech given at the Zurich Seminar, Zurich, Switzerland, April
    • Gordon, John. 1984. The story of Alice and Bob. Extract from a speech given at the Zurich Seminar, Zurich, Switzerland, April. www.conceptlabs.co.uk/ alicebob.html.
    • (1984) The Story of Alice and Bob
    • John, G.1
  • 51
    • 0008629555 scopus 로고
    • A comparison of the byzantine agreement problem and the transaction commit problem
    • ed. Barbara Simons and Alfred Spector Berlin: Springer-Verlag
    • Gray, Jim. 1990. A comparison of the Byzantine agreement problem and the transaction commit problem. In Fault-Tolerant Distributed Computing (LNCS 448), ed. Barbara Simons and Alfred Spector, 10-17. Berlin: Springer-Verlag.
    • (1990) Fault-Tolerant Distributed Computing (LNCS 448) , pp. 10-17
    • Jim, G.1
  • 53
    • 24144435668 scopus 로고    scopus 로고
    • Hold your sessions: An attack on java session-ID generation
    • San Francisco, California, USA, February 14-18, 2005, Proceedings (LNCS 3376) Berlin: Springer-Verlag
    • Gutterman, Zvi, and Dahlia Malkhi. 2005. Hold your sessions: An attack on Java session-ID generation. In Topics in Cryptography - CT-RSA 2005: The Cryptographers' Track at the RSA Conference 2005, San Francisco, California, USA, February 14-18, 2005, Proceedings (LNCS 3376), 44-57. Berlin: Springer-Verlag.
    • (2005) Topics in Cryptography - CT-RSA 2005: The Cryptographers' Track at the RSA Conference 2005 , pp. 44-57
    • Zvi, G.1    Malkhi, D.2
  • 54
    • 0020802462 scopus 로고
    • Audit considerations in distributed processing systems
    • Hansen, James V 1983. Audit considerations in distributed processing systems. Communications of the ACM 26 (8): 562-569.
    • (1983) Communications of the ACM , vol.26 , Issue.8 , pp. 562-569
    • Hansen James, V.1
  • 60
    • 84914715638 scopus 로고
    • Audit trail organization in relational databases
    • Jajodia, Sushil, Shashi K. Gadia, Gautam Bhargava, and Edgar H. Sibley. 1989. Audit trail organization in relational databases. DBSec 1989: 269-281.
    • (1989) DBSec , vol.1989 , pp. 269-281
    • Jajodia, S.1    Gadia, S.K.2    Bhargava, G.3    Sibley, E.H.4
  • 64
    • 84957640277 scopus 로고
    • Failsafe key escrow
    • Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith Berlin: Springer-Verlag
    • Kilian, Joseph, and Tom Leighton. 1995. Failsafe key escrow. In Advances in Cryptology - CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith, 208-221. Berlin: Springer-Verlag.
    • (1995) Advances in Cryptology - CRYPTO '95:15Th Annual International Cryptology Conference , pp. 208-221
    • Kilian, J.1    Leighton, T.2
  • 66
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • Anguilla, British West Indies, February 1998, Proceedings (LNCS 1465), ed. Rafael Hirschfeld Berlin: Springer-Verlag
    • Kocher, Paul. 1998. On certificate revocation and validation. In Financial Cryptography: Second International Conference, FC '98, Anguilla, British West Indies, February 1998, Proceedings (LNCS 1465), ed. Rafael Hirschfeld, 172-177. Berlin: Springer-Verlag.
    • (1998) Financial Cryptography: Second International Conference, FC '98 , pp. 172-177
    • Paul, K.1
  • 67
    • 84889968906 scopus 로고    scopus 로고
    • Temporal firewalls
    • Presented at Schloss Reisensburg, Germany
    • Kopetz, Hermann. 1996. Temporal firewalls. Presented at DeVa 1st Selective Open Workshop, Schloss Reisensburg, Germany.
    • (1996) DeVa 1st Selective Open Workshop
    • Kopetz, H.1
  • 71
    • 0020780905 scopus 로고
    • The weak byzantine generals problem
    • Lamport, Leslie. 1983. The weak Byzantine generals problem. Journal of the ACM 30 (3): 668-676.
    • (1983) Journal of the ACM , vol.30 , Issue.3 , pp. 668-676
    • Lamport, L.1
  • 78
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive intrusion detection: A data mining approach
    • -. 2000. Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review 14 (6): 533-567.
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1
  • 81
    • 84947439162 scopus 로고
    • A key escrow system with warrant bounds
    • Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith Berlin: Springer-Verlag
    • Lenstra, Arjen K., Peter Winkler, and Yacov Yacobi. 1995. A key escrow system with warrant bounds. In Advances in Cryptology - CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1995, Proceedings (LNCS 963), ed. Don Coppersmith, 197-207. Berlin: Springer-Verlag.
    • (1995) Advances in Cryptology - CRYPTO '95:15Th Annual International Cryptology Conference , pp. 197-207
    • Lenstra Arjen, K.1    Winkler, P.2    Yacobi, Y.3
  • 84
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • -. 1993. A survey of intrusion detection techniques. Computers and Security 12 (4): 405-418.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt Teresa, F.1
  • 86
    • 84889982641 scopus 로고    scopus 로고
    • Imperva, September
    • Maor, Ofer, and Amichai Shulman. 2003. Blind SQL injection. Imperva, September. www.imperva.com/application-defense-center/white-papers/blind-sql- server-injection.html.
    • (2003) Blind SQL Injection
    • Ofer, M.1    Shulman, A.2
  • 87
    • 84959047912 scopus 로고    scopus 로고
    • A multi-party optimistic non-repudiation protocol
    • Seoul, Korea, December 8-9, 2000, Proceedings (LNCS 2015), ed. Dongho Won Berlin: Springer-Verlag
    • Markowitch, Olivier, and Steve Kremer. 2001. A multi-party optimistic non-repudiation protocol. In Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings (LNCS 2015), ed. Dongho Won, 109-122. Berlin: Springer-Verlag.
    • (2001) Information Security and Cryptology - ICISC 2000, Third International Conference , pp. 109-122
    • Markowitch, O.1    Kremer, S.2
  • 90
    • 0033885757 scopus 로고    scopus 로고
    • Windowed certificate revocation
    • McDaniel, Patrick, and Sugih Jamin. 2000. Windowed certificate revocation. INFOCOM (3), 1406-1414.
    • (2000) INFOCOM , Issue.3 , pp. 1406-1414
    • McDaniel, P.1    Jamin, S.2
  • 92
    • 84889962544 scopus 로고    scopus 로고
    • Make your software behave: Learning the basics of buffer overflows
    • March 1
    • McGraw, Gary, and John Viega. 2000. Make your software behave: Learning the basics of buffer overflows. IBM developerWorks, March 1.
    • (2000) IBM DeveloperWorks
    • McGraw, G.1    Viega, J.2
  • 93
    • 84969346266 scopus 로고
    • A certified digital signature
    • Santa Barbara, California, USA, August 20-24, 1989, Proceedings (LNCS 435), ed. Gilles Brassard Berlin: Springer-Verlag
    • Merkle, Ralph C. 1990. A certified digital signature. In Advances in Cryptology - CRYPTO '89:9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings (LNCS 435), ed. Gilles Brassard, 218-238. Berlin: Springer-Verlag.
    • (1990) Advances in Cryptology - CRYPTO '89:9Th Annual International Cryptology Conference , pp. 218-238
    • Merkle Ralph, C.1
  • 98
    • 0003757663 scopus 로고
    • Internet standard RFC 1034 (updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, and 4035), November
    • Mockapetris, P.V 1987. Domain names - concepts and facilities. Internet standard RFC 1034 (updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, and 4035), November. www.ietf.org/rfc/ rfc1034.txt.
    • (1987) Domain Names - Concepts and Facilities
    • Mockapetris, P.V.1
  • 103
    • 0018543411 scopus 로고
    • Password security: A case history
    • Morris, Robert, and Ken Thompson. 1979. Password security: A case history. Communications of the ACM 22 (11): 594-597.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 106
    • 4244131492 scopus 로고    scopus 로고
    • Auditing issues in secure database management systems
    • National Computer Security Center May
    • National Computer Security Center. 1996. Auditing issues in secure database management systems. National Computer Security Center Technical Report - 005, vol. 4/5, May.
    • (1996) National Computer Security Center Technical Report - 005 , vol.4-5
  • 107
    • 0030270929 scopus 로고    scopus 로고
    • A public-key-based key escrow system
    • Nechvatal, James. 1996. A public-key-based key escrow system. Journal of Systems and Software 35 (1): 73-83.
    • (1996) Journal of Systems and Software , vol.35 , Issue.1 , pp. 73-83
    • Nechvatal, J.1
  • 109
    • 0031140709 scopus 로고    scopus 로고
    • Internet security: Firewalls and beyond
    • Oppliger, Rolf. 1997. Internet security: Firewalls and beyond. Communications of the ACM 40 (5): 92-102.
    • (1997) Communications of the ACM , vol.40 , Issue.5 , pp. 92-102
    • Rolf, O.1
  • 111
  • 112
    • 0023207670 scopus 로고
    • The design of an effective auditing subsystem
    • Oakland, CA: IEEE Computer Society Press
    • Picciotto, Jeffery. 1987. The design of an effective auditing subsystem. In IEEE Symposium on Security and Privacy, 13-22. Oakland, CA: IEEE Computer Society Press.
    • (1987) IEEE Symposium on Security and Privacy , pp. 13-22
    • Picciotto, J.1
  • 115
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • January
    • Ptacek, Thomas H., and Timothy N. Newsham. 1998. Insertion, evasion, and denial of service: Eluding network intrusion detection. Secure Networks, Technical Report, January.
    • (1998) Secure Networks, Technical Report
    • Ptacek Thomas, H.1    Newsham, T.N.2
  • 116
    • 0347802687 scopus 로고
    • Digital signatures
    • ed. Richard DeMillo, David Dobkin, Anita Jones, and Richard Lipton New York: Academic Press
    • Rabin, Michael O. 1978. Digital signatures. In Foundations of Secure Computation, ed. Richard DeMillo, David Dobkin, Anita Jones, and Richard Lipton, 155-168. New York: Academic Press.
    • (1978) Foundations of Secure Computation , pp. 155-168
    • Rabin Michael, O.1
  • 117
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • -. 1979. Digitalized signatures and public-key functions as intractable as factorization. MIT Technical Report, MIT/LCS/TR-212.
    • (1979) MIT Technical Report, MIT/LCS/TR-212
    • Rabin Michael, O.1
  • 120
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., A. Shamir, and L. Adelman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM21 (2): 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adelman, L.3
  • 124
    • 0005276660 scopus 로고    scopus 로고
    • Tamperproof audit logs as a forensics tool for intrusion detection systems
    • Schneier, Bruce, and John Kelsey. 1999. Tamperproof audit logs as a forensics tool for intrusion detection systems. Computer Networks and ISDN Systems.
    • (1999) Computer Networks and ISDN Systems
    • Schneier, B.1    Kelsey, J.2
  • 125
    • 84890006151 scopus 로고
    • Auditing large scale data bases
    • Scott, George M. 1977. Auditing large scale data bases. VLDB, 515-522.
    • (1977) VLDB , pp. 515-522
    • Scott George, M.1
  • 128
    • 84889983090 scopus 로고
    • Partial key escrow: A new approach to software key escrow
    • Presented at Washington, DC
    • Shamir, Adi. 1995. Partial key escrow: A new approach to software key escrow. Presented at Key Escrow Conference, Washington, DC.
    • (1995) Key Escrow Conference
    • Adi, S.1
  • 129
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • Shannon, Colleen, and David Moore. 2004. The spread of the Witty worm. IEEE Security & Privacy 2 (4): 46-50.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 131
    • 84889855627 scopus 로고    scopus 로고
    • Spett, Kevin. 2005. Blind SQL injection. SPI Dynamics, www.spidynamics.com/whitepapers/Blind-SQLInjection.pdf.
    • (2005) Blind SQL Injection
    • Spett, K.1
  • 135
    • 58049152987 scopus 로고    scopus 로고
    • Impact of software vulnerability announcements on the market value of software vendors: An empirical investigation
    • Kennedy School of Government, Harvard University
    • Telang, Rahul, and Sunil Wattal. 2005. Impact of software vulnerability announcements on the market value of software vendors: An empirical investigation. In Fourth Workshop on the Economics of Information Security, Kennedy School of Government, Harvard University.
    • (2005) Fourth Workshop on the Economics of Information Security
    • Telang, R.1    Wattal, S.2
  • 139
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Santa Barbara, California, USA, August 2005, Proceedings (LNCS 3621) Berlin: Springer-Verlag
    • Wang, Xiaoyun, Yiqun Lisa Yin, and Hongbu Yu. 2005. Finding collisions in the full SHA-1. In Advances in Cryptology - CRYPTO 2005:25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 2005, Proceedings (LNCS 3621), 17-36. Berlin: Springer-Verlag.
    • (2005) Advances in Cryptology - CRYPTO 2005:25Th Annual International Cryptology Conference , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 140
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: Apeer-based intrusion detection system
    • White, Gregory B., Eric A Fisch, and Udo W Pooch. 1996. Cooperating security managers: Apeer-based intrusion detection system. IEEE Network 10 (1): 20-23.
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White Gregory, B.1    Fisch, E.A.2    Pooch, U.W.3
  • 150
    • 0039311188 scopus 로고    scopus 로고
    • Towards verification of non-repudiation protocols
    • edited by Jim Grundy, Mart. In Schwenke, and Trevor Vickers Berlin: Springer-Verlag
    • -. 1998. Towards verification of non-repudiation protocols. In International Refinement Workshop and Formal Methods Pacific '98, edited by Jim Grundy, Mart. In Schwenke, and Trevor Vickers, 370-380. Berlin: Springer-Verlag.
    • (1998) International Refinement Workshop and Formal Methods Pacific '98 , pp. 370-380
    • Zhou, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.