Cover image for Internet and wireless security
Title:
Internet and wireless security
Series:
BTexact communications technology series ; 4
Publication Information:
London : Institution of Electrical Engineers, 2002
ISBN:
9780852961971

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010098347 TK5105.59 I55 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.

Coverage includes XML security mechanisms and next generation Public Key Infrastructures (PKIs), as well as digital archiving and wireless security, which is set to be a huge growth area with the full roll-out of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking.

This book is essential reading for professionals, researchers and managers involved in the implementation of security in communications systems.


Table of Contents

M Hogg and S M Bouch and M F G SmeatonA SelkirkA SelkirkM R C SimsK P Bosworth and N TedeschiI LevyT WrightC W BlanchardN T Trask and S A JaweedD W ParkinsonD J Gooch and S D Hubbard and M W Moore and J HillG Shorrock and C AwdryC J Colwill and M C Todd and G P Fielder and C NatansonM Rejman-GreeneM A Sasse and S Brostoff and D WeirichM J Kenning
Prefacep. xi
Introductionp. xiii
Contributorsp. xv
1 Building on Rock Rather Than Sandp. 1
1.1 Introduction to iTrust and the eBusiness Environmentp. 1
1.2 Benefits of an Integrated Approach?p. 3
1.3 Architecturep. 3
1.4 Architecture Overviewp. 4
1.5 Authentication and Authorisationp. 7
1.6 Implementing the Architecturep. 11
1.7 Summaryp. 20
2 XML and Securityp. 21
2.1 Introductionp. 21
2.2 A Brief History of XMLp. 21
2.3 An XML Primerp. 23
2.4 The Benefits of XMLp. 25
2.5 XML Technologiesp. 25
2.6 XML Digital Signaturesp. 31
2.7 Problems with XML Signaturep. 40
2.8 Uses for XML Signaturep. 40
2.9 XML Encryptionp. 41
2.10 Summaryp. 43
3 Using XML Security Mechanismsp. 45
3.1 Introductionp. 45
3.2 Web Servicesp. 45
3.3 Web Service Protocolsp. 47
3.4 Public Key Infrastructure in a Web Service Environmentp. 49
3.5 New Security Problemsp. 54
3.6 XML Security Servicesp. 55
3.7 XML Key Management Specificationp. 57
3.8 Security Assertion Markup Languagep. 59
3.9 XML Access Controlp. 59
3.10 Summaryp. 61
4 Security Modelling Languagep. 63
4.1 Introductionp. 63
4.2 Why Model a System's Security?p. 63
4.3 Scope of the SecMLp. 64
4.4 Overview of the Modelling Approachp. 65
4.5 Building a Modelp. 65
4.6 Summaryp. 69
Appendix A Element Classesp. 70
Appendix B Element Class Diagramsp. 85
Appendix C SecML Element Namesp. 89
Appendix D Example SecML Diagramsp. 92
5 Public Key Infrastructures--the Next Generationp. 95
5.1 Introductionp. 95
5.2 A Brief History of Public Key Infrastructuresp. 96
5.3 The Main Problem with a PKI is ...p. 105
5.4 Other PKI Problemsp. 106
5.5 Current Solutions to Globalisationp. 112
5.6 Certificate Validationp. 115
5.7 Better Solutions for the Futurep. 117
5.8 Summaryp. 119
6 An Overview of Identifier-Based Public Key Cryptographyp. 121
6.1 Introductionp. 121
6.2 Traditional PKC versus Identifier-Based PKCp. 122
6.3 The Cocks IDPKC Methodp. 123
6.4 Key Semanticsp. 127
6.5 An Example Usage Scenariop. 130
6.6 Summaryp. 131
7 Secure Digital Archiving of High-Value Datap. 133
7.1 Introductionp. 133
7.2 Technologyp. 134
7.3 Secure Digital Archivingp. 140
7.4 Summaryp. 144
8 Wireless Securityp. 147
8.1 Introductionp. 147
8.2 Security Mechanisms in 3G for the CS and PS Domainp. 148
8.3 Security Mechanisms in 3G for the IM Domainp. 155
8.4 Is There a Role for PKI in 3G?p. 159
8.5 Summaryp. 161
9 Adapting Public Key Infrastructures to the Mobile Environmentp. 163
9.1 Introductionp. 163
9.2 WAP Overviewp. 163
9.3 WAP Securityp. 165
9.4 The Reality of Implementing a WAP PKIp. 169
9.5 Summaryp. 169
10 TETRA Securityp. 171
10.1 Introductionp. 171
10.2 Terminology and Environmentp. 172
10.3 The Need for Securityp. 172
10.4 The TETRA Security Modelp. 173
10.5 Direct Mode Operationp. 177
10.6 Cryptographyp. 178
10.7 End-to-End Encryptionp. 180
10.8 TETRA Security in Practicep. 183
10.9 Beyond the Standardp. 184
10.10 Summaryp. 185
11 Firewalls--Evolve or Diep. 187
11.1 Introductionp. 187
11.2 The Traditional Security Solution--Firewallsp. 188
11.3 The Changing Business Model and Role of the Firewallp. 189
11.4 Protocol Tunnellingp. 190
11.5 IPsecp. 192
11.6 IPsec VPNsp. 194
11.7 Extending Security to the Desktopp. 195
11.8 Firewall and VPN Policy Managementp. 196
11.9 The Futurep. 200
11.10 Summaryp. 201
12 The Ignite Managed Firewall and VPN Servicep. 203
12.1 Introductionp. 203
12.2 The Ignite Managed Firewall Servicep. 204
12.3 Summaryp. 214
13 Information Assurancep. 215
13.1 Introductionp. 215
13.2 A Brave New World--New Ways of Doing Businessp. 215
13.3 Evolving Threats and Risksp. 216
13.4 Information Warfarep. 218
13.5 Established Security and Risk Management Processesp. 218
13.6 What is Different About the Information Assurance Focus?p. 219
13.7 IA Threat and Risk Analysisp. 221
13.8 Using the IA Protagonist Modelp. 222
13.9 Detecting and Reacting to Attackp. 226
13.10 Benefits to Customersp. 226
13.11 Future Developmentp. 227
14 Biometrics--Real Identities for a Virtual Worldp. 229
14.1 Introductionp. 229
14.2 Using Biometric Systemsp. 231
14.3 Performance and Testing Issuesp. 234
14.4 Security of Biometric Devices and Systemsp. 236
14.5 Legal and Acceptability Issuesp. 237
14.6 Standardisation Activities--Evidence of a Maturing Technologyp. 238
14.7 The Future of Biometric Methods of Authenticationp. 238
15 Transforming the 'Weakest Link'--a Human-Computer Interaction Approach to Usable and Effective Securityp. 243
15.1 Introductionp. 243
15.2 Technologyp. 245
15.3 Userp. 248
15.4 Goals and Tasksp. 255
15.5 Contextp. 256
15.6 Summaryp. 258
16 Security Management Standard--ISO 17799/BS7799p. 263
16.1 Introductionp. 263
16.2 The Standardp. 264
16.3 Case Study--Certification of the SETTp. 265
16.4 Technical Implicationsp. 267
16.5 Commercial Advantagep. 269
16.6 Summaryp. 271
Acronymsp. 273
Indexp. 281