Table of Contents
Remarks on Internet and Java SecurityCPS616 Certificate VersionSummer 97
Abstract of CPS616 Java and Internet Security Presentation
Some Reference Material
Some General Issues I
Some General Issues II
Need for Security in Commerce - I
Need for Security in Commerce - II
Structure of Internet and Security-I
Structure of Internet and Security-II
Structure of Internet and Security-III
A PKZIP Anecdote
Downloading Software is Dangerous?
The Moldavia Pornographic Phone Scam
An Early Netscape DNS Bug
Tempest and Control Zones
Military Security Levels
Firewalls and Gateways - I
Firewalls and Gateways II
Encrypted Tunnels
The Great Clipper Controversy
Export Restrictions on Cryptography
Denial of Service versus “Attacks”
Comments on Denial of Service
Some Attacking Concepts
Naïve way Viruses Spread themselves
The Java Security Model
What can applets do - I?
What can applets do - II?
What can applets do - III?
The Byte Code Verifier
Byte Code Verification
Why is type checking important!
Applet Class Loader
Java Security Manager
Introduction to Cryptography
Breaking an Encryption Scheme
Types of Cryptographic Function
Security Uses of Cryptography
Secret Key Cryptography
Uses of Secret Key Cryptography
Secret Key Authentication
Message Integrity with Secret Key Cryptography
Public Key Cryptography
Insecure Link Transmission with Public Key Cryptography
Authentication with public key Cryptography
Digital Signatures and Public Key Cryptography
Use of Digital Signatures with public key Cryptography
Hash and Message Digests
Some Math Behind Secret Key Cryptography
Some Math behind RSA Algorithm -I
Some Math behind RSA Algorithm -II
Certificate Authorities
Sample Certificate from Netscape
VeriSign Digital ID’s or Certificates - I
VeriSign Digital ID’s or Certificates - II
VeriSign’s Description of Digital ID’s
VeriSign’s Description of Certificate Revocation I
VeriSign’s Description of Certificate Revocation II
Secure Electronic Transaction SET
Electronic Shopping Experience - I
Electronic Shopping Experience - II
Features of SET - I
Features of SET - II
SET Encryption Summary
Sample SET Cryptography Use
Sample SET Cryptography Steps 2 to 5
Sample SET Cryptography Step 6
Sample SET Cryptography Steps 7-10
Structure of Public Key System in SET
Features of Public Key System in SET - I
Features of Public Key System in SET - II
Cardholder Registration Process in SET
Merchant Registration Process in SET
Purchase Request Process in SET
Payment Authorization and Capture Processes in SET
SSL and S/MIME
SSL from Netscape I
SSL from Netscape II
SSL from Netscape III
Netscape’s Description of S/MIME
Some Other Security Systems
SESAME Security System
Globus System Security Policy and Requirements -- Overview
Further Properties of Globus Entities
Globus Application Requirements
Relevant Components of Globus
Issues in the Globus Security Model
Elements of Globus Security Policy I
Elements of Globus Security Policy II
Globus Security Functional Requirements - I
Globus Security Functional Requirements - II
|