General Issues |
Review of Java Security Mechanisms |
"Gossip": Examples of Security problems of various sorts from malicious to annoying |
Cryptography: including RSA Public Keys |
Authentication and Digital Certificates |
Implications for Commerce (the SET system) |
Web Servers and Secure Sockets SSL |
Some relevant technologies including Kerberos, S/MIME< Clipper, PEM and PGP |
001 Remarks on Internet and Java Security CPS616 Certificate Version Summer 97 002 Abstract of CPS616 Java and Internet Security Presentation 003 Some Reference Material 004 Some General Issues I 005 Some General Issues II 006 Need for Security in Commerce - I 007 Need for Security in Commerce - II 008 Structure of Internet and Security-I 009 Structure of Internet and Security-II 010 Structure of Internet and Security-III 011 A PKZIP Anecdote 012 Downloading Software is Dangerous? 013 The Moldavia Pornographic Phone Scam 014 An Early Netscape DNS Bug 015 Tempest and Control Zones 016 Military Security Levels 017 Firewalls and Gateways - I 018 Firewalls and Gateways II 019 Encrypted Tunnels 020 The Great Clipper Controversy 021 Export Restrictions on Cryptography 022 Denial of Service versus "Attacks" 023 Comments on Denial of Service 024 Some Attacking Concepts 025 Naïve way Viruses Spread themselves 026 The Java Security Model 027 What can applets do - I? 028 What can applets do - II? 029 What can applets do - III? 030 The Byte Code Verifier 031 Byte Code Verification 032 Why is type checking important! 033 Applet Class Loader 034 Java Security Manager 035 Introduction to Cryptography 036 Breaking an Encryption Scheme 037 Types of Cryptographic Function 038 Security Uses of Cryptography 039 Secret Key Cryptography 040 Uses of Secret Key Cryptography 041 Secret Key Authentication 042 Message Integrity with Secret Key Cryptography 043 Public Key Cryptography 044 Insecure Link Transmission with Public Key Cryptography 045 Authentication with public key Cryptography 046 Digital Signatures and Public Key Cryptography 047 Use of Digital Signatures with public key Cryptography 048 Hash and Message Digests 049 Some Math Behind Secret Key Cryptography 050 Some Math behind RSA Algorithm -I 051 Some Math behind RSA Algorithm -II 052 Certificate Authorities 053 Sample Certificate from Netscape 054 VeriSign Digital ID's or Certificates - I 055 VeriSign Digital ID's or Certificates - II 056 VeriSign's Description of Digital ID's 057 VeriSign's Description of Certificate Revocation I 058 VeriSign's Description of Certificate Revocation II 059 Secure Electronic Transaction SET 060 Electronic Shopping Experience - I 061 Electronic Shopping Experience - II 062 Features of SET - I 063 Features of SET - II 064 SET Encryption Summary 065 Sample SET Cryptography Use 066 Sample SET Cryptography Steps 2 to 5 067 Sample SET Cryptography Step 6 068 Sample SET Cryptography Steps 7-10 069 Structure of Public Key System in SET 070 Features of Public Key System in SET - I 071 Features of Public Key System in SET - II 072 Cardholder Registration Process in SET 073 Merchant Registration Process in SET 074 Purchase Request Process in SET 075 Payment Authorization and Capture Processes in SET 076 SSL and S/MIME 077 SSL from Netscape I 078 SSL from Netscape II 079 SSL from Netscape III 080 Netscape's Description of S/MIME 081 Some Other Security Systems 082 SESAME Security System 083 Globus System Security Policy and Requirements -- Overview 084 Further Properties of Globus Entities 085 Globus Application Requirements 086 Relevant Components of Globus 087 Issues in the Globus Security Model 088 Elements of Globus Security Policy I 089 Elements of Globus Security Policy II 090 Globus Security Functional Requirements - I 091 Globus Security Functional Requirements - II