Find this at http://www.npac.syr.edu/users/gcf/uccsecurity97/

Remarks on Java and Internet Security

Given by Geoffrey C. Fox at Web Certificate CPS616 Enhancement on Summer 1997 . Foils prepared August 4 1997

General Issues
Review of Java Security Mechanisms
"Gossip": Examples of Security problems of various sorts from malicious to annoying
Cryptography: including RSA Public Keys
Authentication and Digital Certificates
Implications for Commerce (the SET system)
Web Servers and Secure Sockets SSL
Some relevant technologies including Kerberos, S/MIME&#060 Clipper, PEM and PGP


Table of Contents for Remarks on Java and Internet Security


001 Remarks on Internet and Java Security CPS616 Certificate Version 
    Summer 97
002 Abstract of CPS616 Java and Internet Security Presentation
003 Some Reference Material
004 Some General Issues I
005 Some General Issues II
006 Need for Security in Commerce - I
007 Need for Security in Commerce - II
008 Structure of Internet and Security-I
009 Structure of Internet and Security-II
010 Structure of Internet and Security-III
011 A PKZIP Anecdote
012 Downloading Software is Dangerous?
013 The Moldavia Pornographic Phone Scam
014 An Early Netscape DNS Bug
015 Tempest and Control Zones
016 Military Security Levels
017 Firewalls and Gateways - I
018 Firewalls and Gateways II
019 Encrypted Tunnels
020 The Great Clipper Controversy
021 Export Restrictions on Cryptography
022 Denial of Service versus "Attacks"
023 Comments on Denial of Service
024 Some Attacking Concepts
025 Naïve way Viruses Spread themselves
026 The Java Security Model
027 What can applets do - I?
028 What can applets do - II?
029 What can applets do - III?
030 The Byte Code Verifier
031 Byte Code Verification
032 Why is type checking important!
033 Applet Class Loader
034 Java Security Manager
035 Introduction to Cryptography
036 Breaking an Encryption Scheme
037 Types of Cryptographic Function
038 Security Uses of Cryptography
039 Secret Key Cryptography
040 Uses of Secret Key Cryptography
041 Secret Key Authentication
042 Message Integrity with Secret Key Cryptography
043 Public Key Cryptography
044 Insecure Link Transmission with Public Key Cryptography
045 Authentication with public key Cryptography
046 Digital Signatures and Public Key Cryptography
047 Use of Digital Signatures with public key Cryptography
048 Hash and Message Digests
049 Some Math Behind Secret Key Cryptography
050 Some Math behind RSA Algorithm -I
051 Some Math behind RSA Algorithm -II
052 Certificate Authorities
053 Sample Certificate from Netscape
054 VeriSign Digital ID's or Certificates - I
055 VeriSign Digital ID's or Certificates - II
056 VeriSign's Description of Digital ID's
057 VeriSign's Description of Certificate Revocation I
058 VeriSign's Description of Certificate Revocation II
059 Secure Electronic Transaction SET
060 Electronic Shopping Experience - I
061 Electronic Shopping Experience - II
062 Features of SET - I
063 Features of SET - II
064 SET Encryption Summary
065 Sample SET Cryptography Use
066 Sample SET Cryptography Steps 2 to 5
067 Sample SET Cryptography Step 6
068 Sample SET Cryptography Steps 7-10
069 Structure of Public Key System in SET
070 Features of Public Key System in SET - I
071 Features of Public Key System in SET - II
072 Cardholder Registration Process in SET
073 Merchant Registration Process in SET
074 Purchase Request Process in SET
075 Payment Authorization and Capture  Processes in SET
076 SSL and S/MIME
077 SSL from Netscape I
078 SSL from Netscape II
079 SSL from Netscape III
080 Netscape's Description of S/MIME
081 Some Other Security Systems
082 SESAME Security System
083 Globus System Security Policy and Requirements -- Overview
084 Further Properties of Globus Entities
085 Globus Application Requirements
086 Relevant Components of Globus
087 Issues in the Globus Security Model
088 Elements of Globus Security Policy I
089 Elements of Globus Security Policy II
090 Globus Security Functional Requirements - I
091 Globus Security Functional Requirements - II


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed Apr 1 1998