Foilset Search Full Index for Basic foilset

Basic Principles of Java and Internet Security

Given by Geoffrey C. Fox at CPS616 Web Technologies on Spring 98. Foils prepared April 7 1998

General Issues
Review of Java Security Mechanisms
"Gossip": Examples of Security problems of various sorts from malicious to annoying
Cryptography: including RSA Public Keys
Authentication and Digital Certificates
Java/JavaScript and Security
Implications for Commerce (the SET system)
Web Servers and Secure Sockets SSL
Some relevant technologies including Kerberos, S/MIME, Clipper, PEM and PGP


Table of Contents for Basic Principles of Java and Internet Security

There are two types of foils -- html and image which are each available in basic and JavaScript enabled "focused" style
(basic:)(focus style:) Denote Foils where Image Critical
(basic:)(focus style:) Denote Foils where HTML is sufficient

1 Remarks on Internet and Java Security CPS616 Web Technology Course Spring 98
2 Abstract of CPS616 Java and Internet Security Presentation
3 Some Reference Material
4 Some General Issues I
5 Some General Issues II
6 Need for Security in Commerce - I
7 Need for Security in Commerce - II
8 Structure of Internet and Security-I
9 Structure of Internet and Security-II
10 Structure of Internet and Security-III
11 A PKZIP Anecdote
12 Downloading Software is Dangerous?
13 The Moldavia Pornographic Phone Scam
14 An Early Netscape DNS Bug
15 Tempest and Control Zones
16 Military Security Levels
17 Firewalls and Gateways - I
18 Firewalls and Gateways II
19 Encrypted Tunnels
20 The Great Clipper Controversy
21 Export Restrictions on Cryptography
22 Denial of Service versus "Attacks"
23 Combining Denial of Service with more Malicious Attack
24 Comments on Denial of Service
25 Some Attacking Concepts
26 Naïve way Viruses Spread themselves
27 Introduction to Cryptography
28 Breaking an Encryption Scheme
29 Types of Cryptographic Function
30 Security Uses of Cryptography
31 Secret Key Cryptography
32 Uses of Secret Key Cryptography
33 Secret Key Authentication
34 Message Integrity with Secret Key Cryptography
35 Public Key Cryptography
36 Insecure Link Transmission with Public Key Cryptography
37 Authentication with public key Cryptography
38 Digital Signatures and Public Key Cryptography
39 Use of Digital Signatures with public key Cryptography
40 Hash and Message Digests
41 Some Math Behind Secret Key Cryptography
42 Some Math behind RSA Algorithm -I
43 Some Math behind RSA Algorithm -II
44 Certificate Authorities
45 Review of Certificate Process
46 Sample Certificate from Netscape
47 VeriSign Digital ID's or Certificates - I
48 VeriSign Digital ID's or Certificates - II
49 VeriSign's Description of Digital ID's
50 VeriSign's Description of Certificate Revocation I
51 VeriSign's Description of Certificate Revocation II
52 The Java Security Model
53 Sandbox mechanism
54 What can applets do - I?
55 What can applets do - II?
56 What can applets do - III?
57 The Byte Code Verifier
58 Byte Code Verification
59 Why is type checking important!
60 Applet Class Loader
61 Secure Electronic Transaction SET
62 Electronic Shopping Experience - I
63 Electronic Shopping Experience - II
64 Features of SET - I
65 Features of SET - II
66 SET Encryption Summary
67 Sample SET Cryptography Use
68 Sample SET Cryptography Steps 2 to 5
69 Sample SET Cryptography Step 6
70 Sample SET Cryptography Steps 7-10
71 Structure of Public Key System in SET
72 Features of Public Key System in SET - I
73 Features of Public Key System in SET - II
74 Cardholder Registration Process in SET
75 Merchant Registration Process in SET
76 Purchase Request Process in SET
77 Payment Authorization and Capture Processes in SET
78 SSL and S/MIME
79 SSL from Netscape I
80 SSL from Netscape II
81 SSL from Netscape III
82 Netscape's Description of S/MIME
83 Generating Certificates on Unix-1
84 Generating Certificates on Unix-2
85 Sample Certificate and primary Key
86 Secure Server Example-NPAC Grading System-1
87 Secure Server Example-NPAC Grading System-2
88 Secure Server Example-NPAC Grading System-3
89 Secure Server Example-NPAC Grading System-4
90 Java Security Manager
91 Java Security Package
92 Java Digital Signatures-1
93 Java Digital Signatures-2
94 The Java Authentication Framework
95 The Java Authentication Framework-2
96 Generating Certificates in JDK
97 Generating Certificates in JDK-2
98 Browsing Signed Applets
99 Some Other Security Systems
100 SESAME Security System
101 Details on SESAME I
102 Details on SESAME II
103 The GSS-API Security Interface
104 Globus System Security Policy and Requirements -- Overview
105 Further Properties of Globus Entities
106 Globus Application Requirements
107 Relevant Components of Globus
108 Issues in the Globus Security Model
109 Elements of Globus Security Policy I
110 Elements of Globus Security Policy II
111 Globus Security Functional Requirements - I
112 Globus Security Functional Requirements - II
113 JavaScript Security Model
114 JavaScript Security Issues
115 Same Origin Policy
116 Signed Script Policy-1
117 Signed Script Policy-2
118 Signed Script Policy-3
119 Codebase Principals-1
120 Codebase Principals-2
121 Scripts Signed by Different Principals
122 Principals of Windows and Layers
123 Determining Container Principals
124 Identifying Signed Scripts
125 Using Expanded Privileges
126 Targets
127 Targets-2
128 Importing and Exporting Functions
129 Weaknesses in the JavaScript Model
130 Signing Scripts
131 Signing Scripts-2
132 Signing Scripts-3
133 Signing Scripts-4

Full WebWisdom URL and this Foilset Search
This contains all WebWisdom links preceded by those referenced in this foilset
© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Apr 6 1998