Foilset Search Full Index for Basic foilset

Remarks on Java and Internet Security

Given by Geoffrey C. Fox at Web Certificate CPS616 Enhancement on Summer 1997 . Foils prepared August 4 1997

General Issues
Review of Java Security Mechanisms
"Gossip": Examples of Security problems of various sorts from malicious to annoying
Cryptography: including RSA Public Keys
Authentication and Digital Certificates
Implications for Commerce (the SET system)
Web Servers and Secure Sockets SSL
Some relevant technologies including Kerberos, S/MIME&#060 Clipper, PEM and PGP


Table of Contents for Remarks on Java and Internet Security

There are two types of foils -- html and image which are each available in basic and JavaScript enabled "focused" style
(basic:)(focus style:) Denote Foils where Image Critical
(basic:)(focus style:) Denote Foils where HTML is sufficient

1 Remarks on Internet and Java Security CPS616 Certificate Version Summer 97
2 Abstract of CPS616 Java and Internet Security Presentation
3 Some Reference Material
4 Some General Issues I
5 Some General Issues II
6 Need for Security in Commerce - I
7 Need for Security in Commerce - II
8 Structure of Internet and Security-I
9 Structure of Internet and Security-II
10 Structure of Internet and Security-III
11 A PKZIP Anecdote
12 Downloading Software is Dangerous?
13 The Moldavia Pornographic Phone Scam
14 An Early Netscape DNS Bug
15 Tempest and Control Zones
16 Military Security Levels
17 Firewalls and Gateways - I
18 Firewalls and Gateways II
19 Encrypted Tunnels
20 The Great Clipper Controversy
21 Export Restrictions on Cryptography
22 Denial of Service versus "Attacks"
23 Comments on Denial of Service
24 Some Attacking Concepts
25 Naïve way Viruses Spread themselves
26 The Java Security Model
27 What can applets do - I?
28 What can applets do - II?
29 What can applets do - III?
30 The Byte Code Verifier
31 Byte Code Verification
32 Why is type checking important!
33 Applet Class Loader
34 Java Security Manager
35 Introduction to Cryptography
36 Breaking an Encryption Scheme
37 Types of Cryptographic Function
38 Security Uses of Cryptography
39 Secret Key Cryptography
40 Uses of Secret Key Cryptography
41 Secret Key Authentication
42 Message Integrity with Secret Key Cryptography
43 Public Key Cryptography
44 Insecure Link Transmission with Public Key Cryptography
45 Authentication with public key Cryptography
46 Digital Signatures and Public Key Cryptography
47 Use of Digital Signatures with public key Cryptography
48 Hash and Message Digests
49 Some Math Behind Secret Key Cryptography
50 Some Math behind RSA Algorithm -I
51 Some Math behind RSA Algorithm -II
52 Certificate Authorities
53 Sample Certificate from Netscape
54 VeriSign Digital ID's or Certificates - I
55 VeriSign Digital ID's or Certificates - II
56 VeriSign's Description of Digital ID's
57 VeriSign's Description of Certificate Revocation I
58 VeriSign's Description of Certificate Revocation II
59 Secure Electronic Transaction SET
60 Electronic Shopping Experience - I
61 Electronic Shopping Experience - II
62 Features of SET - I
63 Features of SET - II
64 SET Encryption Summary
65 Sample SET Cryptography Use
66 Sample SET Cryptography Steps 2 to 5
67 Sample SET Cryptography Step 6
68 Sample SET Cryptography Steps 7-10
69 Structure of Public Key System in SET
70 Features of Public Key System in SET - I
71 Features of Public Key System in SET - II
72 Cardholder Registration Process in SET
73 Merchant Registration Process in SET
74 Purchase Request Process in SET
75 Payment Authorization and Capture Processes in SET
76 SSL and S/MIME
77 SSL from Netscape I
78 SSL from Netscape II
79 SSL from Netscape III
80 Netscape's Description of S/MIME
81 Some Other Security Systems
82 SESAME Security System
83 Globus System Security Policy and Requirements -- Overview
84 Further Properties of Globus Entities
85 Globus Application Requirements
86 Relevant Components of Globus
87 Issues in the Globus Security Model
88 Elements of Globus Security Policy I
89 Elements of Globus Security Policy II
90 Globus Security Functional Requirements - I
91 Globus Security Functional Requirements - II

Full WebWisdom URL and this Foilset Search
This contains all WebWisdom links preceded by those referenced in this foilset
© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed Apr 1 1998