skip to main content
Skip header Section
Security Engineering: A Guide to Building Dependable Distributed SystemsApril 2008
Publisher:
  • Wiley Publishing
ISBN:978-0-470-06852-6
Published:14 April 2008
Pages:
1080
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.

Cited By

  1. Herranz-Oliveros D, Marsa-Maestre I, Gimenez-Guzman J, Tejedor-Romero M and de la Hoz E (2024). Surgical immunization strategies against lateral movement in Active Directory environments, Journal of Network and Computer Applications, 222:C, Online publication date: 1-Feb-2024.
  2. Durán C, Fernández-Campusano C, Carrasco R and Carrillo E (2024). DMLBC, Journal of King Saud University - Computer and Information Sciences, 36:1, Online publication date: 1-Jan-2024.
  3. ACM
    Lopez T, Sharp H, Bandara A, Tun T, Levine M and Nuseibeh B (2022). Security Responses in Software Development, ACM Transactions on Software Engineering and Methodology, 32:3, (1-29), Online publication date: 31-Jul-2023.
  4. Soderi S, Masti D and Lun Y (2023). Railway Cyber-Security in the Era of Interconnected Systems: A Survey, IEEE Transactions on Intelligent Transportation Systems, 24:7, (6764-6779), Online publication date: 1-Jul-2023.
  5. de Carvalho Bertoli G, Alves Pereira Junior L, Saotome O and dos Santos A (2023). Generalizing intrusion detection for heterogeneous networks, Computers and Security, 127:C, Online publication date: 1-Apr-2023.
  6. ACM
    Hicks A Transparency, Compliance, And Contestability When Code Is(n’t) Law Proceedings of the 2022 New Security Paradigms Workshop, (130-142)
  7. Shabbir M, Ahmad F, Shabbir A and Alanazi S (2022). Cognitively managed multi-level authentication for security using Fuzzy Logic based Quantum Key Distribution, Journal of King Saud University - Computer and Information Sciences, 34:4, (1468-1485), Online publication date: 1-Apr-2022.
  8. ACM
    Mehr Nezhad M and Hao F OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks Proceedings of the 37th Annual Computer Security Applications Conference, (375-384)
  9. Daughety N, Pendleton M, Xu S, Njilla L and Franco J vCDS: A Virtualized Cross Domain Solution Architecture MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), (61-68)
  10. ACM
    Wittkotter E WaC Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, (99-109)
  11. Rajasoundaran S, Prabu A, Kumar G, Malla P and Routray S (2021). Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review, Wireless Personal Communications: An International Journal, 120:2, (1895-1919), Online publication date: 1-Sep-2021.
  12. Mazur Z and Pec J The Concept of Information Graphs as a Tool to Identify Vulnerabilities in the Information Map of an Organisation Advances and Trends in Artificial Intelligence. From Theory to Practice, (215-226)
  13. Maliszewski M and Boryczka U Using MajorClust Algorithm for Sandbox-based ATM Security 2021 IEEE Congress on Evolutionary Computation (CEC), (1054-1061)
  14. ACM
    Opaschi O and Vatavu R (2020). Uncovering Practical Security and Privacy Threats for Connected Glasses with Embedded Video Cameras, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 4:4, (1-26), Online publication date: 17-Dec-2020.
  15. Ganesh B and Palmieri P A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks Foundations and Practice of Security, (100-120)
  16. ACM
    Juma N, Huang X and Tripunitara M Forensic Analysis in Access Control Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (1533-1550)
  17. Crick T, Davenport J, Hanna P, Irons A and Prickett T Overcoming the Challenges of Teaching Cybersecurity in UK Computer Science Degree Programmes 2020 IEEE Frontiers in Education Conference (FIE), (1-9)
  18. ACM
    Younis Y and Musbah M A Framework to Protect Against Phishing Attacks Proceedings of the 6th International Conference on Engineering & MIS 2020, (1-6)
  19. Condori-Fernandez N, Suni-Lopez F, Muñante D and Daneva M How Can Personality Influence Perception on Security of Context-Aware Applications? Socio-Technical Aspects in Security and Trust, (3-22)
  20. Zhang X, Wang X, Yun W, Gao C, Han M and Liu H (2020). Pattern‐based software process modeling for dependability, Journal of Software: Evolution and Process, 32:9, Online publication date: 3-Sep-2020.
  21. Tiloca M, Dini G, Rizki K and Raza S (2019). Group rekeying based on member join history, International Journal of Information Security, 19:4, (343-381), Online publication date: 1-Aug-2020.
  22. ACM
    Rodríguez A, Fulp E, John D and Cui J Using evolutionary algorithms and pareto ranking to identify secure virtual local area networks Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, (1512-1519)
  23. Mansour S and Lauf A Hardware Root Of Trust for IoT Security In Smart Home Systems 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), (1-2)
  24. Panda S, Woods D, Laszka A, Fielder A and Panaousis E (2022). Post-incident audits on cyber insurance discounts, Computers and Security, 87:C, Online publication date: 1-Nov-2019.
  25. Buckley O and Nurse J (2019). The language of biometrics, Journal of Information Security and Applications, 47:C, (112-119), Online publication date: 1-Aug-2019.
  26. Lopez T, Sharp H, Tun T, Bandara A, Levine M and Nuseibeh B "Hopefully we are mostly secure" Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, (61-68)
  27. ACM
    Gerault D and Boureanu I Distance bounding under different assumptions Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, (245-248)
  28. ACM
    Hazzard A, Greenhalgh C, Kallionpaa M, Benford S, Veinberg A, Kanga Z and McPherson A Failing with Style Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, (1-14)
  29. ACM
    Laborde R, Bulusu S, Wazan A, Barrère F and Benzekri A Logic-based methodology to help security architects in eliciting high-level network security requirements Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1610-1619)
  30. ACM
    Li W, Wang Y, Li H and Li X P3M Proceedings of the 24th Asia and South Pacific Design Automation Conference, (633-638)
  31. Zhang X, Wang X and Kang Y (2018). Trustworthiness requirement‐oriented software process modeling, Journal of Software: Evolution and Process, 30:12, Online publication date: 12-Dec-2018.
  32. ACM
    Winograd T, Shenoy G, Salmani H, Mahmoodi H, Rafatirad S and Homayoun H (2018). Programmable Gates Using Hybrid CMOS-STT Design to Prevent IC Reverse Engineering, ACM Transactions on Design Automation of Electronic Systems, 23:6, (1-21), Online publication date: 30-Nov-2018.
  33. Ramezan G, Leung C and Wang Z (2018). A Survey of Secure Routing Protocols in Multi-Hop Cellular Networks, IEEE Communications Surveys & Tutorials, 20:4, (3510-3541), Online publication date: 1-Oct-2018.
  34. Claro R, Portêlo J, Pardal M and Pinho R Big Data Privacy by Design Computation Platform Machine Learning, Optimization, and Data Science, (394-405)
  35. ACM
    Rindell K, Ruohonen J and Hyrynsalmi S Surveying Secure Software Development Practices in Finland Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-7)
  36. Wakabayashi S, Maruyama S, Mori T, Goto S, Kinugawa M and Hayashi Y A feasibility study of radio-frequency retroreflector attack Proceedings of the 12th USENIX Conference on Offensive Technologies, (4-4)
  37. (Weber) Dupree J, Lank E and Berry D (2018). A case study of using grounded analysis as a requirement engineering method, Science of Computer Programming, 152:C, (1-37), Online publication date: 15-Jan-2018.
  38. ACM
    Spring J, Moore T and Pym D Practicing a Science of Security Proceedings of the 2017 New Security Paradigms Workshop, (1-18)
  39. Wijayarathna C, Arachchilage N and Slay J A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs Human Aspects of Information Security, Privacy and Trust, (160-173)
  40. Williams E, Beardmore A and Joinson A (2017). Individual differences in susceptibility to online influence, Computers in Human Behavior, 72:C, (412-421), Online publication date: 1-Jul-2017.
  41. ACM
    Saarela M, Hosseinzadeh S, Hyrynsalmi S and Leppänen V Measuring Software Security from the Design of Software Proceedings of the 18th International Conference on Computer Systems and Technologies, (179-186)
  42. Yi S and Zhou Y (2017). Binary-block embedding for reversible data hiding in encrypted images, Signal Processing, 133:C, (40-51), Online publication date: 1-Apr-2017.
  43. Tiloca M, Gehrmann C and Seitz L (2017). On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake, International Journal of Information Security, 16:2, (173-193), Online publication date: 1-Apr-2017.
  44. Mehrnezhad M, Ghaemi Bafghi A, Harati A and Toreini E (2017). PiSHi, International Journal of Information Security, 16:2, (133-149), Online publication date: 1-Apr-2017.
  45. Genkin D, Shamir A and Tromer E (2017). Acoustic Cryptanalysis, Journal of Cryptology, 30:2, (392-443), Online publication date: 1-Apr-2017.
  46. Goyal S, Jabbari S, Kearns M, Khanna S and Morgenstern J Strategic Network Formation with Attack and Immunization Proceedings of the 12th International Conference on Web and Internet Economics - Volume 10123, (429-443)
  47. ACM
    Genkin D, Pachmanov L, Pipman I, Tromer E and Yarom Y ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1626-1638)
  48. ACM
    Ranjan A and Kumar B Three Steps Secure Login Proceedings of the 9th Annual ACM India Conference, (107-114)
  49. ACM
    Damasceno C, Masiero P and Simao A Evaluating test characteristics and effectiveness of FSM-based testing methods on RBAC systems Proceedings of the XXX Brazilian Symposium on Software Engineering, (83-92)
  50. ACM
    Winograd T, Salmani H, Mahmoodi H, Gaj K and Homayoun H Hybrid STT-CMOS designs for reverse-engineering prevention Proceedings of the 53rd Annual Design Automation Conference, (1-6)
  51. ACM
    Genkin D, Pachmanov L, Pipman I, Shamir A and Tromer E (2016). Physical key extraction attacks on PCs, Communications of the ACM, 59:6, (70-79), Online publication date: 23-May-2016.
  52. ACM
    Nadi S, Krüger S, Mezini M and Bodden E Jumping through hoops Proceedings of the 38th International Conference on Software Engineering, (935-946)
  53. Genkin D, Pachmanov L, Pipman I and Tromer E ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs Proceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 9610, (219-235)
  54. ACM
    Ye J, Hu Y and Li X DCPUF Proceedings of the 2016 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (279-279)
  55. González-Burgueño A, Santiago S, Escobar S, Meadows C and Meseguer J Analysis of the PKCS#11 API Using the Maude-NPA Tool Proceedings of the Second International Conference on Security Standardisation Research - Volume 9497, (86-106)
  56. ACM
    Kramer S (2015). Logic of Intuitionistic Interactive Proofs (Formal Theory of Perfect Knowledge Transfer), ACM Transactions on Computational Logic, 16:4, (1-32), Online publication date: 19-Nov-2015.
  57. Mao W, Cai Z, Towsley D and Guan X Probabilistic Inference on Integrity for Access Behavior Based Malware Detection Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404, (155-176)
  58. Uzunov A, Fernandez E and Falkner K (2015). Security solution frames and security patterns for authorization in distributed, collaborative systems, Computers and Security, 55:C, (193-234), Online publication date: 1-Nov-2015.
  59. ACM
    Arzt S, Nadi S, Ali K, Bodden E, Erdweg S and Mezini M Towards secure integration of cryptographic software 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!), (1-13)
  60. ACM
    Heiland R, Koranda S, Marru S, Pierce M and Welch V Authentication and Authorization Considerations for a Multi-tenant Service Proceedings of the 1st Workshop on The Science of Cyberinfrastructure: Research, Experience, Applications and Models, (29-35)
  61. ACM
    Rizvi S, Fong P, Crampton J and Sellwood J Relationship-Based Access Control for an Open-Source Medical Records System Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, (113-124)
  62. Fahrnberger G and Heneis K SecureString 3.0 Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (331-334)
  63. Fahrnberger G Repetition Pattern Attack on Multi-word-containing SecureString 2.0 Objects Proceedings of the 11th International Conference on Distributed Computing and Internet Technology - Volume 8956, (265-277)
  64. Sommestad T, Karlzén H and Hallberg J (2015). A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour, International Journal of Information Security and Privacy, 9:1, (26-46), Online publication date: 1-Jan-2015.
  65. Accorsi R, Lehmann A and Lohmann N (2015). Information leak detection in business process models, Information Systems, 47:C, (244-257), Online publication date: 1-Jan-2015.
  66. Shahrjerdi D, Rajendran J, Garg S, Koushanfar F and Karri R Shielding and securing integrated circuits with sensors Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (170-174)
  67. ACM
    Laszka A, Johnson B, Schöttle P, Grossklags J and Böhme R (2014). Secure Team Composition to Thwart Insider Threats and Cyber-Espionage, ACM Transactions on Internet Technology, 14:2-3, (1-22), Online publication date: 28-Oct-2014.
  68. ACM
    Arnbak A, Asghari H, Van Eeten M and Van Eijk N (2014). Security collapse in the HTTPS market, Communications of the ACM, 57:10, (47-55), Online publication date: 23-Sep-2014.
  69. Genkin D, Pipman I and Tromer E Get Your Hands Off My Laptop Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (242-260)
  70. ACM
    Poller A, Türpe S and Kinder-Kurlanda K An Asset to Security Modeling? Proceedings of the 2014 New Security Paradigms Workshop, (69-82)
  71. ACM
    Arnbak A, Asghari H, Van Eeten M and Van Eijk N (2014). Security Collapse in the HTTPS Market, Queue, 12:8, (30-43), Online publication date: 1-Aug-2014.
  72. Gadelha L and Mattoso M Applying Provenance to Protect Attribution in Distributed Computational Scientific Experiments Revised Selected Papers of the 5th International Provenance and Annotation Workshop on Provenance and Annotation of Data and Processes - Volume 8628, (139-151)
  73. ACM
    Jusko J, Rehak M and Pevny T A memory efficient privacy preserving representation of connection graphs Proceedings of the 1st International Workshop on Agents and CyberSecurity, (1-8)
  74. Macia-Perez F, Lorenzo-Fonseca I and Berna-Martinez J (2014). A formal framework for modelling complex network management systems, Journal of Network and Computer Applications, 40:C, (255-269), Online publication date: 1-Apr-2014.
  75. Diaz J, Arroyo D and Rodriguez F (2014). A formal methodology for integral security design and verification of network protocols, Journal of Systems and Software, 89:C, (87-98), Online publication date: 1-Mar-2014.
  76. Leitner M and Rinderle-Ma S (2014). A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions, Information and Software Technology, 56:3, (273-293), Online publication date: 1-Mar-2014.
  77. ACM
    Hu L, Mayo J and Wallace C An empirical study of three access control systems Proceedings of the 6th International Conference on Security of Information and Networks, (287-291)
  78. ACM
    Helfmeier C, Nedospasov D, Tarnovsky C, Krissler J, Boit C and Seifert J Breaking and entering through the silicon Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (733-744)
  79. ACM
    Sharifi A and Tripunitara M Least-restrictive enforcement of the Chinese wall security policy Proceedings of the 18th ACM symposium on Access control models and technologies, (61-72)
  80. ACM
    Camek A, Buckl C and Knoll A Future cars Proceedings of the 2nd ACM international conference on High confidence networked systems, (17-24)
  81. Csajbók Z Approximation of sets based on partial covering Transactions on Rough Sets XVI, (144-220)
  82. ACM
    McDermott J, Montrose B, Li M, Kirby J and Kang M Separation virtual machine monitors Proceedings of the 28th Annual Computer Security Applications Conference, (419-428)
  83. ACM
    Anderson R Security economics Proceedings of the 28th Annual Computer Security Applications Conference, (139-144)
  84. Hao F and Clarke D Security analysis of a multi-factor authenticated key exchange protocol Proceedings of the 10th international conference on Applied Cryptography and Network Security, (1-11)
  85. Ochoa M, Jürjens J and Cuéllar J Non-interference on UML state-charts Proceedings of the 50th international conference on Objects, Models, Components, Patterns, (219-235)
  86. Brooke P, Paige R and Power C Approaches to modelling security scenarios with domain-specific languages Proceedings of the 20th international conference on Security Protocols, (41-54)
  87. Mahmood S and Desmedt Y Usable privacy by visual and interactive control of information flow Proceedings of the 20th international conference on Security Protocols, (181-188)
  88. Rührmair U SIMPL systems as a keyless cryptographic and security primitive Cryptography and Security, (329-354)
  89. Aumasson J, Mitrokotsa A and Peris-Lopez P A note on a privacy-preserving distance-bounding protocol Proceedings of the 13th international conference on Information and communications security, (78-92)
  90. ACM
    Dini G and Savino I (2011). LARK, ACM Transactions on Embedded Computing Systems, 10:4, (1-35), Online publication date: 1-Nov-2011.
  91. ACM
    Mahmood S and Desmedt Y Poster Proceedings of the 18th ACM conference on Computer and communications security, (809-812)
  92. ACM
    Zhu F, Carpenter S, Kulkarni A and Kolimi S Reciprocity attacks Proceedings of the Seventh Symposium on Usable Privacy and Security, (1-14)
  93. Rychlik M, Stankiewicz W and Morzynski M Numerical analysis of geometrical features of 3D biological objects, for three-dimensional biometric and anthropometric database Proceedings of the 6th international conference on Universal access in human-computer interaction: users diversity - Volume Part II, (108-117)
  94. Rudolph C Trust areas Proceedings of the 7th international conference on Security and Trust Management, (22-27)
  95. Diaz J, Arroyo D and Rodriguez F An approach for adapting moodle into a secure infrastructure Proceedings of the 4th international conference on Computational intelligence in security for information systems, (214-221)
  96. Anderson R, Bond M, Choudary O, Murdoch S and Stajano F Might financial cryptography kill financial innovation? --- the curious case of EMV Proceedings of the 15th international conference on Financial Cryptography and Data Security, (220-234)
  97. Gunawan L, Kraemer F and Herrmann P A tool-supported method for the design and implementation of secure distributed applications Proceedings of the Third international conference on Engineering secure software and systems, (142-155)
  98. Rührmair U SIMPL systems, or Proceedings of the 37th international conference on Current trends in theory and practice of computer science, (26-45)
  99. Mead N, McDonald J, Allen J, Ardis M, Hilburn T, Kornecki A and Linger R (2010). Development of a Master of Software Assurance Reference Curriculum, International Journal of Secure Software Engineering, 1:4, (18-34), Online publication date: 1-Oct-2010.
  100. ACM
    Gürgens S, Rudolph C, Maña A and Nadjm-Tehrani S Security engineering for embedded systems Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, (1-6)
  101. Moradian E and Håkansson A Controlling security of software development with multi-agent system Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV, (98-107)
  102. ACM
    Evesti A and Pantsar-Syväniemi S Towards micro architecture for security adaptation Proceedings of the Fourth European Conference on Software Architecture: Companion Volume, (181-188)
  103. Van Dijk M and Juels A On the impossibility of cryptography alone for privacy-preserving cloud computing Proceedings of the 5th USENIX conference on Hot topics in security, (1-8)
  104. ACM
    McDermott J and Freitas L Using formal methods for security in the Xenon project Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  105. ACM
    Kramer S, Goré R and Okamoto E (2010). Formal definitions and complexity results for trust relations and trust domains fit for TTPs, the web of trust, PKIs, and ID-based cryptography, ACM SIGACT News, 41:1, (75-98), Online publication date: 1-Mar-2010.
  106. Miede A, Nedyalkov N, Schuller D, Repp N and Steinmetz R Cross-organizational security - the service-oriented difference Proceedings of the 2009 international conference on Service-oriented computing, (72-81)
  107. Patel V, Easley G, Healy D and Chellappa R Compressed sensing for synthetic aperture radar imaging Proceedings of the 16th IEEE international conference on Image processing, (2117-2120)
  108. ACM
    Norman D (2009). THE WAY I SEE ITWhen security gets in the way, Interactions, 16:6, (60-63), Online publication date: 1-Nov-2009.
  109. Gallo R, Kawakami H and Dahab R On device identity establishment and verification Proceedings of the 6th European conference on Public key infrastructures, services and applications, (130-145)
  110. ACM
    Türpe S What is the shape of your security policy? Proceedings of the 2009 workshop on New security paradigms workshop, (23-36)
  111. Dlamini M, Eloff J and Eloff M (2009). Information security, Computers and Security, 28:3-4, (189-198), Online publication date: 1-May-2009.
  112. Siddiqui M, Shaikh R and Hong C Trust-based anonymity framework for wireless mesh networks Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (1638-1642)
  113. Chiola G and Gasti P StemCerts-2 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference, (1390-1396)
  114. ACM
    Khattab S, Mosse D and Melhem R Jamming Mitigation in Multi-Radio Wireless Networks Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-10)
  115. McDermott J, Kirby J, Montrose B, Johnson T and Kang M (2008). Re-engineering Xen internals for higher-assurance security, Information Security Tech. Report, 13:1, (17-24), Online publication date: 1-Jan-2008.
  116. Paar C and Weimerskirch A (2007). Embedded security in a pervasive world, Information Security Tech. Report, 12:3, (155-161), Online publication date: 1-Jan-2007.
  117. Giorgini P, Massacci F and Zannone N Security and trust requirements engineering Foundations of Security Analysis and Design III, (237-272)
  118. Mouratidis H, Giorgini P and Manson G Integrating security and systems engineering Proceedings of the 15th international conference on Advanced information systems engineering, (63-78)
  119. ACM
    Kraft R Designing a distributed access control processor for network services on the Web Proceedings of the 2002 ACM workshop on XML security, (36-52)
  120. ACM
    Wang S, Delavar M, Azad M, Nabizadeh F, Smith S and Hao F Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems, ACM Transactions on Privacy and Security, 0:0
  121. Kroll J, Kohli N and Laskowski P Privacy and Policy in Polystores: A Data Management Research Agenda Heterogeneous Data Management, Polystores, and Analytics for Healthcare, (68-81)
Contributors
  • The University of Edinburgh

Recommendations

Srijith KrishnanNair

Few books on the broad subject of security engineering have achieved the seminal status of this one, first published in 2001 [1]. The first edition is available for free online (http://www.cl.cam.ac.uk/~rja14/book.html). The second edition adds over 400 pages to the already bulging 612-page first edition. The book is divided into three parts. The first part, spanning seven chapters, deals with basic concepts of security engineering. The discussion covers the workings of security protocols, the people angle to security solutions, thoughts on password use, access control from a systems viewpoint, and cryptography. The last two chapters concentrate on problems of distributed systems, namely concurrency, failure resistance, and naming, as well as on the economics of system security. Part 2, the largest of the three, covers a wide range of topics in the area of security, by examining various applications of secure systems. Multilevel security systems are considered in chapter 8, while compartmentalized systems as a means of dealing with sensitive information are discussed in chapter 9. Banking and fraud control systems are presented in the next chapter, and chapter 11 presents a limited discussion on physical security. Chapter 12 reviews monitoring systems, and chapter 13 considers the tradeoff between availability and confidentiality. Security printing and seals-based technology are discussed in the next chapter, followed by biometrics in chapter 15. Chapter 16 deals with tamper resistance in cryptographic hardware, including smartcards. Chapter 17 is on emission security, chapter 18 is on security issues associated with the use of application programming interfaces (APIs), chapter 19 is on electronic warfare, and chapter 20 is on telecommunication systems security. Chapter 21 looks at network security-specifically, attacks and defenses. Chapter 22 looks at the controversial recent technologies associated with digital rights management (DRM) systems. The last chapter in this part looks at a potpourri of applications associated with social networks, gaming, and elections. Part 3 deals with more abstract issues associated with policies and politics (chapter 24), management issues (chapter 25), and system evaluation and assurance (chapter 26). The last chapter provides a conclusion, summarizing the state of secure systems and discussing the need for further research and engineering work to make them more secure. Anderson has expanded on his already comprehensive first edition, and has come up with a formidable, exhaustive, and updated look at the state of security engineering. In the process, he has produced a book that is a must-read for anyone interested in the wide area of system security. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.