DDJ, December 1999 -- Computer Security


FEATURES

ATTACK TREES

by Bruce Schneier

Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Bruce shows how you can use them to improve security by modeling attacks.

MMPC: AN ALGORITHM FOR ENCRYPTING MULTIPLE MESSAGES

by Jim Shapiro and David Shapiro

To encrypt multiple messages in one transmission, Jim and David implement Ron Rivest's chaffing and package transform. Their technique is optimized to minimize memory usage, while making as few passes through the data as possible.

IP SECURITY PROTOCOLS

by Eva Bozoki

The need to address IPv4's lack of security has prompted the release of a number of standards, protocols, and applications.

ELLIPTIC-CURVE CRYPTOGRAPHY

by Andrew D. Fernandes

Andrew compares elliptic-curve cryptography to other cryptosystems. In the process, he shows how elliptic-curve cryptosystems are built.

A WDM IEEE 1394 CONFIGURATION ROM DECODER

by William F. Alexander

Bill updates his DUMPROM utility by presenting a WDM version that runs on Windows 98 and Windows 2000. DUMPROM lets you examine the configuration ROM of any 1394 device.

EMBEDDED SYSTEMS

TEMPORAL MODELS IN UML

by Bruce Powel Douglass and Srini Vasan

The Unified Modeling Language can be used to capture concurrency models and associated parameters. Bruce and Srini show how, then describe schedulability analysis using Rate Monotonic Analysis.

INTERNET PROGRAMMING

XFDL: THE EXTENSIBLE FORMS DESCRIPTION LANGUAGE

by John Boyer

The Extensible Forms Description Language is an XML extension language that addresses key problems involved with doing electronic commerce on the Web.

PROGRAMMER'S TOOLCHEST

PORTING THE SPICE LIBRARY

by Ed Wright

The SPICE library consists of 952 portable Fortran routines with 79,369 lines of executable code and 153,649 comment lines. Ed shares his experiences in porting this large Fortran library to C, then from C to C++.

COLUMNS

PROGRAMMING PARADIGMS

by Michael Swaine

For Michael, James Gleick's new book Faster comes just in time.

C PROGRAMMING

by Al Stevens

Al weathers hurricane Floyd, as he continues to build a C++-based generic, platform-independent graphics library.

JAVA Q&A

by Paul Tremblett

One way to deliver dynamic data content to static HTML pages is by leveraging the power of Java and JavaServer Pages. Paul shows you how.

ALGORITHM ALLEY

by Jon Bentley

Jon is out of sorts, as he grapples with the Merge Sort and similar algorithms this month.

DR. ECCO'S OMNIHEURIST CORNER

by Dennis E. Shasha

Ecco and Liane puzzle over the rules of friendship that exist on the island of Aresia, which has 27 ethnicities -- and each at the other's throats.

PROGRAMMER'S BOOKSHELF

by Eugene Eric Kim

This month, Eugene examines Netscape Time: The Making of a Billion-Dollar Start-Up That Took on Microsoft, by Jim Clark with Owen Edwards; and Competing on Internet Time: Lessons from Netscape and Its Battle with Microsoft, by Michael E. Cusumano and David B. Yoffie.

FORUM

EDITORIAL

by Jonathan Erickson

LETTERS

by you

NEWS & VIEWS

by Nick Baran

OF INTEREST

by Nick Baran and Amy Lincicum

SWAINE'S FLAMES

by Michael Swaine