DDJ, November 2000 -- Computer Security


FEATURES

KERBEROS VERSUS THE LEIGHTON-MICALI PROTOCOL

by Aviel D. Rubin

Although more complicated, the Leighton-Micali protocol is more elegant, efficient, and secure than the venerable Kerberos security protocol.

THE SET STANDARD & E-COMMERCE

by William Stallings

The Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit-card transactions on the Internet.

SECURITY PROTOCOLS AND PERFORMANCE

by Linden DeCarmo

Security protocols can be performance assassins. Linden examines several multimedia security protocols, and explains why they can devastate performance.

SECURITY ANALYSIS & DESIGN

by Uttara Nerurkar

The security-design techniques Uttara presents here provide a way of modeling security by extending the functional model of the system, instead of divorcing one from the other.

WINDOWS 2000 SECURITY DESCRIPTORS

by Marcelo Calbucci

Central to Windows 2000 security are Security Descriptors -- structures and associated data that contain the security information for securable objects.

MULTILANGUAGE PROGRAMMING

by David Wendt

David presents a technique that lets multiple language resources be built into a single resource DLL and automatically referenced by Windows applications.

STRANGERS IN THE NIGHT

by Wietse Venema

There's no telling what intruders might leave behind when they break into your system overnight. Wietse describes how he analyzed an unknown program left behind by one intruder.

ROBOT CONTROL AND COLBERT

by Kurt Konolige, Jeanne Dietsch, and William Kennedy

Robot control programs take a robot's sensory input, process it, and decide which motor actions the robot will perform. Our authors use the Colbert sequencer language to develop control code.

EMBEDDED SYSTEMS

EXCEPTION HANDLING IN C WITHOUT C++

by Tom Schotland and Peter Petersen

Error handling is an important issue in embedded systems, and can account for a substantial portion of a project's code. Our authors describe how they designed and implemented an exception-handling library.

INTERNET PROGRAMMING

WEBDAV, IIS, & ISAPI FILTERS

by Martin Hallerdal

The web-based Distributed Authoring and Versioning (WebDAV) specification defines a set of extensions to the HTTP protocol that let you collaboratively edit and manage files on remote web servers.

PROGRAMMER'S TOOLCHEST

THE OPENCV LIBRARY

by Gary Bradski

OpenCV is an open-source, computer-vision library for extracting and processing meaningful data from images.

COLUMNS

PROGRAMMING PARADIGMS

by Michael Swaine

To hear Michael talk about it, you'd think interactive toys and open source are kid's stuff.

C PROGRAMMING

by Al Stevens

Al gets back on track in updating his Quincy IDE that hosts the GNU C/C++ compiler suite of tools on the Win32 platform.

JAVA Q&A

by Mike Jennings

How can you establish a network connection using Java? Mike shows how.

ALGORITHM ALLEY

by Alexander Ananiev

Generic tree traversal logic can be used with any type of tree-like structure or tree node, letting you focus on the application logic rather than the internals of the tree structure organization.

DR. ECCO'S OMNIHEURIST CORNER

by Dennis E. Shasha

Making money is the challenge Ecco and Liane are faced with this month.

PROGRAMMER'S BOOKSHELF

by Gregory V. Wilson

This month Greg looks at Programming Pearls, Second Edition, by Jon Bentley; Foundations of Multithreaded, Parallel, and Distributing Programming, by Gregory R. Andrews; GUI Bloopers, by Jeff Johnson; The Humane Interface, by Jef Raskin; Legal Battles That Shaped the Software Industry, by Lawrence D. Graham; The World of Scripting Languages, by David Barron; C for Java Programmers, by Tomasz Muldner; and XML Elements of Style, by Simon St. Laurent.

FORUM

EDITORIAL

by Jonathan Erickson

LETTERS

by you

NEWS & VIEWS

by Nicholas Baran

OF INTEREST

by Shannon Cochran

SWAINE'S FLAMES

by Michael Swaine