Contributors, Volume I
Key Concepts, Infrastructure, Standards and Protocols
Contents
Part 1: Key Concepts and Applications related to Information Security
1. Internet Basics
Hossein Bidgoli
California State University, Bakersfield
2. Digital Economy
Nirvikar Singh
University of California, Santa Cruz
3. Online Retail Banking: Security Concerns, Breaches, and Controls
Kent Belasco
First Midwest Bank, Itasca, IL
Siaw-Peng Wan
Elmhurst College
4. Digital Libraries: Security and Preservation Considerations
Cavan McCarthy
Louisiana State University
5. E-Mail and Instant Messaging
Bhagyavati
Columbus State University
6. Internet Relay Chat
Paul L. Witt
Texas Christian University
7. Online Communities
Lee Sproull
New York University
8. Groupware: Risks, Threats, and Vulnerabilities in the Internet Age
Pierre Balthazard
Arizona State University
John Warren
University of Texas, San Antonio
9. Search Engines: Security, Privacy and Ethical Issues
Raymond Wisman
Indiana University Southeast
10. Web Services
Akhil Sahai
Hewlett-Packard Laboratories, Palo-Alto, CA
Sven Graupner
Hewlett-Packard Laboratories, Palo-Alto, CA
Wooyoung Kim
University of Illinois, Urbana-Champaign
11. Electronic Commerce
Charles Steinfield
Michigan State University
12. EDI Security
Matthew K. McGowan
Bradley University
13. Electronic Payment Systems
Indrajit Ray
Colorado State University
14. Intranets: Principals, Privacy and Security Considerations
William T. Schiano
Bentley College
15. Extranets: Applications, Development, Security and Privacy
Stephen W. Thorpe
Neumann College
16. Business-to-Business Electronic Commerce
Julian J. Ray
University of Redlands
17. Click-and-Brick Electronic Commerce
Charles Steinfield
Michigan State University
18. Mobile Commerce
Vijay Atluri
Rutgers University
19. E-education and Information Privacy and Security
William K. Jackson
Southern Oregon University
20. Security in E-Learning
Edgar R. Weippl
Vienna University of Technology, Vienna, Austria
21. E-Government
Shannon Schelin
The University of North Carolina, Chapel Hill
G. David Garson
North Carolina State University
22. E-government Security Issues and Measures
William C. Barker
National Institute of Standards and Technology
23. International Security Issues of E-Government
Karin Geiselhart
University of Canberra, Australia
Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer
24. Conducted Communications Media
Thomas L. Pigg
Jackson State Community College
25. Routers and Switches
Hans-Peter Dommel
Santa Clara University
26. Radio Frequency and Wireless Communications Security
Okechukwu Ugweje
The University of Akron
27. Wireless Channels
P. M. Shankar
Drexel University
28. Security in Circuit, Message, and Packet Switching
Robert H Greenfield
Computer Consulting
Daryle P Niedermayer
CGI Group Inc.
29. Digital Communication
Robert W. Heath Jr.
The University of Texas, Austin
Atul A. Salvekar
Intel Corporation
William Bard
The University of Texas, Austin
30. Local Area Networks
Wayne C. Summers
Columbus State University
31. Wide Area and Metropolitan Area Networks
Lynn A. DeNoia
Rensselaer Polytechnic Institute
32. Home Area Networking
Sherali Zeadally
Wayne State University
Priya Kubher
Wayne State University
Nadeem Ansari
Wayne State University
33. Public Network Technologies and Security
Dale R. Thompson
University of Arkansas
Amy W. Apon
University of Arkansas
34. Client/Server Computing: Principles and Security Considerations
Daniel J. McFarland
Rowan University
35. Peer-to-Peer Security
Allan Friedman
Harvard University
L Jean Camp
Harvard University
36. Security Middleware
Linda Volonino
Canisius College
Richard P. Volonino
Canisius College
37. Internet Architecture
Graham Knight
University College London, UK
38. TCP/IP Suite
Prabhaker Mateti
Wright State University
39. Voice over Internet Protocol (VoIP)
Roy Morris
Capitol College
40. Security and Web Quality of Service
Tarek F. Abdelzhaer
University of Virginia
Chengdu Huang
University of Virginia
41. Mobile Devices and Protocols
Min Song
Old Dominion University
42. Bluetooth Technology
Brent A. Miller
IBM Corporation
43. Wireless Local Area Networks
Mohammad S. Obaidat
Monmouth University
G. I. Papadimitriou
Aristotle University, Greece
S. Obeidat
Arizona State University
44. Security in Wireless Sensor Networks
Mohamed Eltoweissy
Virginia Tech
Stephan Olariu
Old Dominion University
Ashraf Wadaa
Old Dominion University
45. Cellular Networks
Jingyuan Zhang
The University of Alabama
Ivan Stojmenovic
University of Ottawa, Ottawa, Ontario
46. Mobile IP
M. Farooque Mesiya
Rensselaer Polytechnic Institute
47. IP Multicast and its Security
Emilia Rosti
Universitŕ degli Studi di Milano, Italy
48. TCP over Wireless Links
Mohsen Guizani
Western Michigan University
Anupama Raju
Western Michigan University
49. Air–Interface Requirements for Mobile Data Services
Harald Haas
International University Bremen (IUB), Germany
50. Wireless Internet: A Cellular Perspective
Abbas Jamalipour
University of Sydney, Australia
51. Security for Satellite Networks
Michele Luglio
University of Rome Tor Vergata, Italy
Antonio Saitto
Telespazio, Italy
52. Security of Broadband Access Networks
Peter L. Heinzmann
University of Applied Sciences, Eastern Switzerland
53. Ad hoc Network Security
Pietro Michiardi
Institut Eurecom, France
Refik Molva
Institut Eurecom, France
Part 3: Standards and Protocols for Secure Information Transfer
54. Standards for Product Security Assessment
István Zsolt Berta
Budapest University of Technology and Economics, Hungary
Levente Buttyán
Budapest University of Technology and Economics, Hungary
István Vajda
Budapest University of Technology and Economics, Hungary
55. Digital Certificates
Albert Levi
Sabanci University, Turkey
56. Internet E-Mail Architecture
Robert Gezelter
Software Consultant
57. PKI (Public Key Infrastructure)
Radia Perlman
Sun Microsystems Laboratories
58. S/MIME (Secure MIME)
Steven J. Greenwald
Independent Information Security Consultant
59. PGP (Pretty Good Privacy)
Stephen A. Weis
Massachusetts Institute of Technology
60. SMTP (Simple Mail Transfer Protocol)
Vladimir V. Riabov
Rivier College
61. Internet Security Standards
Raymond R. Panko
University of Hawai`I, Manoa
62. Kerberos
William Stallings
Independent Consultant
63. IPsec: AH (Authentication Header) and ESP (Encapsulating Security Payload)
Amel Meddeb
National Digital Certification Agency and University of Carthage, Tunisia
N. Boudriga
National Digital Certification Agency and University of Carthage, Tunisia
Mohammad S. Obaidat
Monmouth University
64. IPsec: IKE (Internet Key Exchange)
Charlie Kaufman
Microsoft Corporation
65. Secure Sockets Layer (SSL)
Robert J. Boncella
Washburn University
66. PKCS (Public-Key Cryptography Standards)
Yongge Wang
University of North Carolina, Charlotte
67. Secure Shell (SSH)
Xukai Zou
Purdue University
68. Security and the Wireless Application Protocol (WAP)
Lillian N. Cassel
Villanova University
Cynthia Pandolfo
Villanova University
69. Wireless Network Standards and Protocol (802.11)
Prashant Krishnamurthy
University of Pittsburgh
70. P3P (Platform for Privacy Preferences Project)
Lorrie Faith Cranor
Carnegie Mellon University