Wiley.com

Contributors, Volume I

The Handbook of Information Security, Volume I
Key Concepts, Infrastructure, Standards and Protocols
Contents

Part 1: Key Concepts and Applications related to Information Security

1. Internet Basics


Hossein Bidgoli
California State University, Bakersfield

2. Digital Economy

Nirvikar Singh
University of California, Santa Cruz

3. Online Retail Banking: Security Concerns, Breaches, and Controls

Kent Belasco
First Midwest Bank, Itasca, IL

Siaw-Peng Wan
Elmhurst College

4. Digital Libraries: Security and Preservation Considerations

Cavan McCarthy
Louisiana State University

5. E-Mail and Instant Messaging

Bhagyavati
Columbus State University

6. Internet Relay Chat

Paul L. Witt
Texas Christian University

7. Online Communities

Lee Sproull
New York University

8. Groupware: Risks, Threats, and Vulnerabilities in the Internet Age

Pierre Balthazard
Arizona State University

John Warren
University of Texas, San Antonio

9. Search Engines: Security, Privacy and Ethical Issues

Raymond Wisman
Indiana University Southeast

10. Web Services

Akhil Sahai
Hewlett-Packard Laboratories, Palo-Alto, CA

Sven Graupner
Hewlett-Packard Laboratories, Palo-Alto, CA

Wooyoung Kim
University of Illinois, Urbana-Champaign

11. Electronic Commerce

Charles Steinfield
Michigan State University

12. EDI Security

Matthew K. McGowan
Bradley University

13. Electronic Payment Systems

Indrajit Ray
Colorado State University

14. Intranets: Principals, Privacy and Security Considerations

William T. Schiano
Bentley College

15. Extranets: Applications, Development, Security and Privacy

Stephen W. Thorpe
Neumann College

16. Business-to-Business Electronic Commerce

Julian J. Ray
University of Redlands

17. Click-and-Brick Electronic Commerce

Charles Steinfield
Michigan State University

18. Mobile Commerce

Vijay Atluri
Rutgers University

19. E-education and Information Privacy and Security

William K. Jackson
Southern Oregon University

20. Security in E-Learning

Edgar R. Weippl
Vienna University of Technology, Vienna, Austria

21. E-Government

Shannon Schelin
The University of North Carolina, Chapel Hill

G. David Garson
North Carolina State University

22. E-government Security Issues and Measures

William C. Barker
National Institute of Standards and Technology

23. International Security Issues of E-Government

Karin Geiselhart
University of Canberra, Australia

Part 2: Infrastructure for the Internet, Computer Networks and Secure Information Transfer

24. Conducted Communications Media

Thomas L. Pigg
Jackson State Community College

25. Routers and Switches

Hans-Peter Dommel
Santa Clara University

26. Radio Frequency and Wireless Communications Security

Okechukwu Ugweje
The University of Akron

27. Wireless Channels

P. M. Shankar
Drexel University

28. Security in Circuit, Message, and Packet Switching

Robert H Greenfield
Computer Consulting

Daryle P Niedermayer
CGI Group Inc.

29. Digital Communication

Robert W. Heath Jr.
The University of Texas, Austin

Atul A. Salvekar
Intel Corporation

William Bard
The University of Texas, Austin

30. Local Area Networks

Wayne C. Summers
Columbus State University

31. Wide Area and Metropolitan Area Networks

Lynn A. DeNoia
Rensselaer Polytechnic Institute

32. Home Area Networking

Sherali Zeadally
Wayne State University

Priya Kubher
Wayne State University

Nadeem Ansari
Wayne State University

33. Public Network Technologies and Security

Dale R. Thompson
University of Arkansas

Amy W. Apon
University of Arkansas

34. Client/Server Computing: Principles and Security Considerations

Daniel J. McFarland
Rowan University

35. Peer-to-Peer Security

Allan Friedman
Harvard University

L Jean Camp
Harvard University

36. Security Middleware

Linda Volonino
Canisius College

Richard P. Volonino
Canisius College

37. Internet Architecture

Graham Knight
University College London, UK

38. TCP/IP Suite

Prabhaker Mateti
Wright State University

39. Voice over Internet Protocol (VoIP)

Roy Morris
Capitol College

40. Security and Web Quality of Service

Tarek F. Abdelzhaer
University of Virginia

Chengdu Huang
University of Virginia

41. Mobile Devices and Protocols

Min Song
Old Dominion University

42. Bluetooth Technology

Brent A. Miller
IBM Corporation

43. Wireless Local Area Networks

Mohammad S. Obaidat
Monmouth University

G. I. Papadimitriou
Aristotle University, Greece

S. Obeidat
Arizona State University

44. Security in Wireless Sensor Networks

Mohamed Eltoweissy
Virginia Tech

Stephan Olariu
Old Dominion University

Ashraf Wadaa
Old Dominion University

45. Cellular Networks

Jingyuan Zhang
The University of Alabama

Ivan Stojmenovic
University of Ottawa, Ottawa, Ontario

46. Mobile IP

M. Farooque Mesiya
Rensselaer Polytechnic Institute

47. IP Multicast and its Security

Emilia Rosti
Universitŕ degli Studi di Milano, Italy

48. TCP over Wireless Links

Mohsen Guizani
Western Michigan University

Anupama Raju
Western Michigan University

49. Air–Interface Requirements for Mobile Data Services

Harald Haas
International University Bremen (IUB), Germany

50. Wireless Internet: A Cellular Perspective

Abbas Jamalipour
University of Sydney, Australia

51. Security for Satellite Networks

Michele Luglio
University of Rome Tor Vergata, Italy

Antonio Saitto
Telespazio, Italy

52. Security of Broadband Access Networks

Peter L. Heinzmann
University of Applied Sciences, Eastern Switzerland

53. Ad hoc Network Security

Pietro Michiardi
Institut Eurecom, France

Refik Molva
Institut Eurecom, France

Part 3: Standards and Protocols for Secure Information Transfer

54. Standards for Product Security Assessment

István Zsolt Berta
Budapest University of Technology and Economics, Hungary

Levente Buttyán
Budapest University of Technology and Economics, Hungary

István Vajda
Budapest University of Technology and Economics, Hungary

55. Digital Certificates

Albert Levi
Sabanci University, Turkey

56. Internet E-Mail Architecture

Robert Gezelter
Software Consultant

57. PKI (Public Key Infrastructure)

Radia Perlman
Sun Microsystems Laboratories

58. S/MIME (Secure MIME)

Steven J. Greenwald
Independent Information Security Consultant

59. PGP (Pretty Good Privacy)

Stephen A. Weis
Massachusetts Institute of Technology

60. SMTP (Simple Mail Transfer Protocol)

Vladimir V. Riabov
Rivier College

61. Internet Security Standards

Raymond R. Panko
University of Hawai`I, Manoa

62. Kerberos

William Stallings
Independent Consultant

63. IPsec: AH (Authentication Header) and ESP (Encapsulating Security Payload)

Amel Meddeb
National Digital Certification Agency and University of Carthage, Tunisia

N. Boudriga
National Digital Certification Agency and University of Carthage, Tunisia

Mohammad S. Obaidat
Monmouth University

64. IPsec: IKE (Internet Key Exchange)

Charlie Kaufman
Microsoft Corporation

65. Secure Sockets Layer (SSL)

Robert J. Boncella
Washburn University

66. PKCS (Public-Key Cryptography Standards)

Yongge Wang
University of North Carolina, Charlotte

67. Secure Shell (SSH)

Xukai Zou
Purdue University

68. Security and the Wireless Application Protocol (WAP)

Lillian N. Cassel
Villanova University

Cynthia Pandolfo
Villanova University

69. Wireless Network Standards and Protocol (802.11)

Prashant Krishnamurthy
University of Pittsburgh

70. P3P (Platform for Privacy Preferences Project)

Lorrie Faith Cranor
Carnegie Mellon University