Databases for finding specific papers and books on computer security.

Most of them are protected and need to be accessed from the UBC network. See the UBC library site for instructions how to access them from other networks.

Computer Security Periodic Publications

Most of them are protected and need to be accessed from the UBC network. See the UBC library site for instructions how to access them from other networks.

Relevant Conferences and Workshops

Recommended Books for Additional Reading

The following list is an extension of the corresponding list from 6.857 Network and Computer Security, Fall 2003 at MIT.

Morrie Gasser, BUILDING A SECURE COMPUTER SYSTEM, Van Nostrand Reinhold, 115 Fifth Avenue, New York, New York 10003, 1988. (available in PDF)
Anderson, Ross. Security Engineering -- A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001.
An excellent book on security in real world systems.
Blakley, Bob. CORBA Security: an Introduction to Safe Computing with Objects. Addison-Wesley, Reading, 1999.
A very elegant introduction to the complex subject of distributed objects security. Bob's writing style is simple and yet engaging.
Hartman, Bret, Flinn, Don and Beznosov, Konstantin. Enterprise Security With EJB and CORBA. John Wiley & Sons, Inc., New York, 2001.
In this book, we explain the challenges of securing EJB and CORBA enterprises and ways of addressing them. The book shows how all different pieces of security technology can play together.
Hartman, Bret, Flinn, Don, Beznosov, Konstantin and Kawamoto, Shirley. Mastering Web Services Security. John Wiley & Sons, Inc., New York, 2003.
This is kind of a continuation of the book on EJB and CORBA security, but now it explains how to secure web service enterprises.
David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House, Computer Security Series, 2003.
Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, October, 1996. Pages: 816. Reprinted (5th printing) in August 2001.
This is a very comprehensive book. The best part is that you can download this book online! The hardcopy is very convenient though.
Schneier, Bruce. Applied Cryptography. 2nd ed. John Wiley & Sons, 1996. Pages: 784.
This is the best book to read for an introduction to applied security and cryptography. There is much less math than the book by Menezes et al. Sometimes statements are made without much justification, but no other book even compares to this comprehensive introduction to cryptography. The bibliography alone is worth buying the book.
Stinson, Douglas R. Cryptography Theory and Practice. CRC Press, Inc.,  March 1995. Reprinted in 1996.
Schneier, Bruce. Secrets and Lies -- Digital Security in a Networked World. John Wiley & Sons, 2000. Pages: 432.
Schneier used to advocate good cryptography as the solution to security problems. He has since changed his mind. Now he talks about risk management and cost-benefit analysis.
Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley, 2001.
The only book you need to read to learn about the evolution, politics, and bugs in the development of SSL.
Neumann, Peter. Computer Related Risks. ACM Press / Addison-Wesley, 1995. SRI International Computer Science Laboratory.
Power grid failures. Train collisions. Primary and backup power lines blowing up simultaneously. These events aren't supposed to happen! Neumann offers a plethora of stories about the risks and consequences of technology, gathered from his Risks mailing list. On a side note, Neumann is also responsible for coming up with the pun/name, "Unix®."
Kaufman, Charlie, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World. 2nd Ed. Prentice Hall, 2002.
The authors discuss network security from a very applied approach. There is a lot of discussion about real systems, all the way down to the IETF RFCs and the on-the-wire bit representations. The authors also have a fun, informal style.
Garfinkel, Simson, and Gene Spafford. Web Security, Privacy & Commerce. 2nd ed. O'Reilly, November 2001.
It's hard to keep up with all the security software out there. But these authors do a good job documenting it all.
Kahn, David. The Codebreakers. Simon & Schuster, 1996.