[3744] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

reading list for survey of www security

daemon@ATHENA.MIT.EDU (hollyg@mit.edu)
Sat Dec 7 17:46:38 1996

From: hollyg@mit.edu
To: www-security@ns2.rutgers.edu
Date: Sat, 07 Dec 1996 15:24:43 EST
Errors-To: owner-www-security@ns2.rutgers.edu

Hello.  I'm working on my Advanced Undergraduate Project
at MIT.  my topic is a survery of web security.  below
is my reading list (sources, abstracts, etc).  If you have
any suggestions of papers that you think are missing, I would
greatly appreciate it.  If you are interested in reading the
paper when i'm done, let me know.  I will be turning it
in (hopefully) by Jan 17.

thanks,
Holly (http://www.mit.edu:8001/people/hollyg/home.html)
========================================================
Advanced Undergraduate Project Proposal - A Survey of WWW Security
by Holly Grabowski


1. Simple Digest Security Scheme
http://www.w3.org/pub/WWW/Protocols/HTTP/digest_specification.html

An improved, minimal security scheme for HTTP is proposed. This scheme
does not require the use of patented or export restricted technology and is
believed to provide the best effective security possible within those
constraints. This scheme may be used as a direct replacement for the
HTTP/1.0 Basic authentication scheme with minimal modification of clients
and servers. The scheme provides for reuse of code in implementing more
comprehensive security schemes such as S-HTTP.

2. Requirements for HyperText Transfer Protocol Security
http://www-ns.rutgers.edu/www-security/drafts/draft-rutgers-httpsec-requirements-00.txt

Abstract:
     This document specifies the requirements for the provision of
     security services to the HyperText Transport Protocol.  These
     services include confidentiality, integrity, user authentication,
     and certification of servers/services, including proxied or
     gatewayed services.  Such services may be provided as extensions
     to HTTP, or as an encapsulating security protocol.  Secondary
     requirements include ease of integration and support of multiple
     mechanisms for providing these services.

3. Requirements for Secure Object Transfer Protocols
http://www-ns.rutgers.edu/www-security/drafts/draft-rutgers-sotp-requirements-00.txt

Abstract:
     This document specifies the requirements for the class of Secure
     Object Transfer Protocols (SDTPs).  SDTPs are application-layer
     protocols used to request and supply data and objects via a
     network, while providing privacy and authentication services; the
     class thus includes secure versions of the HyperText Transport
     Protocol (HTTP), File Transport Protocol (FTP), etc.  

     SDTPs share common requirements for privacy and encryption, user
     authentication, server certification, certification of proxied or
     gatewayed services, preservation of security state information,
     and object certification and integrity.  These requirements are
     specified in this document as a basis for the evaluation and
     development of such protocols.  In addition, these requirements
     clarify the boundaries between SDTP services and those provided
     at the content level and by underlying protocols.  These
     requirements also aid in the evaluation and application of
     modular security packages/protocols, such as GSS-API (RFC 1508)
     to SDTPs.


4. The Secure HyperText Transfer Protocol
http://www.terisa.com/shttp/current.txt

Abstract:
 This memo describes a syntax for securing messages sent using the
   Hypertext Transfer Protocol (HTTP), which forms the basis for the
   World Wide Web. Secure HTTP (S-HTTP) provides independently applica-
   ble security services for transaction confidentiality, authenticity/
   integrity and non-repudiability of origin.

   The protocol emphasizes maximum flexibility in choice of key manage-
   ment mechanisms, security policies and cryptographic algorithms by
   supporting option negotiation between parties for each transaction.


5. The SSL Protocol
ftp://ietf.cnri.reston.va.us/internet-drafts/draft-freier-ssl-version3-01.txt

Abstract:
This  document  specifies Version 3.0 of the Secure  Sockets
     Layer (SSL V3.0) protocol, a security protocol that provides
     communications  privacy  over  the  Internet.  The  protocol
     allows  client/server applications to communicate in  a  way
     that  is  designed to prevent eavesdropping,  tampering,  or
     message forgery.

6. The Private Communication Technology Protocol 
http://sectest.microsoft.com/pct/pct2.html

This document specifies Version 2 of the Private Communication
Technology (PCT) protocol, a security protocol that provides
privacy over the Internet. The protocol is intended to prevent
eavesdropping on connection-based communications in client/server
applications, with at least one of the two always being
authenticated, and each having the option of requiring authentication
of the other. PCT is somewhat similar to SSL ([1]); however, PCT
version 1 corrects or improves on several weaknesses of SSL, and
version 2 also adds a number of new features. PCT version 2 is fully
compatible with PCT version 1.

7.  S/MIME Message Specification
ftp://ietf.org/internet-drafts/draft-dusse-mime-msg-spec-00.txt

S/MIME (Secure/Multipurpose Internet Mail Extensions) provides a 
standard way to send and receive secure electronic mail. Based on the 
popular Internet MIME standard (RFC 1521), S/MIME provides the 
following cryptographic security services for electronic messaging 
applications: authentication, message integrity and non-repudiation of 
origin  (using digital signatures) and privacy and data security (using 
encryption). 

8. PICS: Internet Access Controls Without Censorship
http://www.w3.org/pub/WWW/PICS/iacwcv2.htm

With its recent explosive growth, the Internet now faces a problem
inherent in all media that serve diverse audiences: not all materials are
appropriate for every audience. Societies have tailored their responses to the
characteristics of the media [1, 3]: in most countries, there are more
restrictions on broadcasting than on the distribution of printed materials.
Any rules about distribution, however, will be too restrictive from some
perspectives, yet not restrictive enough from others. We can do better-we
can meet diverse needs by controlling reception rather than distribution. In
the TV industry, this realization has led to the V-chip, a system for
blocking reception based on labels embedded in the broadcast stream. 

On the Internet, we can do still better, with richer labels that reflect
diverse viewpoints, and more flexible selection criteria. PICS (note 2), the
Platform for Internet Content Selection, establishes Internet conventions
for label formats and distribution methods, while dictating neither a
labeling vocabulary nor who should pay attention to which labels. It is
analogous to specifying where on a package a label should appear, and in
what font it should be printed, without specifying what it should say. 

-end

home help back first fref pref prev next nref lref last post