Resources

Conference Ranking and Deadlines

Writing and Reviewing Academic Papers

Creating and Presenting Scientific Posters

Academic Research in General

Databases for finding specific papers and books on computer security

Most of them are protected and need to be accessed from the UBC network. See the UBC library site for instructions how to access them from other networks.

  • Books 24X7 is an excellent source of information for all areas of computer science including security, programming languages such as C++, operating systems, computer hardward, software engineering, and game programming. Access Instructions.
  • Google Scholar search service for research publications.
  • The COMPENDEX database, produced by Engineering Information, Inc., covers the core literature of the engineering field, including related specialties and technologies. Citations are drawn from approximately 5000 journals; key conference proceedings. Abstracts are included.
  • The INSPEC database, produced by the Institution of Electrical Engineers is an excellent database for information in physics, electrical engineering, computers and control engineering, and information technology. INSPEC indexes 3,500 journals and 1,500 conferences. Note, you should be able to figure out how to search in both COMPENDEX and INSPEC at same time.
  • Web of Science
  • Formerly known as Dissertation Abstracts, the ProQuest Digital Dissertations database contains over 1.6 million records. Doctoral dissertations: 1861-present; masters theses: 1988-present (selective coverage, since many institutions do not submit masters theses for inclusion). Online abstracts for dissertations provided only since July 1980. PQDD covers more than 90% of North American doctoral dissertations plus some international coverage.
  • UBC Library collection of the above and other links used for finding security-related publications.
  • Computer Science Bibliographies.
  • The Computing Research Repository (CoRR) .

Computer Security Periodic Publications

Most of them are protected and need to be accessed from the UBC network. See the UBC library site for instructions how to access them from other networks.

Relevant Conferences and Workshops

Reference styles

References on Security Engineering

The following list is an extension of the corresponding list from 6.857 Network and Computer Security, Fall 2003 at MIT.
Gasser, Morrie. Building a secure computer system. Van Nostrand Reinhold, 1988.
Anderson, Ross. Security Engineering — A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001.
An excellent book on security in real world systems.
Blakley, Bob. CORBA Security: an Introduction to Safe Computing with Objects. Addison-Wesley?, Reading, 1999.
A very elegant introduction to the complex subject of distributed objects security. Bob’s writing style is simple and yet engaging.
Hartman, Bret, Flinn, Don and Beznosov, Konstantin. Enterprise Security With EJB and CORBA. John Wiley & Sons, Inc., New York, 2001.
In this book, we explain the challenges of securing EJB and CORBA enterprises and ways of addressing them. The book shows how all different pieces of security technology can play together.
Hartman, Bret, Flinn, Don, BeznosovKonstantin and Kawamoto, Shirley. Mastering Web Services Security. John Wiley & Sons, Inc., New York, 2003.
This is kind of a continuation of the book on EJB and CORBA security, but now it explains how to secure web service enterprises.
David F. Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House, Computer Security Series, 2003.
Menezes, Alfred J., Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, October, 1996. Pages: 816. Reprinted (5th printing) in August 2001.
This is a very comprehensive book. The best part is that you can download this book online! The hardcopy is very convenient though.
Schneier, Bruce. Applied Cryptography. 2nd ed. John Wiley & Sons, 1996. Pages: 784.
This is the best book to read for an introduction to applied security and cryptography. There is much less math than the book by Menezes et al. Sometimes statements are made without much justification, but no other book even compares to this comprehensive introduction to cryptography. The bibliography alone is worth buying the book.
Stinson, Douglas R. Cryptography Theory and Practice. CRC Press, Inc., March 1995. Reprinted in 1996.
Schneier, Bruce. Secrets and Lies — Digital Security in a Networked World. John Wiley & Sons, 2000. Pages: 432.
Schneier used to advocate good cryptography as the solution to security problems. He has since changed his mind. Now he talks about risk management and cost-benefit analysis.
Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley?, 2001.
The only book you need to read to learn about the evolution, politics, and bugs in the development of SSL.
Neumann, Peter. Computer Related Risks. ACM Press / Addison-Wesley?, 1995. SRI International Computer Science Laboratory.
Power grid failures. Train collisions. Primary and backup power lines blowing up simultaneously. These events aren’t supposed to happen! Neumann offers a plethora of stories about the risks and consequences of technology, gathered from his Risks mailing list. On a side note, Neumann is also responsible for coming up with the pun/name, “Unix®.”
Kaufman, Charlie, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World. 2nd Ed. Prentice Hall, 2002.
The authors discuss network security from a very applied approach. There is a lot of discussion about real systems, all the way down to the IETF RFCs and the on-the-wire bit representations. The authors also have a fun, informal style.
Garfinkel, Simson, and Gene Spafford. Web Security, Privacy & Commerce. 2nd ed. O’Reilly, November 2001.
It’s hard to keep up with all the security software out there. But these authors do a good job documenting it all.
Kahn, David. The Codebreakers. Simon & Schuster, 1996.