WorldCat Identities

Anderson, Ross 1956-

Overview
Works: 24 works in 111 publications in 4 languages and 3,458 library holdings
Genres: Conference papers and proceedings  Directories 
Roles: Author, Editor, Other
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Ross Anderson
Security engineering : a guide to building dependable distributed systems by Ross Anderson( Book )

32 editions published between 2001 and 2013 in English and Undetermined and held by 840 WorldCat member libraries worldwide

This reference guide to creating high quality security software covers the complete suite of security applications referred to as end2end security. It illustrates basic concepts of security engineering through real-world examples
Information hiding : first international workshop, Cambridge, U.K., May 30-June 1, 1996 : proceedings by Ross Anderson( Book )

14 editions published in 1996 in English and held by 349 WorldCat member libraries worldwide

This book constitutes the strictly refereed post-workshop proceedings of the First International Workshop on Information Hiding, held in Cambridge, UK, in May/June 1996, within the research programme in computer security, cryptology and coding theory organized by the volume editor at the Isaac Newton Institute in Cambridge. Work on information hiding has been carried out over the last few years within different research communities, mostly unaware of each other's existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline
Fast software encryption : Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : proceedings by Ross Anderson( Book )

20 editions published in 1994 in English and Italian and held by 303 WorldCat member libraries worldwide

"This volume contains the refereed papers presented at the International Workshop on Software Encryption Algorithms, held at Cambridge University, U.K. in December 1993. The collection of papers by representatives of all relevant research centers gives a thorough state-of-the-art report on all theoretical aspects of encryption algorithms and takes into account the new demands from new applications, as for example from the data-intensive multimedia applications. The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash functions and hybrid ciphers, and randomness and nonlinearity."--PUBLISHER'S WEBSITE
The global internet trust register( Book )

8 editions published in 1999 in English and held by 104 WorldCat member libraries worldwide

Personal medical information : security, engineering, and ethics : personal information workshop, Cambridge, UK, June 21-22, 1996 : proceedings by Ross Anderson( Book )

9 editions published in 1997 in English and German and held by 90 WorldCat member libraries worldwide

This book originates from an international workshop on personal information held at the Isaac Newton Institute for Mathematical Sciences in Cambridge, UK, in June 1996. The workshop was organized under the joint sponsorship of the British Medical Association and the Isaac Newton Institute in the context of a six-month research program in computer security, cryptology, and coding theory. The revised workshop papers appearing in this volume reflect a lively interdisciplinary exchange of views and ideas between doctors, lawyers, privacy activists, and the computer security community. The volume gives a representative snapshot not merely of the state of the art of the medical computer security art in various countries, but of the complex interplay between human, political, and technical aspects
Introduction to Cryptography : Principles and Applications by Ueli Maurer( Book )

1 edition published in 2007 in English and held by 7 WorldCat member libraries worldwide

Murphy's Law, the fitness of evolving species, and the limits of software reliability by Robert M Brady( Book )

2 editions published in 1999 in English and held by 5 WorldCat member libraries worldwide

Abstract: "We tackle two problems of interest to the software assurance community. Firstly, existing models of software development (such as the waterfall and spiral models) are oriented towards one-off software development projects, while the growth of mass market computing has led to a world in which most software consists of packages which follow an evolutionary development model. This leads us to ask whether anything interesting and useful may be said about evolutionary development. We answer in the affirmative. Secondly, existing reliability growth models emphasise the Poisson distribution of individual software bugs, while the empirically observed reliability growth for large systems is asymptotically slower than this. We provide a rigorous explanation of this phenomenon. Our reliability growth model is inspired by statistical thermodynamics, but also applies to biological evolution. It is in close agreement with experimental measurements of the fitness of an evolving species and the reliability of commercial software products. However, it shows that there are significant differences between the evolution of software and the evolution of species. In particular, we establish maximisation properties corresponding to Murphy's law which work to the advantage of a biological species, but to the detriment of software reliability."
The global trust register 1998( Book )

2 editions published in 1998 in English and held by 5 WorldCat member libraries worldwide

Robust computer security by Ross Anderson( Book )

3 editions published in 1994 in English and Undetermined and held by 4 WorldCat member libraries worldwide

Database state : a report commissioned by the Joseph Rowntree Reform Trust LTD. by Ross Anderson( Book )

2 editions published in 2009 in English and held by 4 WorldCat member libraries worldwide

"In recent years, the government has built or extended many central databases that hold information on every aspect of our lives, from health and education to welfare, law-enforcement and tax. This 'transformational government' programme was supposed to make public services better or cheaper, but it has been repeatedly challenged by controversies over effectiveness, privacy, legality and cost. This report charts these databases, creating the most comprehensive map so far of what has become Britain's database state."
Jōhō sekyuriti gijutsu taizen : Shinraidekiru bunsan shisutemu kōchiku no tame ni( Book )

2 editions published in 2002 in Japanese and held by 4 WorldCat member libraries worldwide

FUB by Italy) Fondazione Ugo Bordoni (Rome( Book )

1 edition published in 1997 in Italian and held by 3 WorldCat member libraries worldwide

Copyright and privacy protection( Book )

2 editions published in 1998 in English and held by 3 WorldCat member libraries worldwide

Children's databases : Safety and Privacy. A report for the Information Commissioner( Book )

1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide

Security in clinical information systems by Ross Anderson( Book )

2 editions published in 1996 in English and held by 2 WorldCat member libraries worldwide

We have described the threats to the confidentiality, integrity and availability of personal health information in the light of experience in the UK and overseas, and proposed a clinical information security policy that enables the principle of patient consent to be enforced in the kind of heterogeneous distributed system currently under construction in the UK
Crittologia by Italy) Fondazione Ugo Bordoni (Rome( Book )

1 edition published in 1996 in Italian and held by 1 WorldCat member library worldwide

From the Bauhûtte to the Bauhaus : the progressive immanentisation of an architectural paradigm by Ross Anderson( Book )

1 edition published in 2013 in English and held by 1 WorldCat member library worldwide

Information Hiding: an Annotated Bibliography( Book )

2 editions published in 1999 in English and held by 1 WorldCat member library worldwide

There are a number of application areas in which we want to hide information or to stop someone else from doing so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes. There follow abstracts of material from number of relevant publications
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations( )

1 edition published in 1998 in English and held by 0 WorldCat member libraries worldwide

It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagnetic radiation it transmits. This can be used for both attack and defence. To attack a system, malicious code can encode stolen information in the machine's RF emissions and optimise them for some combination of reception range, receiver cost and covertness. To defend a system, a trusted screen driver can display sensitive information using fonts which minimise the energy of these emissions. There is also an interesting potential application to software copyright protection
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.60 (from 0.09 for The global ... to 0.98 for FUB ...)

Security engineering : a guide to building dependable distributed systems
Alternative Names
Anderson, R.

Anderson, Ross

Anderson, Ross 1956-

Anderson, Ross J.

Anderson, Ross J. 1956-

Anderson, Ross John 1956-

Ross Anderson britischer Forscher, Buchautor und Berater für Sicherheitstechnik

Ross Anderson cryptographe britanique

Ross J. Anderson Brits cryptograaf

Андерсон Росс

Росс Андерсон

רוס ג'ון אנדרסון

راس جان اندرسون

罗斯·J·安德森

羅斯·安德森

Languages
Covers
Information hiding : first international workshop, Cambridge, U.K., May 30-June 1, 1996 : proceedingsFast software encryption : Cambridge Security Workshop, Cambridge, U.K., December 9-11, 1993 : proceedingsThe global internet trust registerPersonal medical information : security, engineering, and ethics : personal information workshop, Cambridge, UK, June 21-22, 1996 : proceedingsThe global trust register 1998