1998 24.12 2000

Vol.24 n°12 (#306) december 1999

(ddj_1999_12.jpg)

p.8 EDITORIAL

[author : Jonathan Erickson] #Edito

TABLE OF CONTENTS

FEATURES

p.21 ATTACK TREES

[author : Bruce Schneier]

Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Bruce shows how you can use them to improve security by modeling attacks.

p.32 MMPC: AN ALGORITHM FOR ENCRYPTING MULTIPLE MESSAGES

[author : Jim Shapiro and David Shapiro]

To encrypt multiple messages in one transmission, Jim and David implement Ron Rivest's chaffing and package transform. Their technique is optimized to minimize memory usage, while making as few passes through the data as possible.

p.42 IP SECURITY PROTOCOLS

[author : Eva Bozoki]

The need to address IPv4's lack of security has prompted the release of a number of standards, protocols, and applications.

p.56 ELLIPTIC-CURVE CRYPTOGRAPHY

[author : Andrew D. Fernandes]

Andrew compares elliptic-curve cryptography to other cryptosystems. In the process, he shows how elliptic-curve cryptosystems are built.

p.64 A WDM IEEE 1394 CONFIGURATION ROM DECODER

[author : William F. Alexander]

Bill updates his DUMPROM utility by presenting a WDM version that runs on Windows 98 and Windows 2000. DUMPROM lets you examine the configuration ROM of any 1394 device.

EMBEDDED SYSTEMS

p.74 TEMPORAL MODELS IN UML

[author : Bruce Powel Douglass and Srini Vasan]

The Unified Modeling Language can be used to capture concurrency models and associated parameters. Bruce and Srini show how, then describe schedulability analysis using Rate Monotonic Analysis.

INTERNET PROGRAMMING

p.86 XFDL: THE EXTENSIBLE FORMS DESCRIPTION LANGUAGE

[author : John Boyer]

The Extensible Forms Description Language is an XML extension language that addresses key problems involved with doing electronic commerce on the Web.

PROGRAMMER'S TOOLCHEST

p.94 PORTING THE SPICE LIBRARY

[author : Ed Wright]

The SPICE library consists of 952 portable Fortran routines with 79,369 lines of executable code and 153,649 comment lines. Ed shares his experiences in porting this large Fortran library to C, then from C to C++.

COLUMNS

p.101 PROGRAMMING PARADIGMS

[author : Michael Swaine]

For Michael, James Gleick's new book Faster comes just in time.

p.105 C PROGRAMMING

[author : Al Stevens]

Al weathers hurricane Floyd, as he continues to build a C++-based generic, platform-independent graphics library.

p.109 JAVA Q&A

[author : Paul Tremblett]

One way to deliver dynamic data content to static HTML pages is by leveraging the power of Java and JavaServer Pages. Paul shows you how.

p.117 ALGORITHM ALLEY

[author : Jon Bentley]

Jon is out of sorts, as he grapples with the Merge Sort and similar algorithms this month.

p.123 DR. ECCO'S OMNIHEURIST CORNER

[author : Dennis E. Shasha]

Ecco and Liane puzzle over the rules of friendship that exist on the island of Aresia, which has 27 ethnicities — and each at the other's throats.

p.127 PROGRAMMER'S BOOKSHELF

[author : Eugene Eric Kim]

This month, Eugene examines Netscape Time: The Making of a Billion-Dollar Start-Up That Took on Microsoft, by Jim Clark with Owen Edwards; and Competing on Internet Time: Lessons from Netscape and Its Battle with Microsoft, by Michael E. Cusumano and David B. Yoffie.

FORUM

p.10 LETTERS

[author : you]

p.18 NEWS & VIEWS

[author : Nick Baran]

p.134 OF INTEREST

[author : Nick Baran and Amy Lincicum]

p.136 SWAINE'S FLAMES

[author : Michael Swaine]