Security Fundamentals
All security researchers should have a good foundation in information theory, formal security models, cryptography, and secure protocols. CISA recommends the following resources as part of this foundation.
- NIST Computer Security Resource Center History of Computer Security (a must read!)
- Security Models
- Approaches to Access Control
- An Introduction to the Common Criteria
- The Trusted Computing Group
Journals
- ACM Transactions on Information and System Security (TISSEC)
- Journal of Cryptology
- Cryptologia
- Journal of Cryptographic Engineering
Conferences
CISA members regularly attend or present at the following conferences.
- CRYPTO
- Cryptographic Hardware and Embedded Systems (CHES) Workshop
- USENIX Security
- USENIX Electronic Voting Technology (EVT) Workshop / Workshop on Trustworthy Elections (WOTE)
- EVOTE
- The Colloquium for Information Systems Security Education (CISSE)
- The International Conference on Trust and Trustworthy Computing (TRUST)
- Digital Forensics Research Conference (DFRWS)
- NIST Workshops on Voting
- USENIX Workshop on Hot Topics in Security (HotSec)
- USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)
- The Colloquium for Information Systems Security Education (CISSE)
- ACM Special Interest Group on Security, Audit, and Control (SIGSAC) Conferences
- Black Hat Technical Security Conference
- DEFCON
Subscription Services
These subscriptions services are free for affiliates with a UMBC account. They may be accessed while on campus or through the Albin O. Kuhn Library website.