Publications


1. Books

2. Book Chapters

  • Oppliger, R., Geld im digitalen Zeitalter – Eine Standortbestimmung, In: Baer, J., and W. Rother (Eds.), Geld – Philosophische, literaturwissenschaftliche und ökonomische Perspektiven, ISBN 978-3-7965-2913-9, Schwabe Verlag, Basel (Switzerland), 2013, pp. 187 – 207
  • Oppliger, R., Network Security, In: Proakis, J.G. (Ed.), Wiley Encyclopedia of Telecommunications, Vol. 3, ISBN 978-0471369721, John Wiley & Sons, New York, NY, 2003, pp. 1644 – 1652
  • Oppliger, R., Datenschutzfreundliche Technologien für das World Wide Web (WWW), In: Baeriswil, B., and B. Rudin (Eds.), Perspektive Datenschutz: Praxis und Entwicklungen in Recht und Technik, ISBN 978-3725543298, Schulthess, Zürich (Switzerland), 2002, pp. 295 – 326

3. Academic Theses

  • Oppliger, R., Contributions to Research in Network Security, Habilitation thesis (Habilitationsschrift), Department of Computer Science, Faculty for Economic Sciences, University of Zürich (Switzerland), January 1999
  • Oppliger, R., Analyse und Entwurf von unternehmensweiten Kommunikationsnetzen, Ph.D. thesis (Dissertation), Institute for Computer Science and Applied Mathematics (IAM), Faculty for Natural Sciences, University of Berne (Switzerland), June 1993 (supervised by Prof. Dr. D. Hogrefe)
  • Oppliger, R., Computersicherheit, M.Sc. thesis (Diplomarbeit), Institute for Computer Science and Applied Mathematics (IAM), Faculty for Natural Sciences, University of Berne (Switzerland), May 1991 (supervised by Prof. Dr. D. Hogrefe)

4. Refereed Articles

  • Oppliger, R., Disillusioning Alice and Bob, IEEE Security & Privacy, Vol. 15, No. 5, September/October 2017, pp. 82 – 84
  • Oppliger, R., Pernul, G., and S. Katsikas, Guest Editor’s Introduction – New Frontiers: Assessing and Managing Security Risks, IEEE Computer, Vol. 50, No. 4, April 2017, pp. 48 – 51
  • Oppliger, R., Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale, IEEE Security & Privacy, Vol. 13, No. 6, November/December 2015, pp. 18 – 21
  • Oppliger, R., Certification Authorities Under Attack: A Plea for Certificate Legitimation, IEEE Internet Computing, Vol. 18, No. 1, January/February 2014, pp. 40 – 47
  • Oppliger, R., and B. Wildhaber, Common Misconceptions in Computer and Information Security, IEEE Computer, Vol. 45, No. 6, June 2012, pp. 102 – 104
  • Oppliger, R., Guest Editor’s Introduction – Security and Privacy in an Online World, IEEE Computer, Vol. 44, No. 9, September 2011, pp. 21 – 22
  • Oppliger, R., Rytz, R., and T. Holderegger, Internet Banking: Client-Side Attacks and Protection Mechanisms, IEEE Computer, Vol. 42, No. 6, June 2009, pp. 27 – 33
  • Oppliger, R., Hauser, R., and D. Basin, SSL/TLS Session-Aware User Authentication Revisited, Computers & Security, Vol. 27, Issues 3 – 4, May/June 2008, pp. 64 – 70
  • Oppliger, R., and R. Hauser, Protecting TLS-SA Implementations for the Challenge-Response Feature of EMV-CAP Against Challenge Collision Attacks, Security and Communication Networks, Vol. 1, Issue 2, March/April 2008, pp. 125 – 134
  • Oppliger, R., Hauser, R., and D. Basin, SSL/TLS Session-Aware User Authentication, IEEE Computer, Vol. 41, No. 3, March 2008, pp. 59 – 65
  • Oppliger, R., IT Security: In Search of the Holy Grail, Communications of the ACM, Vol. 50, No. 2, February 2007, pp. 96 – 98
  • Oppliger, R., Providing Certified Mail Services on the Internet, IEEE Security & Privacy, Vol. 5, No. 1, January/Februrary 2007, pp. 16 – 22
  • Oppliger, R., Hauser, R., and D. Basin, SSL/TLS session-aware user authentication-Or how to effectively thwart the man-in-the-middle, Computer Communications, Vol. 29, Issue 12, August 2006, pp. 2238 – 2246
  • Lopez, J., Oppliger, R., and G. Pernul, Why have public key infrastructures failed so far? Internet Research, Vol. 15, No. 5, 2005, pp. 544 – 556
  • Oppliger, R., Privacy-enhancing Technologies for the world wide web, Computer Communications, Vol. 28, Issue 16, October 2005, pp. 1791 – 1797
  • Oppliger, R., and R. Rytz, Does Trusted Computing Remedy Computer Security Problems? IEEE Security & Privacy, Vol. 3, No. 2, March/April 2005, pp. 16 – 19
  • Lopez, J., Oppliger, R., and G. Pernul, Authentication and authorization infrastructures (AAIs): a comparative survey, Computers & Security, Vol. 23, Issue 7, October 2004, pp. 578 – 590
  • Oppliger, R., Certified Mail: The Next Challenge for Secure Messaging, Communications of the ACM, Vol. 47, No. 8, August 2004, pp. 75 – 79
  • Oppliger, R., and P. Stadlin, A certified mail system (CMS) for the Internet, Computer Communications, Vol. 27, Issue 13, August 2004, pp. 1229 – 1235
  • Oppliger, R., Microsoft .NET Passport and identity management, Information Security Technical Report, Vol. 9, No. 1, 2004, pp. 26 – 34
  • Oppliger, R., Sicherheit von Open Source Software – Mythos oder Wirklichkeit? Datenschutz und Datensicherheit (DuD), Vol. 27, No. 11, November 2003, pp. 669 – 675
  • Oppliger, R., and R. Rytz, Digital Evidence: Dream and Reality, IEEE Security & Privacy, Vol. 1, No. 5, September/October 2003, pp. 44 – 48
  • Oppliger, R., Microsoft .NET Passport: A Security Analysis, IEEE Computer, Vol. 36, No. 7, July 2003, pp. 29 – 35
  • Oppliger, R., Microsoft Outlook Web Access: Blessing or Bane to Security? IEEE IT Professional, Vol. 5, No. 1, January/February 2003, pp. 27 – 31
  • Oppliger, R., Managing certificates in a corporate environment, Annals of telecommunications, Vol. 55, No. 7-8, July/August 2000, pp. 341 – 351
  • Oppliger, R., Privacy protection and anonymity services for the world wide web (WWW), Future Generation Computer Systems (FGCS) Journal, Vol. 16, Issue 4, February 2000, pp. 379 – 391
  • Oppliger, R., Security issues related to mobile code and agent-based systems, Computer Communications, Vol. 22, Issue 12, July 1999, pp. 1165 – 1170
  • Oppliger, R., Security at the Internet Layer, IEEE Computer, Vol. 31, No. 9, September 1998, pp. 43 – 47
  • Oppliger, R., Sicherheitsprotokolle für das Internet, Datenschutz und Datensicherheit (DuD), Vol. 21, No. 12, December 1997, pp. 686 – 690
  • Oppliger, R., and A. Albanese, Participants Registration, Validation, and Key Distribution for Large-Scale Conferencing Systems, IEEE Communications, Vol. 35, No. 6, June 1997, pp. 130 – 135
  • Oppliger, R., Internet Security: Firewalls and Beyond, Communications of the ACM, Vol. 40, No. 5, May 1997, pp. 92 – 102
  • Oppliger, R., Internet Kiosk: Internet security enters the Middle Ages, IEEE Computer, Vol. 28, No. 10, October 1995, pp. 100 – 101
  • Oppliger, R., and D. Hogrefe, Sicherheit in unternehmensweiten Kommunikationsnetzen (CCN), Praxis der Informationsverarbeitung und Kommunikation (PIK), Vol. 15, No. 4, 1992, pp. 213 – 217

5. Conference and Workshop Papers

  • Oppliger, R., Schwenk, J., and C. Loehr, CAPTCHA-based Code Voting, Proceedings of the 3rd International Conference on Electronic Voting 2008 (EVOTE08), Bregenz (Austria), August 6 – 9, 2008
  • Oppliger, R., Schwenk, J., and J. Helbach, Protecting Code Voting Against Vote Selling, Proceedings of the GI Conference on “Sicherheit, Schutz und Zuverlässigkeit” (Sicherheit 2008), Saarbrücken (Germany), Springer-Verlag, Berlin, April 2 – 4, 2008
  • Oppliger, R., Hauser, R., Basin, D., Rodenhaeuser, A., and B. Kaiser, A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA), Proceedings of the 15th GI/ITG Conference on “Kommunikation in Verteilten Systemen” (KiVS ’07), Berne (Switzerland), Springer-Verlag, Berlin, February 26 – March 2, 2007, pp. 225 – 236
  • Oppliger, R., Gajek, S., and R. Hauser, Security of Microsoft’s Identity Metasystem and CardSpace, Proceedings of the 15th GI/ITG Conference on “Kommunikation in Verteilten Systemen” (KiVS ’07), Industry Track, Berne (Switzerland), VDE Verlag, Berlin, February 26 – March 2, 2007, pp. 63 – 74
  • Oppliger, R., Hauser, R., and D. Basin,Browser Enhancements to Support SSL/TLS Session-Aware User Authentication, Position paper, W3C Workshop on Transparency and Usability of Web Authentication, New York, USA, March 15 – 16, 2006
  • Oppliger, R., and S. Gajek, Effective Protection Against Phishing and Web Spoofing, Proceedings of the 9th IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2005), Salzburg (Austria), Springer-Verlag, LNCS 3677, September 19 – 21, 2005, pp. 32 – 41
  • Lopez, J., Oppliger, R., and G. Pernul, Classifying Public Key Certificates, Proceedings of the 2nd European PKI Workshop, Canterbury (UK), Springer-Verlag, LNCS 3545, June 30 – July 1, 2005, pp. 135 – 143
  • Lopez, J., Montenegro, J.A., Oppliger, R., and G. Pernul, On a Taxonomy of Systems for Authentication and/or Authorization Services, Proceedings of the TERENA Networking Conference, Rhodes (Greece), June 7 – 10, 2004
  • Oppliger, R., How to Address the Secure Platform Problem for Remote Internet Voting, Proceedings of the 5th Conference on “Sicherheit in Informationssystemen” (SIS 2002), Vienna (Austria), October 3 – 4, 2002, vdf Hochschulverlag, pp. 153 – 173
  • Oppliger, R., Pernul, G., and Ch. Strauss, Using Attribute Certificates to Implement Role-based Authorization and Access Control, Proceedings of the 4th Conference on “Sicherheit in Informationssystemen” (SIS 2000), Zürich (Switzerland), October 5 – 6, 2000, vdf Hochschulverlag, pp. 169 – 184
  • Oppliger, R., Greulich, A., and P. Trachsel, A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls, Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC ’99), Scottsdale, AZ, December 6 – 10, 1999, IEEE Computer Society Press, Los Alamitos, CA, pp. 241 – 248
  • Oppliger, R., Authorization Methods for E-Commerce Applications, Proceedings of the 18th IEEE International Symposium on Reliable Distributed Systems (SRDS ’99), Workshop on Electronic Commerce, Lausanne (Switzerland), October 19 – 22, 1999, IEEE Computer Society Press, Los Alamitos, CA, pp. 366 – 371
  • Oppliger, R., Greulich, A., and P. Trachsel, Der Einsatz eines verteilten Zertifikat-Managementsystems in der Schweizerischen Bundesverwaltung, Proceedings of the German Informatics Society (GI) Working Conference on “Verlässliche IT-Systeme” (VIS ’99), Essen (Germany), September 22 – 24, 1999, DuD Fachbeiträge, Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Wiesbaden (Germany), pp. 81 – 96
  • Oppliger, R., Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks, Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS ’99), Leuven (Belgium), September 20 – 21, 1999, Kluwer Academic Publishers, pp. 163 – 175
  • Oppliger, R., Shaping the Research Agenda for Security in E-Commerce, Proceedings of the Workshop on Security and Electronic Commerce held in conjunction with the 10th International Conference on Database and Expert Systems (DEXA ’99), Florence (Italy), August 30 – September 3, 1999, IEEE Computer Society Press, Los Alamitos, CA, pp. 810 – 814
  • Oppliger, R., and J.L. Nottaris, Online Casinos, Proceedings of the GI/ITG Conference on “Kommunikation in Verteilten Systemen” (KiVS ’97), Braunschweig (Germany), February 17 – 22, 1997, Springer-Verlag, Berlin, pp. 2 – 16
  • Oppliger, R., Participants Registration, Validation, and Key Distribution for MBone Conferencing, Swiss Computer Science Conference (SCSC ’96), Zürich (Switzerland), October 22 – 23, 1996
  • Oppliger, R., Bracher, M., and A. Albanese, Distributed registration and key distribution for online universities, Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS ’96), Essen (Germany), September 23 – 24, 1996, Chapman & Hall, London, pp. 166 – 175
  • Oppliger, R., and A. Albanese, Distance Education and Online Universities, Proceedings of the IEEE 5th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE ’96), Workshop on Distance Learning, Stanford University, CA, June 19 – 21, 1996, IEEE Computer Society Press, Los Alamitos, CA, pp. 10 – 15
  • Oppliger, R., and A. Albanese, Distributed registration and key distribution (DiRK), Proceedings of the 12th International Conference on Information Security (IFIP SEC ’96), Island of Samos (Greece), May 21 – 24, 1996, Chapman & Hall, London, pp. 199 – 208
  • Oppliger, R., Gupta, A., Moran, M., and R. Bettati, A Security Architecture for Tenet Scheme 2, Proceedings of the 2nd European Workshop on Interactive Distributed Multimedia Systems and Services (IDMS ’96), Berlin (Germany), March 4 – 6, 1996, Springer-Verlag, Berlin, LNCS 1045, pp. 163 – 174
  • Oppliger, R., Authentication and key distribution in computer networks and distributed systems, Proceedings of the IFIP TC6, TC11 and Austrian Computer Society Joint Working Conference on Communications and Multimedia Security (CMS ’95), Graz (Austria), September 20 – 21, 1995, Chapman & Hall, London, pp. 148 – 159
  • Oppliger, R., Authentifikations- und Schlüsselverteilsysteme, Proceedings of the First Joint Conference of the German Informatics Society and the Swiss Informaticians Society (GISI ’95), Zürich (Switzerland), September 18 – 20, 1995, Springer-Verlag, Berlin, pp. 266 – 273
  • Oppliger, R., and D. Hogrefe, Security Concepts for Corporate Networks, Proceedings of the 10th International Conference on Information Security (IFIP SEC ’94), Curaçao (N.A.), May 23 – 27, 1994
  • Oppliger, R., and D. Hogrefe, Corporate Network Security, Proceedings of the IEEE Singapore International Conference on Networks and International Conference on Information Engineering (SICON/ICIE ’93), Singapore, September 6 – 11, 1993, pp. 426 – 430
  • Oppliger, R., Weber, S., and D. Hogrefe, Entwurf von virtuell privaten Netzen, Proceedings of the GI/ITG Conference on “Kommunikation in Verteilten Systemen” (KiVS ’93), Munich (Germany), March 3 – 5, 1993, Springer-Verlag, Berlin, pp. 428 – 441
  • Oppliger, R., Weber, S., and D. Hogrefe, An Optimization Method for Virtual Private Network Design, Proceedings of the IEE 2nd International Conference on Private Switching Systems and Networks, London (UK), June 23 – 25, 1992, pp. 31 – 36

6. Other Articles

  • Oppliger, R., Vorsicht, Verwundbarkeit!, return, 01/18, pp. 63 – 65
  • Oppliger, R., SSL/TLS: Attacks, Countermeasures, and Counterattacks, PenTest Magazine, 09/2017, pp. 152 – 159
  • Oppliger, R., TLS security: Past, present and future, Help Net Security, July 3, 2017
  • Oppliger, R., Public-Key-Infrastrukturen (PKI), digma, Vol. 15, No. 2, August 2015, pp. 58 – 59
  • Oppliger, R., IT-Sicherheit und Privacy (Editorial), hitech, Bern University of Applied Sciences, No. 2, 2014, p. 3
  • Oppliger, R., eSecurity – ein Fachgebiet im Wandel readme alumni, Issue 28, September 2012, 28/12, pp. 3 – 4
  • Oppliger, R., Sicherheit im Cloud Computing digma, Vol. 12, No. 1, April 2012, pp. 28 – 31
  • Oppliger, R., E-Voting auf unsicheren Client-Plattformen digma, Vol. 8, No. 2, June 2008, pp. 82 – 85
  • Oppliger, R., Anonymes E-Voting – eine Illusion? digma, Vol. 8, No. 1, March 2008, pp. 24 – 27
  • Oppliger, R., Sicherheit auch in der Informatik – Jetzt gilt es ernst, Editorial for a guidebook entitled “Schutz und Sicherheit” distributed with the Tages-Anzeiger of December 20, 2007, p. 2
  • Oppliger, R., Hauser, R., and D. Basin, Protecting Ecommerce Against The Man-In-The-Middle, Business Communications Review, January 2007, pp. 54 – 58
  • Oppliger, R., Hauser, R., and P. Frey, MITM-Angriffe: Phishing in Echtzeit, digma, Vol. 6, No. 1, March 2006, pp. 32 – 35
  • Oppliger, R., Die Jagd nach dem heiligen Gral, digma, Vol. 5, No. 2, June 2005, pp. 92 – 93
  • Oppliger, R., “Sichere” Streichlisten, digma, Vol. 5, No. 1, March 2005, pp. 34 – 35
  • Oppliger, R., Mit Hash auf Kollisionskurs – Hashfunktion SHA-1 möglicherweise geknackt, Neue Zürcher Zeitung, February 25, 2005, p. 65
  • Oppliger, R., Der Mann in der Mitte – Zur Sicherheit des Internet-Banking, Neue Zürcher Zeitung, October 8, 2004, p. 65
  • Oppliger, R., Open Source Software und Sicherheit, digma, Vol. 3, No. 3, October 2003, pp. 122 – 126
  • Oppliger, R., Wie sicher ist Open Source Software? Offenheit bedeutet nicht automatisch Sicherheit, Neue Zürcher Zeitung, Sonderbeilage Orbit/Comdex, B15, September 23, 2003
  • Oppliger, R., and R. Rytz, Digitale Signatur: Ist der Beweiswert gegeben? Netzwoche “Netzguide E-Security,” ISBN 3-907096-04-5, 2003, pp. 68 – 69
  • Oppliger, R., Sicherheit im E-Voting: Facettenreiche Probleme bei Wahlen und Abstimmungen, Neue Zürcher Zeitung, Sonderbeilage Informatik, B3, February 4, 2003
  • Oppliger, R., E-Voting sicherheitstechnisch betrachtet – Sicherheitsfragen und -probleme bei elektronischen Abstimmungsmechanismen, digma, Vol. 2, No. 4, December 2002, pp. 184 – 188
  • Oppliger, R., Wie weiter mit dem “Wer ist wer” im Netz: Digitale Zertifikate und elektronische Identitätskarten, Neue Zürcher Zeitung, November 29, 2002, p. 77
  • Oppliger, R., Von der PKI zum Trust Management – Möglichkeiten und Grenzen einer Schweizer PKI aus technischer Sicht, digma, Vol. 1, No. 2, June 2001, pp. 70 – 77
  • Oppliger, R., What is a security architecture and why would your enterprise need one? CSI Computer Security Alert, May 2001, No. 219, pp. 1, 8
  • Oppliger, R., and M. Holthaus, Totale Überwachung ist möglich – Technische Aspekte der Kontrolle von Internet-Aktivitäten der Mitarbeiterinnen und Mitarbeiter am Arbeitsplatz, digma, Vol. 1, No. 1, April 2001, pp. 14 – 19
  • Oppliger, R., Trouble Ahead, Trouble Behind: The Future of Computer Security, CSI Computer Security Journal, Vol. XVII, No. 1, Winter 2001, pp. 19 – 25
  • Oppliger, R., SSL and TLS Protocols: How to Address Critical Security Issues, CSI Computer Security Journal, Vol. XVI, No. 1, Winter 2000, pp. 15 – 38
  • Oppliger, R., Dezentralisierung erhöht die Sicherheitsrisiken: Ungelöste Probleme beim Agent-based Computing, Neue Zürcher Zeitung, Sonderbeilage Informatik, B10, February 8, 2000
  • Oppliger, R., PKI in der Schweiz, ISACA Switzerland Chapter Newsletter, December 1999, No. 46, pp. 11 – 13
  • Oppliger, R., Take a closer look to demystify provably secure systems, CSI Computer Security Alert, October 1999, No. 199, p. 10
  • Oppliger, R., Methods of Securing Applications for the World Wide Web (WWW), CSI Computer Security Journal, Vol. XV, No. 1, 1999, pp. 1 – 9
  • Oppliger, R., Mobile code and agent-based systems, CSI Computer Security Alert, October 1998, No. 187, p. 1, 7 – 8
  • Oppliger, R., Trusted Services (ETS) in Europe, CSI Computer Security Alert, July 1998, No. 184, p. 3
  • Oppliger, R., How to build a corporate PKI, CSI Computer Security Alert, May 1998, No. 182, pp. 1, 6 – 8
  • Oppliger, R., Sind WWW Cookies gefährlich? BFI News Express, 3/97, p. 10
  • Oppliger, R., Choosing VPN protocols, CSI Computer Security Alert, January 1997, No. 166, pp. 4 – 5
  • Oppliger, R., Pilotbetrieb eines “sicheren” WWW-Servers, BFI News, 2/96, pp. 26 – 34
  • Oppliger, R., Authentifikations- und Schlüsselverteilsysteme: Eine Übersicht, Informatik/Informatique, Vol. 3, No. 4, 1996, pp. 28 – 33
  • Oppliger, R., OECD crypto standards, CSI Computer Security Alert, August 1996, No. 161, p. 6
  • Oppliger, R., Next generation malicious code, CSI Computer Security Alert, June 1996, No. 159, p. 7
  • Oppliger, R., Europe explores key escrow issues, CSI Computer Security Alert, April 1996, No. 157, pp. 4 – 5
  • Oppliger, R., Sicherheit im WWW, BFI News, 1/96, pp. 33 – 39
  • Oppliger, R., Clipper und die Diskussion um Key-Escrow, Telematik-Spektrum, February 1996, pp. 16 – 17
  • Oppliger, R., Netzbasierte Softwareangriffe, BFI News, 2/95, pp. 5 – 7
  • Oppliger, R., Baselines simplify risk analysis, CSI Computer Security Alert, November 1995, No. 152, p. 4
  • Oppliger, R., Firewalls aren’t Enough: Authentication and Key Distribution Systems, CSI Computer Security Journal, Vol. XI, No. 2, 1995, pp. 15 – 24
  • Oppliger, R., Firewalls aren’t enough: an authentication systems overview, CSI Computer Security Alert, June 1995, No. 147, pp. 4 – 5
  • Oppliger, R., Sicherheit in X.400-Netzen, Telematik-Spektrum, May 1994, pp. 35 – 37
  • Oppliger, R., and D. Hogrefe, Sicherheitsüberlegungen für unternehmensweite Kommunikationsnetze, Telematik-Spektrum, February 1994, pp. 31 – 33
  • Oppliger, R., Weber, S., and B. Liver, Expertensystem konfiguriert virtuell private Netze, Output, May 1992, pp. 43 – 47

7. Technical Reports

8. Book Reviews

  • Oppliger, R., Book Review for “Tvede, L., Pircher, P., and J. Bodenkamp, Data Broadcasting: The Technology and the Business, John Wiley & Sons Ltd., 1999”, Computer Communications, Vol. 24, Issue 11, June 2001, pp. 1115 – 1116
  • Oppliger, R., Book Review for “Escamilla, T., Intrusion Detection: Network Security Beyond the Firewall, John Wiley & Sons, New York, NY, 1998”, Computer Communications, Vol. 23, Issue 4, February 2000, p. 429
  • Oppliger, R., Book Review for “Parker, D.B., Fighting computer crimes: a new framework for protecting information, John Wiley & Sons, New York, NY, 1998”, Computer Communications, Vol. 22, Issue 5, April 1999, pp. 491 – 492