Foundations of Security Analysis and Design
Tutorial Lectures
Seiten
2001
|
2001
Springer Berlin (Verlag)
978-3-540-42896-1 (ISBN)
Springer Berlin (Verlag)
978-3-540-42896-1 (ISBN)
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).
Mathematical Models of Computer Security.- The Logic of Authentication Protocols.- Access Control: Policies, Models, and Mechanisms.- Security Goals: Packet Trajectories and Strand Spaces.- Notes on Nominal Calculi for Security and Mobility.- Classification of Security Properties.
Erscheint lt. Verlag | 7.11.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | VII, 405 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 581 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Schlagworte | Access Control • authentication • Computer • Computer Security • cryptographic protocols • Data Security • formal methods • Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen • HC/Informatik, EDV/Betriebssysteme, Benutzeroberflächen • Identification • Information • Information protection • Information Security • Internet • Logic • Network Security • privacy • Secure Communications • security • security protocols • Systems Security |
ISBN-10 | 3-540-42896-8 / 3540428968 |
ISBN-13 | 978-3-540-42896-1 / 9783540428961 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Wie Geheimdienste und Kriminelle uns im Netz infiltrieren
Buch | Hardcover (2023)
Wiley-VCH (Verlag)
CHF 34,95
Konzepte – Verfahren – Protokolle
Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
CHF 132,90