Foundations of Security Analysis and Design
FOSAD 2006/2007 Turtorial Lectures
Seiten
2007
|
2007
Springer Berlin (Verlag)
978-3-540-74809-0 (ISBN)
Springer Berlin (Verlag)
978-3-540-74809-0 (ISBN)
lt;p>The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Erscheint lt. Verlag | 30.8.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | VII, 328 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 510 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | authentication • Cryptanalysis • Cryptographic Hardware • cryptography • cypher implementation • Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen • Hardware Implementation • HC/Informatik, EDV/Betriebssysteme, Benutzeroberflächen • identity based cryptography • Information • Intrusion Detection • IT Security • Java • Java Security • low-level software security • privacy • security • Security Engineering • side-channel attacks • Smart cards • Systems Security • trusted mobile platforms • trust requirements • trust systems • UML |
ISBN-10 | 3-540-74809-1 / 3540748091 |
ISBN-13 | 978-3-540-74809-0 / 9783540748090 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
CHF 13,90
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
CHF 48,95