Security in Computing Systems - Joachim Biskup

Security in Computing Systems

Challenges, Approaches and Solutions

(Autor)

Buch | Softcover
XXVIII, 694 Seiten
2010 | 1. Softcover reprint of hardcover 1st ed. 2009
Springer Berlin (Verlag)
978-3-642-09719-5 (ISBN)
181,89 inkl. MwSt
This monograph provides a wide-ranging and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field.
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, "computing" refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ''information society'', we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ''global information infrastructure'' on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

Joachim Biskup ist Professor für Informatik an der Universität Hildesheim, wo er die Arbeitsgruppe "Informationssysteme und Sicherheit" leitet. Er ist Autor und Koautor zahlreicher Veröffentlichungen über Berechenbarkeits- und Komplexitätstheorie, Informationssysteme und Sicherheit.

Challenges and Basic Approaches.- Fundamental Challenges.- Computing Systems and Their Basic Vulnerabilities.- Fundamentals of Information Flow and Inference Control.- Messages, Inferences, Information and Knowledge.- Preventive Inference Control.- Security Mechanisms.- Key Ideas and Examples.- Combined Techniques.- Techniques of Control and Monitoring: Essentials.- Conceptual Access Rights.- Elements of a Security Architecture.- Monitoring and Intrusion Detection.- Techniques of Cryptography: Essentials.- Encryption.- Authentication.- Anonymization.- Some Further Cryptographic Protocols.- Implementations.- Design of Selected Systems.

Erscheint lt. Verlag 19.10.2010
Zusatzinfo XXVIII, 694 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 1073 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • anonymization • Architecture • authentication • Computer Security • Computersicherheit • cryptography • Encryption • Inference Control • Information • Intrusion Detection • Kryptographie / Kryptologie • Networks • Oracle • PKI - Public Key Infrastructure • security • SQL • Systems Security
ISBN-10 3-642-09719-7 / 3642097197
ISBN-13 978-3-642-09719-5 / 9783642097195
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich