Foundations of Security Analysis and Design

Tutorial Lectures
Buch | Softcover
VII, 405 Seiten
2001 | 2001
Springer Berlin (Verlag)
978-3-540-42896-1 (ISBN)

Lese- und Medienproben

Foundations of Security Analysis and Design -
53,49 inkl. MwSt
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).

Mathematical Models of Computer Security.- The Logic of Authentication Protocols.- Access Control: Policies, Models, and Mechanisms.- Security Goals: Packet Trajectories and Strand Spaces.- Notes on Nominal Calculi for Security and Mobility.- Classification of Security Properties.

Erscheint lt. Verlag 7.11.2001
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo VII, 405 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 233 mm
Gewicht 581 g
Themenwelt Mathematik / Informatik Informatik Betriebssysteme / Server
Informatik Netzwerke Sicherheit / Firewall
Schlagworte Access Control • authentication • Computer • Computer Security • cryptographic protocols • Data Security • formal methods • Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen • HC/Informatik, EDV/Betriebssysteme, Benutzeroberflächen • Identification • Information • Information protection • Information Security • Internet • Logic • Network Security • privacy • Secure Communications • security • security protocols • Systems Security
ISBN-10 3-540-42896-8 / 3540428968
ISBN-13 978-3-540-42896-1 / 9783540428961
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
94,95