Security and Survivability
Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems
Seiten
2008
Springer-Verlag New York Inc.
978-0-387-27627-4 (ISBN)
Springer-Verlag New York Inc.
978-0-387-27627-4 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
Presents research on the emerging discipline of design and analysis of security systems that are survivable. This book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks.
"Security and Survivability" presents new research on the emerging discipline of design and analysis of security systems that are survivable. Such systems are designed to continue to provide verifiable security guarantees, and allow the system to degrade gracefully, even under threat or actual incidence of attack. The book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks. Using their automated verification methodology, the authors formally prove for the first time whether strategies such as selective filtering, strong authentication, and client puzzles actually reduce the vulnerability of a network to DoS attacks.
"Security and Survivability" presents new research on the emerging discipline of design and analysis of security systems that are survivable. Such systems are designed to continue to provide verifiable security guarantees, and allow the system to degrade gracefully, even under threat or actual incidence of attack. The book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks. Using their automated verification methodology, the authors formally prove for the first time whether strategies such as selective filtering, strong authentication, and client puzzles actually reduce the vulnerability of a network to DoS attacks.
A Formal Description of Survivability.- Information Access, Information Protection.- Modeling Insecurity.- Modeling Recovery.- The Denial of Service Example.- Modeling Access Control.- Modeling Dependability.
Erscheint lt. Verlag | 1.8.2008 |
---|---|
Zusatzinfo | 25 illus. |
Verlagsort | New York, NY |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-387-27627-0 / 0387276270 |
ISBN-13 | 978-0-387-27627-4 / 9780387276274 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €