Foundations of Security Analysis and Design -

Foundations of Security Analysis and Design

FOSAD 2006/2007 Turtorial Lectures
Buch | Softcover
VII, 328 Seiten
2007 | 2007
Springer Berlin (Verlag)
978-3-540-74809-0 (ISBN)
53,49 inkl. MwSt
lt;p>The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.

Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.

Erscheint lt. Verlag 30.8.2007
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo VII, 328 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 510 g
Themenwelt Mathematik / Informatik Informatik Betriebssysteme / Server
Informatik Theorie / Studium Kryptologie
Schlagworte authentication • Cryptanalysis • Cryptographic Hardware • cryptography • cypher implementation • Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen • Hardware Implementation • HC/Informatik, EDV/Betriebssysteme, Benutzeroberflächen • identity based cryptography • Information • Intrusion Detection • IT Security • Java • Java Security • low-level software security • privacy • security • Security Engineering • side-channel attacks • Smart cards • Systems Security • trusted mobile platforms • trust requirements • trust systems • UML
ISBN-10 3-540-74809-1 / 3540748091
ISBN-13 978-3-540-74809-0 / 9783540748090
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich