
Parametry
Více o knize
InhaltsverzeichnisFinding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.Private Information Retrieval Using Trusted Hardware.Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.License Transfer in OMA-DRM.Enhanced Security Architecture for Music Distribution on Mobile.A Formal Model of Access Control for Mobile Interactive Devices.Discretionary Capability Confinement.Minimal Threshold Closure.Reducing the Dependence of SPKI/SDSI on PKI.Delegation in Role-Based Access Control.Applying a Security Requirements Engineering Process.Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.A Formal Framework for Confidentiality-Preserving Refinement.Timing-Sensitive Information Flow Analysis for Synchronous Systems.HBAC: A Model for History-Based Access Control and Its Model Checking.From Coupling Relations to Mated Invariants for Checking Information Flow.A Linear Logic of Authorization and Knowledge.Prêt à Voter with Re-encryption Mixes.Secure Key-Updating for Lazy Revocation.Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.Deriving Secrecy in Key Establishment Protocols.Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.Conditional Reactive Simulatability.SessionSafe: Implementing XSS Immune Session Handling.Policy-Driven Memory Protection for Reconfigurable Hardware.Privacy-Preserving Queries on Encrypted Data.Analysis of Policy Anomalies on Distributed Network Security Setups.Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Nákup knihy
Computer security, Dieter Gollmann
- Jazyk
- Rok vydání
- 2006
Doručení
Platební metody
Navrhnout úpravu
- Titul
- Computer security
- Jazyk
- anglicky
- Autoři
- Dieter Gollmann
- Vydavatel
- Springer
- Rok vydání
- 2006
- ISBN10
- 354044601X
- ISBN13
- 9783540446019
- Kategorie
- Počítače, IT, programování
- Anotace
- InhaltsverzeichnisFinding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.Private Information Retrieval Using Trusted Hardware.Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.License Transfer in OMA-DRM.Enhanced Security Architecture for Music Distribution on Mobile.A Formal Model of Access Control for Mobile Interactive Devices.Discretionary Capability Confinement.Minimal Threshold Closure.Reducing the Dependence of SPKI/SDSI on PKI.Delegation in Role-Based Access Control.Applying a Security Requirements Engineering Process.Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.A Formal Framework for Confidentiality-Preserving Refinement.Timing-Sensitive Information Flow Analysis for Synchronous Systems.HBAC: A Model for History-Based Access Control and Its Model Checking.From Coupling Relations to Mated Invariants for Checking Information Flow.A Linear Logic of Authorization and Knowledge.Prêt à Voter with Re-encryption Mixes.Secure Key-Updating for Lazy Revocation.Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.Deriving Secrecy in Key Establishment Protocols.Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.Conditional Reactive Simulatability.SessionSafe: Implementing XSS Immune Session Handling.Policy-Driven Memory Protection for Reconfigurable Hardware.Privacy-Preserving Queries on Encrypted Data.Analysis of Policy Anomalies on Distributed Network Security Setups.Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.