Knihobot

Computer security

Hodnocení knihy

4,0(4)Ohodnotit

Parametry

  • 548 stránek
  • 20 hodin čtení

Více o knize

The content covers a range of topics in cybersecurity and privacy, including peer-to-peer file-sharing detection through network behaviors, timing analysis in low-latency mix networks, and secure multiparty computation using smart cards. It addresses private information retrieval with trusted hardware and explores the relationship between inter-communication boundaries and trusted components. The text discusses license transfer in OMA-DRM and enhances security architecture for mobile music distribution. It presents formal models for access control in mobile devices, discretionary capability confinement, and minimal threshold closure. The work reduces SPKI/SDSI's reliance on PKI and examines delegation in role-based access control. It applies a security requirements engineering process and evaluates the survivability of intrusion-tolerant database systems. Additionally, it introduces a formal framework for confidentiality-preserving refinement and analyzes timing-sensitive information flow in synchronous systems. Other topics include history-based access control, secure key-updating for lazy revocation, cryptographic proofs for Kerberos, and the limits of Dolev-Yao models. The text also discusses session handling immune to XSS, policy-driven memory protection for reconfigurable hardware, privacy-preserving queries on encrypted data, and vulnerability assessments in iterative servers. Finally, it aims to develop an information-t

Nákup knihy

Computer security, Dieter Gollmann

Jazyk
Rok vydání
2006
product-detail.submit-box.info.binding
(měkká)
Zrovna tento výtisk už nemáme.
nebo
Zobrazit jiný výtisk

Doručení

Platební metody

4,0
Velmi dobrá
4 Hodnocení

Tady nám chybí tvá recenze.