Computer Security - ESORICS 92
Editat de Yves Deswarte, Gerard Eizenberg, Jean-Jacques Quisquateren Limba Engleză Paperback – 10 noi 1992
Preț: 330.75 lei
Preț vechi: 413.43 lei
-20%
Puncte Express: 496
Preț estimativ în valută:
58.49€ • 67.07$ • 50.55£
58.49€ • 67.07$ • 50.55£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783540562467
ISBN-10: 354056246X
Pagini: 468
Ilustrații: XII, 456 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.7 kg
Ediția:1992
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354056246X
Pagini: 468
Ilustrații: XII, 456 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.7 kg
Ediția:1992
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Access Control.- Towards security in an open systems federation.- Type-level access controls for distributed structurally object-oriented database systems.- On the Chinese Wall model.- Formal Methods.- Formal methods and automated tool for timing-channel identification in tcb source code.- Separating the specification and implementation phases in cryptology.- Formal specification of security requirements using the theory of normative positions.- Invited Talk.- Breaking the traditional computer security research barriers.- Authentication I.- Verification and modelling of authentication protocols.- KryptoKnight authentication and key distribution system.- Associating metrics to certification paths.- Distributed Systems.- An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems.- The development and testing of the identity-based conference key distribution system for the RHODOS distributed system.- Policy enforcement in stub autonomousdomains.- Authentication II.- Freshness assurance of authentication protocols.- A formal framework for authentication.- Timely authentication in distributed systems.- Database Security.- Polyinstantiation for cover stories.- On transaction processing for multilevel secure replicated databases.- Security constraint processing in multilevel secure AMAC schemata.- System Architectures.- M2S: A machine for multilevel security.- GDoM a multilevel document manager.- Applications.- UEPS — A second generation electronic wallet.- A hardware design model for cryptographic algorithms.- ASAX: Software architecture and rule-based language for universal audit trail analysis.