Trusted Information
Editat de Michel Dupuy, Pierre Paradinasen Limba Engleză Hardback – 31 mai 2001
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 1180.76 lei 6-8 săpt. | |
| Springer – 23 mar 2013 | 1180.76 lei 6-8 săpt. | |
| Hardback (1) | 1186.31 lei 6-8 săpt. | |
| Springer – 31 mai 2001 | 1186.31 lei 6-8 săpt. |
Preț: 1186.31 lei
Preț vechi: 1446.72 lei
-18% Nou
Puncte Express: 1779
Preț estimativ în valută:
209.93€ • 244.81$ • 184.32£
209.93€ • 244.81$ • 184.32£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780792373896
ISBN-10: 0792373898
Pagini: 508
Ilustrații: XVIII, 490 p.
Dimensiuni: 160 x 241 x 32 mm
Greutate: 0.92 kg
Ediția:2001
Editura: Springer
Locul publicării:New York, NY, United States
ISBN-10: 0792373898
Pagini: 508
Ilustrații: XVIII, 490 p.
Dimensiuni: 160 x 241 x 32 mm
Greutate: 0.92 kg
Ediția:2001
Editura: Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
eSociety.- PyTHIA: Towards Anonymity in Authentication.- Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?.- Internet Anonymity: Problems and Solutions.- TTP Management and PKI.- Reducing Certificate Revocation Cost using NPKI.- The Need and Practice of User Authentication and TTP Services in Distributed Health Information Systems.- Smart Card.- Is the Performance of Smart Card Crytographic Functions the Real Bottleneck?.- Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec.- Security Protocols.- Strong Forward Security.- Secret Sharing and Visual Cryptography Schemes.- A Two-level Time-Stamping System.- Security Analysis of the Cliques Protocols Suites: First Results.- Secure Workflow Environment.- A Secure Workflow System for Dynamic Collaboration.- On Securely Scheduling a Meeting.- Modeling and Analyzing Separation of Duties in Workflow Environments.- Secure Group Communications.- Group Security Association (GSA) Management in IP Multicast.- Communication-Efficient Group Key Agreement.- Security Policies.- Going Beyond MAC and DAC Using Mobile Policies.- An Access Control Model for Data Archives.- Risk Management.- Checklist-Based Risk Analysis with Evidential Reasoning.- Improving the Protection of Assets in Open Distributed Systems by Use of X-ifying Risk Analysis.- The Security Model to Combine the Corporate and Information Security.- Design Criteria to Classified Information Systems Numerically.- Network Security and Intrusion Detection.- Deception: A Tool and Curse for Security Management.- A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection.- ADeLe: An Attack Description Language for Knowledge-Based Intrusion Detection.- Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.- Trusted Platforms.- An Efficient Software Protection Scheme.- Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.- Trusted System Design and Management.- Security Concerns for Contemporary Development Practices.- A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.- Redefining Information Systems Security: Viable Information Systems.- Extended Description Techniques for Security Engineering.