Foundations of Security Analysis and Design: FOSAD 2006/2007 Turtorial LecturesAlessandro Aldini, Roberto Gorrieri Springer Science & Business Media, 2007. gada 30. aug. - 328 lappuses The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. |
Saturs
Principles and Calculi | 1 |
Secure Service Orchestration | 24 |
IT Security Analysis Best Practices and Formal Approaches | 75 |
Attacks and Defenses | 92 |
Enhancing Java Security with History Based Access Control | 135 |
On the Protection and Technologies of Critical Information Infrastructures | 160 |
An Interpretation of IdentityBased Cryptography | 183 |
Trust and Reputation Systems | 209 |
An Introduction to the Role Based Trust Management Framework RT | 246 |
Trusted Mobile Platforms | 282 |
324 | |
Citi izdevumi - Skatīt visu
Foundations of Security Analysis and Design: FOSAD 2006/2007 Turtorial Lectures Alessandro Aldini,Roberto Gorrieri Ierobežota priekšskatīšana - 2007 |
Foundations of Security Analysis and Design: FOSAD 2006/2007 Turtorial Lectures Alessandro Aldini,Roberto Gorrieri Ierobežota priekšskatīšana - 2007 |
Bieži izmantoti vārdi un frāzes
access control ACM.member agent algorithm Alice architecture ASLR attack trees authentication behaviour buffer overflow bytecode bytes certificate checks communication Computer Security credential cryptographic defenses defined described encryption enforcement entity environment EOrg.preferred example execution exploit function graph Heidelberg history expression IBE scheme identity-based implementation integrity invoked Java Virtual Machine key extraction key pair language LNCS low-level machine code mechanisms MIDlet mobile device monitor node OMA DRM OMA DRM v2 operating system PageRank platform pointer private key protection public key ratings reputation score reputation systems request role Section security analysis security policy security protocols semantics Sensor Networks signature signcryption solution specific Springer stack strcmp system libraries threats trust and reputation trust management trusted computing Trusted Computing Group valid variables vulnerabilities Wireless Sensor Networks