Bookbot

Computer security

Hodnotenie knihy

4,0(4)Ohodnotiť

Parametre

  • 548 stránok
  • 20 hodin čítania

Viac o knihe

The content covers a range of topics in cybersecurity and privacy, including peer-to-peer file-sharing detection through network behaviors, timing analysis in low-latency mix networks, and secure multiparty computation using smart cards. It addresses private information retrieval with trusted hardware and explores the relationship between inter-communication boundaries and trusted components. The text discusses license transfer in OMA-DRM and enhances security architecture for mobile music distribution. It presents formal models for access control in mobile devices, discretionary capability confinement, and minimal threshold closure. The work reduces SPKI/SDSI's reliance on PKI and examines delegation in role-based access control. It applies a security requirements engineering process and evaluates the survivability of intrusion-tolerant database systems. Additionally, it introduces a formal framework for confidentiality-preserving refinement and analyzes timing-sensitive information flow in synchronous systems. Other topics include history-based access control, secure key-updating for lazy revocation, cryptographic proofs for Kerberos, and the limits of Dolev-Yao models. The text also discusses session handling immune to XSS, policy-driven memory protection for reconfigurable hardware, privacy-preserving queries on encrypted data, and vulnerability assessments in iterative servers. Finally, it aims to develop an information-t

Nákup knihy

Computer security, Dieter Gollmann

Jazyk
Rok vydania
2006
product-detail.submit-box.info.binding
(mäkká)
Túto kópiu už nemáme.
alebo
Zobraziť ďalšiu kópiu

Platobné metódy

4,0
Veľmi dobrá
4 Hodnotenie

Tu nám chýba tvoja recenzia