Bookbot

Computer security

Évaluation du livre

4,0(4)Évaluer

En savoir plus sur le livre

The content covers a range of topics in cybersecurity and privacy, including peer-to-peer file-sharing detection through network behaviors, timing analysis in low-latency mix networks, and secure multiparty computation using smart cards. It addresses private information retrieval with trusted hardware and explores the relationship between inter-communication boundaries and trusted components. The text discusses license transfer in OMA-DRM and enhances security architecture for mobile music distribution. It presents formal models for access control in mobile devices, discretionary capability confinement, and minimal threshold closure. The work reduces SPKI/SDSI's reliance on PKI and examines delegation in role-based access control. It applies a security requirements engineering process and evaluates the survivability of intrusion-tolerant database systems. Additionally, it introduces a formal framework for confidentiality-preserving refinement and analyzes timing-sensitive information flow in synchronous systems. Other topics include history-based access control, secure key-updating for lazy revocation, cryptographic proofs for Kerberos, and the limits of Dolev-Yao models. The text also discusses session handling immune to XSS, policy-driven memory protection for reconfigurable hardware, privacy-preserving queries on encrypted data, and vulnerability assessments in iterative servers. Finally, it aims to develop an information-t

Édition

Achat du livre

Computer security, Dieter Gollmann

Langue
Année de publication
2006
product-detail.submit-box.info.binding
(souple)
Cet exemplaire n’est plus disponible.
ou
Afficher un autre exemplaire

Modes de paiement

4,0
Très bien
4 Évaluations

Il manque plus que ton avis ici.