
En savoir plus sur le livre
The content covers a range of topics in cybersecurity and privacy, including peer-to-peer file-sharing detection through network behaviors, timing analysis in low-latency mix networks, and secure multiparty computation using smart cards. It addresses private information retrieval with trusted hardware and explores the relationship between inter-communication boundaries and trusted components. The text discusses license transfer in OMA-DRM and enhances security architecture for mobile music distribution. It presents formal models for access control in mobile devices, discretionary capability confinement, and minimal threshold closure. The work reduces SPKI/SDSI's reliance on PKI and examines delegation in role-based access control. It applies a security requirements engineering process and evaluates the survivability of intrusion-tolerant database systems. Additionally, it introduces a formal framework for confidentiality-preserving refinement and analyzes timing-sensitive information flow in synchronous systems. Other topics include history-based access control, secure key-updating for lazy revocation, cryptographic proofs for Kerberos, and the limits of Dolev-Yao models. The text also discusses session handling immune to XSS, policy-driven memory protection for reconfigurable hardware, privacy-preserving queries on encrypted data, and vulnerability assessments in iterative servers. Finally, it aims to develop an information-t
Modes de paiement
Il manque plus que ton avis ici.