Plus d’un million de livres, à portée de main !
Bookbot

Computer Security

Paramètres

  • 457pages
  • 16 heures de lecture

En savoir plus sur le livre

This work explores various advanced topics in security and privacy, presenting innovative frameworks and methodologies. It discusses dynamic constraints within flexible authorization systems and introduces access-control mechanisms tailored for XML databases. The text delves into the algebra of enterprise privacy policy composition and examines the GDOI protocol's vulnerabilities and defenses. It highlights enhancements in privacy for trusted computing platforms and provides a cryptographically sound security proof for the Otway-Rees protocol. Anonymity and onion routing are formally analyzed, alongside techniques for breaking JPEG steganography using statistical methods. The work compares practical mix designs and proposes signature bouquets for aggregated signatures' immutability. It advances the theory of data entanglement and presents portable document access control mechanisms. The discussion includes possibilistic information flow control amid encrypted communication and revisits information flow control principles. Security property-based controls are examined, and a vector model of trust is proposed for trustworthy systems. Key distribution mechanisms for wireless sensor networks are combinatorially designed, and strategies to hinder eavesdropping via IPv6 encryption are detailed. The text addresses the significance of key schedules in cipher attacks, introduces a public-key encryption scheme with pseudo-random ciphe

Achat du livre

Computer Security, Pierangela Samarati

Langue
Année de publication
2004
product-detail.submit-box.info.binding
(souple)
Nous vous informerons par e-mail dès que nous l’aurons retrouvé.

Modes de paiement

Personne n'a encore évalué .Évaluer