Compra 10 libros por 10 € aquí!
Bookbot

Computer Security

Parámetros

  • 457 páginas
  • 16 horas de lectura

Más información sobre el libro

This work explores various advanced topics in security and privacy, presenting innovative frameworks and methodologies. It discusses dynamic constraints within flexible authorization systems and introduces access-control mechanisms tailored for XML databases. The text delves into the algebra of enterprise privacy policy composition and examines the GDOI protocol's vulnerabilities and defenses. It highlights enhancements in privacy for trusted computing platforms and provides a cryptographically sound security proof for the Otway-Rees protocol. Anonymity and onion routing are formally analyzed, alongside techniques for breaking JPEG steganography using statistical methods. The work compares practical mix designs and proposes signature bouquets for aggregated signatures' immutability. It advances the theory of data entanglement and presents portable document access control mechanisms. The discussion includes possibilistic information flow control amid encrypted communication and revisits information flow control principles. Security property-based controls are examined, and a vector model of trust is proposed for trustworthy systems. Key distribution mechanisms for wireless sensor networks are combinatorially designed, and strategies to hinder eavesdropping via IPv6 encryption are detailed. The text addresses the significance of key schedules in cipher attacks, introduces a public-key encryption scheme with pseudo-random ciphe

Compra de libros

Computer Security, Pierangela Samarati

Idioma
Publicado en
2004
product-detail.submit-box.info.binding
(Tapa blanda)
Te avisaremos por correo electrónico en cuanto lo localicemos.

Métodos de pago

Nadie lo ha calificado todavía.Añadir reseña