The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.
The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.
Artikelnr. des Verlages: 12119967, 978-3-540-74809-0
2007
Seitenzahl: 336
Erscheinungstermin: 30. August 2007
Englisch
Abmessung: 235mm x 155mm x 19mm
Gewicht: 517g
ISBN-13: 9783540748090
ISBN-10: 3540748091
Artikelnr.: 23111925
Herstellerkennzeichnung
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826