Più di un milione di libri, a un clic di distanza!
Bookbot

Computer security

Valutazione del libro

4,0(4)Aggiungi una valutazione

Parametri

  • 548pagine
  • 20 ore di lettura

Maggiori informazioni sul libro

The content covers a range of topics in cybersecurity and privacy, including peer-to-peer file-sharing detection through network behaviors, timing analysis in low-latency mix networks, and secure multiparty computation using smart cards. It addresses private information retrieval with trusted hardware and explores the relationship between inter-communication boundaries and trusted components. The text discusses license transfer in OMA-DRM and enhances security architecture for mobile music distribution. It presents formal models for access control in mobile devices, discretionary capability confinement, and minimal threshold closure. The work reduces SPKI/SDSI's reliance on PKI and examines delegation in role-based access control. It applies a security requirements engineering process and evaluates the survivability of intrusion-tolerant database systems. Additionally, it introduces a formal framework for confidentiality-preserving refinement and analyzes timing-sensitive information flow in synchronous systems. Other topics include history-based access control, secure key-updating for lazy revocation, cryptographic proofs for Kerberos, and the limits of Dolev-Yao models. The text also discusses session handling immune to XSS, policy-driven memory protection for reconfigurable hardware, privacy-preserving queries on encrypted data, and vulnerability assessments in iterative servers. Finally, it aims to develop an information-t

Pubblicazione

Acquisto del libro

Computer security, Dieter Gollmann

Lingua
Pubblicato
2006
product-detail.submit-box.info.binding
(In brossura)
Non disponiamo più di questa copia specifica.
o
Visualizza un'altra copia

Metodi di pagamento

4,0
Molto buono
4 Valutazioni

Qui potrebbe esserci la tua recensione.