10 libri per 10 euro qui
Bookbot

Computer Security

Parametri

  • 457pagine
  • 16 ore di lettura

Maggiori informazioni sul libro

This work explores various advanced topics in security and privacy, presenting innovative frameworks and methodologies. It discusses dynamic constraints within flexible authorization systems and introduces access-control mechanisms tailored for XML databases. The text delves into the algebra of enterprise privacy policy composition and examines the GDOI protocol's vulnerabilities and defenses. It highlights enhancements in privacy for trusted computing platforms and provides a cryptographically sound security proof for the Otway-Rees protocol. Anonymity and onion routing are formally analyzed, alongside techniques for breaking JPEG steganography using statistical methods. The work compares practical mix designs and proposes signature bouquets for aggregated signatures' immutability. It advances the theory of data entanglement and presents portable document access control mechanisms. The discussion includes possibilistic information flow control amid encrypted communication and revisits information flow control principles. Security property-based controls are examined, and a vector model of trust is proposed for trustworthy systems. Key distribution mechanisms for wireless sensor networks are combinatorially designed, and strategies to hinder eavesdropping via IPv6 encryption are detailed. The text addresses the significance of key schedules in cipher attacks, introduces a public-key encryption scheme with pseudo-random ciphe

Acquisto del libro

Computer Security, Pierangela Samarati

Lingua
Pubblicato
2004
product-detail.submit-box.info.binding
(In brossura)
Ti avviseremo via email non appena lo rintracceremo.

Metodi di pagamento