Normal view MARC view ISBD view

Foundations of Security Analysis and Design [electronic resource] : FOSAD 2006/2007 Turtorial Lectures / edited by Alessandro Aldini, Roberto Gorrieri.

Contributor(s): Aldini, Alessandro [editor.] | Gorrieri, Roberto [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 4677Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007.Description: VII, 328 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540748106.Subject(s): Cryptography | Data encryption (Computer science) | Operating systems (Computers) | Computer networks  | Electronic data processing -- Management | Computer science | Compilers (Computer programs) | Cryptology | Operating Systems | Computer Communication Networks | IT Operations | Computer Science Logic and Foundations of Programming | Compilers and InterpretersAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Foundations of Security Analysis and Design -- Security Protocols: Principles and Calculi -- Secure Service Orchestration -- IT Security Analysis Best Practices and Formal Approaches -- Low-Level Software Security: Attacks and Defenses -- Enhancing Java Security with History Based Access Control -- On the Protection and Technologies of Critical Information Infrastructures -- An Interpretation of Identity-Based Cryptography -- Trust and Reputation Systems -- An Introduction to the Role Based Trust Management Framework RT -- Trusted Mobile Platforms.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Foundations of Security Analysis and Design -- Security Protocols: Principles and Calculi -- Secure Service Orchestration -- IT Security Analysis Best Practices and Formal Approaches -- Low-Level Software Security: Attacks and Defenses -- Enhancing Java Security with History Based Access Control -- On the Protection and Technologies of Critical Information Infrastructures -- An Interpretation of Identity-Based Cryptography -- Trust and Reputation Systems -- An Introduction to the Role Based Trust Management Framework RT -- Trusted Mobile Platforms.

There are no comments for this item.

Log in to your account to post a comment.