๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Security in Computing Systems: Challenges, Approaches and Solutions

โœ Scribed by Prof. Dr. Joachim Biskup (auth.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2009
Tongue
English
Leaves
705
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks.

He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP.

Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.

โœฆ Table of Contents


Front Matter....Pages i-xxvii
Front Matter....Pages 1-1
Introduction....Pages 3-28
Fundamental Challenges....Pages 29-51
Computing Systems and Their Basic Vulnerabilities....Pages 53-64
Front Matter....Pages 65-65
Messages, Inferences, Information and Knowledge....Pages 67-92
Preventive Inference Control....Pages 93-153
Front Matter....Pages 155-155
Key Ideas and Examples....Pages 157-180
Combined Techniques....Pages 181-202
Techniques of Control and Monitoring: Essentials....Pages 203-208
Conceptual Access Rights....Pages 209-301
Elements of a Security Architecture....Pages 303-354
Monitoring and Intrusion Detection....Pages 355-367
Techniques of Cryptography: Essentials....Pages 369-427
Encryption....Pages 429-478
Authentication....Pages 479-512
Anonymization....Pages 513-525
Some Further Cryptographic Protocols....Pages 527-557
Front Matter....Pages 559-559
Design of Selected Systems....Pages 561-623
Back Matter....Pages 625-694

โœฆ Subjects


Systems and Data Security; Management of Computing and Information Systems; Data Encryption


๐Ÿ“œ SIMILAR VOLUMES


Cybersecurity and Secure Information Sys
โœ Aboul Ella Hassanien, Mohamed Elhoseny ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p></p><p>This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering

Cybersecurity and secure information sys
โœ Hassanien, Aboul Ella(Editor);Elhoseny, Mohamed(Editor) ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer ๐ŸŒ English

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects o

Computer Security, Privacy and Politics:
โœ Ramesh Subramanian ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound

Computer Security, Privacy and Politics:
โœ Ramesh Subramanian, Ramesh Subramanian ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› IGI Global ๐ŸŒ English

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound

Computer Security, Privacy and Politics:
โœ Ramesh Subramanian, Ramesh Subramanian ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› IRM Press ๐ŸŒ English

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound