Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.
Business intelligence. --- Computer networks -- Security measures. --- Computer security. --- Data protection. --- Electronic data processing -- Security measures. --- Computer security --- Computer Science --- Engineering & Applied Sciences --- Data encryption (Computer science) --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Electronic data processing --- Cryptography --- Information Systems. --- Cryptology. --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Informatics --- Science --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems
Choose an application
Choose an application
Choose an application
681.3*H2 --- Database management --- 681.3*F13 --- 681.3*F41 --- 681.3*I2 --- Database management: security; integrity; protection--See also {?681.5*E5} --- Congresses. --- Complexity classes: complexity hierarchies; machine-independent complexity; reducibility and completeness; relations among complexity classes; relations among complexity measures (Computation by abstract devices)--See also {681.3*F2} --- Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- Artificial intelligence. AI --- 681.3*I2 Artificial intelligence. AI --- 681.3*F41 Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- 681.3*F13 Complexity classes: complexity hierarchies; machine-independent complexity; reducibility and completeness; relations among complexity classes; relations among complexity measures (Computation by abstract devices)--See also {681.3*F2} --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- Bases de données --- Congresses --- Gestion --- Congrès --- Databases.
Choose an application
These proceedings contain the papers selected for presentation at the 12th - ropean Symposium on Research in Computer Security - ESORICS 2007 - held in Dresden, Germany, September 24-26, 2007. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in di?erentEuropeancountries. Itattracts aninternationalaudience fromboththe academic and industrial communities. From 2002 it has taken place yearly. As solicited in the call for papers, the contributions present theory, mec- nisms, applications, or practical experience on all traditional or emerging topics relevantfor securityin computing systems,approximatelycoveringthe following topics: - security architecture and secure components (trusted computing modules, smartcards,personal computing devices, networks,information systems, - plications, peer-to-peer connections, language-based security, . . . ) - access control (authorization, privileges, delegation, revocation, credentials, authentication, accountability, safety analysis, . . . ) - informationcontrol(data ?ows,information?ows,inferences,covertchannel analysis, . . . ) - applied cryptography (protocol design, protocol veri?cation, authentication protocols, identity management, key distribution, . . . ) - tolerance and survivability (attack models, vulnerability analysis, intrusion detection, malware collection and analysis, . . . ) - security management (requirements engineering, policy speci?cation, trust evaluation, policy enforcement, . . . ) - secure electronic commerce, administration, and government (digital rights management, intellectual property protection, privacy-enhancing techno- gies, e-voting, . . . ) - formal methods in security (security models, security veri?cation, . . . ) The 164 papers submitted were each reviewed by three members of the p- gram committee, and subsequently intensively - and partially controversially - discussed not only by the reviewers, but in principle by all committee members.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- maatschappij --- database management --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
Choose an application
With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.
Choose an application
Choose an application
These proceedings contain the papers selected for presentation at the 12th - ropean Symposium on Research in Computer Security - ESORICS 2007 - held in Dresden, Germany, September 24-26, 2007. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in di?erentEuropeancountries. Itattracts aninternationalaudience fromboththe academic and industrial communities. From 2002 it has taken place yearly. As solicited in the call for papers, the contributions present theory, mec- nisms, applications, or practical experience on all traditional or emerging topics relevantfor securityin computing systems,approximatelycoveringthe following topics: - security architecture and secure components (trusted computing modules, smartcards,personal computing devices, networks,information systems, - plications, peer-to-peer connections, language-based security, . . . ) - access control (authorization, privileges, delegation, revocation, credentials, authentication, accountability, safety analysis, . . . ) - informationcontrol(data ?ows,information?ows,inferences,covertchannel analysis, . . . ) - applied cryptography (protocol design, protocol veri?cation, authentication protocols, identity management, key distribution, . . . ) - tolerance and survivability (attack models, vulnerability analysis, intrusion detection, malware collection and analysis, . . . ) - security management (requirements engineering, policy speci?cation, trust evaluation, policy enforcement, . . . ) - secure electronic commerce, administration, and government (digital rights management, intellectual property protection, privacy-enhancing techno- gies, e-voting, . . . ) - formal methods in security (security models, security veri?cation, . . . ) The 164 papers submitted were each reviewed by three members of the p- gram committee, and subsequently intensively - and partially controversially - discussed not only by the reviewers, but in principle by all committee members.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- maatschappij --- database management --- informatica management --- OS (operating system) --- computernetwerken
Choose an application
This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed database management systems and the relationship between logic and databases.
Information systems --- 681.3*H2 --- Database management --- Relational databases --- -681.3*F41 --- 681.3*G21 --- Relational data bases --- Databases --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Database management: security; integrity; protection--See also {?681.5*E5} --- Mathematical models --- -Congresses. --- Congresses --- Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- Combinatorics: combinatorial algorithms; counting problems; generating functions; permutations and combinations; recurrences and difference equations --- Congresses. --- 681.3*G21 Combinatorics: combinatorial algorithms; counting problems; generating functions; permutations and combinations; recurrences and difference equations --- 681.3*F41 Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*F41 --- Mathematical models&delete& --- Information theory. --- Data structures (Computer scienc. --- Computer science. --- Theory of Computation. --- Data Structures and Information Theory. --- Models and Principles. --- Informatics --- Science --- Communication theory --- Communication --- Cybernetics --- Databases. --- Data Base --- Relational Model --- Model --- Lncs
Listing 1 - 10 of 11 | << page >> |
Sort by
|