Narrow your search

Library

KU Leuven (6)

ULiège (4)

EhB (3)

KBR (3)

AP (2)

KDG (2)

Odisee (2)

Thomas More Mechelen (2)

UCLL (2)

UGent (2)

More...

Resource type

book (10)

digital (2)


Language

English (10)

German (1)


Year
From To Submit

2022 (1)

2009 (2)

2008 (1)

2007 (2)

1992 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Security in computing systems : challenges, approaches and solutions
Author:
ISBN: 3540784411 3642097197 9786611876302 1281876305 354078442X 9783540784418 Year: 2008 Publisher: New York: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.

Keywords

Business intelligence. --- Computer networks -- Security measures. --- Computer security. --- Data protection. --- Electronic data processing -- Security measures. --- Computer security --- Computer Science --- Engineering & Applied Sciences --- Data encryption (Computer science) --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer science. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Electronic data processing --- Cryptography --- Information Systems. --- Cryptology. --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Informatics --- Science --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems


Digital
Security in Computing Systems
Author:
ISBN: 9783540784425 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Ueber bi-immune Mengen : dissertation (...) Aachen
Author:
Year: 1975 Publisher: Aachen [s.n.]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Database theory-ICDT '92 : 4th international conference , Berlin, Germany, October 1992 : proceedings
Authors: ---
ISBN: 0387560394 3540560394 Year: 1992 Volume: 646 Publisher: Berlin London Tokyo Springer Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Computer Security – ESORICS 2007 : 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings
Authors: ---
ISBN: 9783540748359 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

These proceedings contain the papers selected for presentation at the 12th - ropean Symposium on Research in Computer Security - ESORICS 2007 - held in Dresden, Germany, September 24-26, 2007. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in di?erentEuropeancountries. Itattracts aninternationalaudience fromboththe academic and industrial communities. From 2002 it has taken place yearly. As solicited in the call for papers, the contributions present theory, mec- nisms, applications, or practical experience on all traditional or emerging topics relevantfor securityin computing systems,approximatelycoveringthe following topics: - security architecture and secure components (trusted computing modules, smartcards,personal computing devices, networks,information systems, - plications, peer-to-peer connections, language-based security, . . . ) - access control (authorization, privileges, delegation, revocation, credentials, authentication, accountability, safety analysis, . . . ) - informationcontrol(data ?ows,information?ows,inferences,covertchannel analysis, . . . ) - applied cryptography (protocol design, protocol veri?cation, authentication protocols, identity management, key distribution, . . . ) - tolerance and survivability (attack models, vulnerability analysis, intrusion detection, malware collection and analysis, . . . ) - security management (requirements engineering, policy speci?cation, trust evaluation, policy enforcement, . . . ) - secure electronic commerce, administration, and government (digital rights management, intellectual property protection, privacy-enhancing techno- gies, e-voting, . . . ) - formal methods in security (security models, security veri?cation, . . . ) The 164 papers submitted were each reviewed by three members of the p- gram committee, and subsequently intensively - and partially controversially - discussed not only by the reviewers, but in principle by all committee members.


Book
Design of relational database schemes by deleting attributes in the canonical decomposition
Authors: ---
Year: 1985 Publisher: Dortmund Universität Dortmund. Fachbereich Informatik

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Security in Computing Systems : Challenges, Approaches and Solutions
Authors: ---
ISBN: 9783540784425 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.


Book
A linear and a tableau oriented data manipulation language for the universal relation view DURST
Authors: ---
Year: 1984 Publisher: Dortmund Universität Dortmund. Fachbereich Informatik

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Computer Security - ESORICS 2007 : 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 26, 2007. Proceedings
Authors: --- ---
ISBN: 9783540748359 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

These proceedings contain the papers selected for presentation at the 12th - ropean Symposium on Research in Computer Security - ESORICS 2007 - held in Dresden, Germany, September 24-26, 2007. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in di?erentEuropeancountries. Itattracts aninternationalaudience fromboththe academic and industrial communities. From 2002 it has taken place yearly. As solicited in the call for papers, the contributions present theory, mec- nisms, applications, or practical experience on all traditional or emerging topics relevantfor securityin computing systems,approximatelycoveringthe following topics: - security architecture and secure components (trusted computing modules, smartcards,personal computing devices, networks,information systems, - plications, peer-to-peer connections, language-based security, . . . ) - access control (authorization, privileges, delegation, revocation, credentials, authentication, accountability, safety analysis, . . . ) - informationcontrol(data ?ows,information?ows,inferences,covertchannel analysis, . . . ) - applied cryptography (protocol design, protocol veri?cation, authentication protocols, identity management, key distribution, . . . ) - tolerance and survivability (attack models, vulnerability analysis, intrusion detection, malware collection and analysis, . . . ) - security management (requirements engineering, policy speci?cation, trust evaluation, policy enforcement, . . . ) - secure electronic commerce, administration, and government (digital rights management, intellectual property protection, privacy-enhancing techno- gies, e-voting, . . . ) - formal methods in security (security models, security veri?cation, . . . ) The 164 papers submitted were each reviewed by three members of the p- gram committee, and subsequently intensively - and partially controversially - discussed not only by the reviewers, but in principle by all committee members.

MFDBS 87 : 1st Symposium on mathematical fundamentals of database systems : Dresden, GDR, January 19-23, 1987 : proceedings
Authors: ---
ISBN: 3540191216 0387191216 354039124X 9783540191216 Year: 1988 Volume: 305 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed database management systems and the relationship between logic and databases.

Keywords

Information systems --- 681.3*H2 --- Database management --- Relational databases --- -681.3*F41 --- 681.3*G21 --- Relational data bases --- Databases --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Database management: security; integrity; protection--See also {?681.5*E5} --- Mathematical models --- -Congresses. --- Congresses --- Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- Combinatorics: combinatorial algorithms; counting problems; generating functions; permutations and combinations; recurrences and difference equations --- Congresses. --- 681.3*G21 Combinatorics: combinatorial algorithms; counting problems; generating functions; permutations and combinations; recurrences and difference equations --- 681.3*F41 Mathematical logic: computability theory; computational logic; lambda calculus; logic programming; mechanical theorem proving; model theory; proof theory;recursive function theory--See also {681.3*F11}; {681.3*I22}; {681.3*I23} --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*F41 --- Mathematical models&delete& --- Information theory. --- Data structures (Computer scienc. --- Computer science. --- Theory of Computation. --- Data Structures and Information Theory. --- Models and Principles. --- Informatics --- Science --- Communication theory --- Communication --- Cybernetics --- Databases. --- Data Base --- Relational Model --- Model --- Lncs

Listing 1 - 10 of 11 << page
of 2
>>
Sort by