Security in computing systems: challenges, approaches, and solutions

Security in computing systems: challenges, approaches, and solutions

Biskup, J.

68,85 €(IVA inc.)

With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with anemphasis on control and monitoring on the one hand and on cryptography on theother; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outliningthe achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad andcomprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who requirean introduction to the state of the art in this field. In addition, it can beused as the basis for graduate courses on security issues in computing. Broadand comprehensive coverage of all issues related to computer security Presents both informal surveys as well as rigorous formalizations when necessary Includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP INDICE: Part I: Challenges and Basic Approaches: 1) Introduction - 2) Fundamental Challenges - 3) Computing Systems and their Basic Vulnerabilities.- Part II: Fundamentals of Information Flow and Inference Control - 4) Messages, Inferences, Information and Knowledge - 5) Preventive Inference Control.- Part III: Security Mechanisms.- 6) Key Ideas and Examples - 7) Combined Techniques - 8) Techniques of Control and Monitoring - 9) Conceptual Access Rights - 10) Elements of a Security Architecture - 11) Monitoring and Intrusion Detection -12) Techniques of Cryptography - 13) Encryption - 14) Authentication - 15) Anonymization - 16) Some Further Cryptographic Protocols.- Part IV: Implementations - 17) Design of Selected Systems.- Appendix, References, Index.- 11 References.- 12 Index.

  • ISBN: 978-3-540-78441-8
  • Editorial: Springer
  • Encuadernacion: Cartoné
  • Páginas: 700
  • Fecha Publicación: 01/06/2008
  • Nº Volúmenes: 1
  • Idioma: Inglés