Buch, Englisch, Band 4677, 328 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 511 g
FOSAD 2006/2007 Turtorial Lectures
Buch, Englisch, Band 4677, 328 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 511 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-74809-0
Verlag: Springer Berlin Heidelberg
The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmierung: Methoden und Allgemeines
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Prozedurale Programmierung
Weitere Infos & Material
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.