Buch, Englisch, Band 2946, 272 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 429 g
FOSAD 2001/2002 Tutorial Lectures
Buch, Englisch, Band 2946, 272 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 429 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-20955-3
Verlag: Springer Berlin Heidelberg
Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness.
This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro, Italy, in September 2001 and September 2002. The lectures are devoted to:
- Formal Approaches to Approximating Noninterference Properties
- The Key Establishment Problem
- Name-Passing Calculi and Cryptoprimitives
- Classification of Security Properties; Network Security
- Cryptographic Algorithms for Multimedia Traffic
- Security for Mobility
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Two Formal Approaches for Approximating Noninterference Properties.- The Key Establishment Problem.- A Survey of Name-Passing Calculi and Crypto-Primitives.- Classification of Security Properties.- Cryptographic Algorithms for Multimedia Traffic.- Security for Mobility.