Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Artikelnr. des Verlages: 12119967, 978-3-540-74809-0
Seitenzahl: 336
Erscheinungstermin: 30. August 2007
Englisch
Abmessung: 235mm x 155mm x 19mm
Gewicht: 517g
ISBN-13: 9783540748090
ISBN-10: 3540748091
Artikelnr.: 23111925
Herstellerkennzeichnung
Springer-Verlag KG
Sachsenplatz 4-6
1201 Wien, AT
ProductSafety@springernature.com
Inhaltsangabe
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Foundations of Security Analysis and Design.- Security Protocols: Principles and Calculi.- Secure Service Orchestration.- IT Security Analysis Best Practices and Formal Approaches.- Low-Level Software Security: Attacks and Defenses.- Enhancing Java Security with History Based Access Control.- On the Protection and Technologies of Critical Information Infrastructures.- An Interpretation of Identity-Based Cryptography.- Trust and Reputation Systems.- An Introduction to the Role Based Trust Management Framework RT.- Trusted Mobile Platforms.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826