Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Security in Computing Systems
Challenges, Approaches and Solutions
Buch von Joachim Biskup
Sprache: Englisch

160,49 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Aktuell nicht verfügbar

Kategorien:
Beschreibung
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, ¿computing¿ refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ¿¿information society¿¿, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ¿¿global information infrastructure¿¿ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, ¿computing¿ refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ¿¿information society¿¿, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ¿¿global information infrastructure¿¿ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.
Über den Autor

Joachim Biskup has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim and University of Dortmund again. He has done research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security. He served on the program committees of many international conferences, including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Database and Applications Security.

Zusammenfassung

Broad and comprehensive coverage of all issues related to computer security

Presents both informal surveys as well as rigorous formalizations when necessary

Includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP

Includes supplementary material: [...]

Inhaltsverzeichnis
Challenges and Basic Approaches.- Fundamental Challenges.- Computing Systems and Their Basic Vulnerabilities.- Fundamentals of Information Flow and Inference Control.- Messages, Inferences, Information and Knowledge.- Preventive Inference Control.- Security Mechanisms.- Key Ideas and Examples.- Combined Techniques.- Techniques of Control and Monitoring: Essentials.- Conceptual Access Rights.- Elements of a Security Architecture.- Monitoring and Intrusion Detection.- Techniques of Cryptography: Essentials.- Encryption.- Authentication.- Anonymization.- Some Further Cryptographic Protocols.- Implementations.- Design of Selected Systems.
Details
Erscheinungsjahr: 2008
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Inhalt: xxviii
694 S.
175 s/w Zeichng.
ISBN-13: 9783540784418
ISBN-10: 3540784411
Sprache: Englisch
Herstellernummer: 10899960
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Biskup, Joachim
Hersteller: Springer-Verlag GmbH
Springer Berlin Heidelberg
Maße: 241 x 160 x 44 mm
Von/Mit: Joachim Biskup
Erscheinungsdatum: 18.11.2008
Gewicht: 1,238 kg
Artikel-ID: 101851174
Über den Autor

Joachim Biskup has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim and University of Dortmund again. He has done research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security. He served on the program committees of many international conferences, including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Database and Applications Security.

Zusammenfassung

Broad and comprehensive coverage of all issues related to computer security

Presents both informal surveys as well as rigorous formalizations when necessary

Includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP

Includes supplementary material: [...]

Inhaltsverzeichnis
Challenges and Basic Approaches.- Fundamental Challenges.- Computing Systems and Their Basic Vulnerabilities.- Fundamentals of Information Flow and Inference Control.- Messages, Inferences, Information and Knowledge.- Preventive Inference Control.- Security Mechanisms.- Key Ideas and Examples.- Combined Techniques.- Techniques of Control and Monitoring: Essentials.- Conceptual Access Rights.- Elements of a Security Architecture.- Monitoring and Intrusion Detection.- Techniques of Cryptography: Essentials.- Encryption.- Authentication.- Anonymization.- Some Further Cryptographic Protocols.- Implementations.- Design of Selected Systems.
Details
Erscheinungsjahr: 2008
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Inhalt: xxviii
694 S.
175 s/w Zeichng.
ISBN-13: 9783540784418
ISBN-10: 3540784411
Sprache: Englisch
Herstellernummer: 10899960
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Biskup, Joachim
Hersteller: Springer-Verlag GmbH
Springer Berlin Heidelberg
Maße: 241 x 160 x 44 mm
Von/Mit: Joachim Biskup
Erscheinungsdatum: 18.11.2008
Gewicht: 1,238 kg
Artikel-ID: 101851174
Warnhinweis