Explore the latest books of this year!
Bookbot

Joachim Biskup

    Die psychosoziale Situation von Koronarpatienten
    Grundlagen von Informationssystemen
    Database security, VIII
    Computer security
    Security in computing systems
    • 2009

      Security in computing systems

      Challenges, Approaches and Solutions

      • 694 pages
      • 25 hours of reading

      This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing.

      Security in computing systems
    • 2007

      Computer security

      • 628 pages
      • 22 hours of reading

      The content covers a range of topics in security architecture, access control, and applied cryptography. It begins with discussions on trustworthy services and biological analogies, followed by security architecture and secure components. Key areas include the security of multithreaded programs, efficient proving for distributed access-control systems, and maintaining high-performance communication while ensuring least privilege. Access control methods are explored, including pragmatic XML access control using RDBMS and privacy-aware role-based access control. The text delves into workflow systems, cryptographic techniques, and authentication tests, highlighting practical applications like SilentKnock for undetectable authentication and generalized key delegation for hierarchical encryption. Further discussions address privacy in data storage, formal methods in security, and the logic of state-modifying authorization policies. The text also investigates dynamic information flow control for web applications and reliable covert communications. Additional topics include password-based authenticated key exchange, anonymous timed-release encryption, and graphical password authentication. The exploration of obligations in programs and the synthesis of secure protocols is noted, along with security evaluation based on TCG’s TPM specification and insider attack implications. The annotation concludes with insights into modeling

      Computer security