Proceedings of the 5th Workshop on Automation of Software Test
Requirements and protocols for inference-proof interactions in information systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
History-dependent inference control of queries by dynamic policy adaption
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
On the inference-proofness of database fragmentation satisfying confidentiality constraints
ISC'11 Proceedings of the 14th international conference on Information security
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
Inference-usability confinement by maintaining inference-proof views of an information system
International Journal of Computational Science and Engineering
Towards the reduction of data used for the classification of network flows
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection
International Journal of Secure Software Engineering
A flexible approach for considering interdependent security objectives in service composition
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Dynamic policy adaptation for inference control of queries to a propositional information system
Journal of Computer Security - DBSec 2011
Hi-index | 0.00 |
With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.