Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Computer. Automation --- Computer security --- Microcomputers --- Sécurité informatique --- Access control --- Micro-ordinateurs --- Accès --- Contrôle --- Computer security. --- Sécurité informatique --- Accès --- Contrôle
Choose an application
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Information storage and retrieval systems --- Systèmes d'information --- Security measures --- Sécurité --- Mesures --- Systèmes d'information --- Sécurité --- Computer systems --- Security measures.
Choose an application
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology's strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.
Computer security --- Computer networks --- Semantic computing --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures --- Sécurité --- Mesures --- Computer security. --- Sécurité informatique --- Réseaux d'ordinateurs --- Sécurité --- EPUB-LIV-FT LIVINFOR SPRINGER-B
Choose an application
Combating Crime in the Digital Age: A Critical Review of EU Information Systems in the Area of Freedom, Security and Justice; Challenges for Criminal Law and Personal Data Protection' provides a systematic and comprehensive account of EU information systems functioning in the area of freedom, security and justice, with the aim to establish the contemporary links between information sharing and criminal law and evaluate its consequences. Part I offers a systemisation and critical assessment of pertinent systems (ECRIS, ECRIS-TCN, Prum, PNR, Europol, SIS, Eurodac, VIS, EES, ETIAS) and the new interoperability regime from the perspective of their objective to prevent and combat serious crime. Part II explores personal data protection law, police law and criminal procedure law, in order to propose safeguards and limitations for regulating this rapidly evolving framework and addressing the challenges for fundamental principles and rights. The authors' central suggestion is that the issue falls within the context of an emerging precognitive paradigm of criminal law.
Data protection --- Privacy, Right of --- Sécurité informatique --- Droit à la vie privée --- Privacy, Right of. --- Law and legislation --- Droit --- Law and legislation. --- European Union countries. --- Criminal law --- Droit pénal (droit européen) --- Habeas data --- EU countries --- Euroland --- Europe
Choose an application
Programming --- Java (Computer program language) --- Computer security. --- Java (Langage de programmation) --- Sécurité informatique --- Computer security --- Object-oriented programming languages --- JavaSpaces technology --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures --- Sécurité informatique --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection
Choose an application
Information systems --- Business policy --- Computer-based information systems --- MIS (Information systems) --- Management information systems --- Management-informatiesystemen --- Systèmes d'information de gestion --- Informatique de gestion --- Management --- Data processing --- Bases de données --- Réseau informatique --- Sécurité informatique --- Système d'information de l'entreprise --- Système de décision --- Système expert
Choose an application
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking
Listing 1 - 10 of 25 | << page >> |
Sort by
|