Narrow your search
Listing 1 - 10 of 10
Sort by

Book
Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen
Author:
Year: 2007 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

In dieser Arbeit wird ein Konzept entwickelt und untersucht, mit dem ein Sensornetz Daten sicher, d. h. vertraulich und authentisch, zu einer Datensenke transportiert.Der Benutzer bestimmt dabei einen Kompromiss zwischen Sicherheit und dem in Sensornetzen kritischen Energiebedarf. Je sicherer Daten im Netz transportiert werden sollen, desto mehr Energie muss für den Transport ausgegeben werden.


Book
Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen
Author:
Year: 2007 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

In dieser Arbeit wird ein Konzept entwickelt und untersucht, mit dem ein Sensornetz Daten sicher, d. h. vertraulich und authentisch, zu einer Datensenke transportiert.Der Benutzer bestimmt dabei einen Kompromiss zwischen Sicherheit und dem in Sensornetzen kritischen Energiebedarf. Je sicherer Daten im Netz transportiert werden sollen, desto mehr Energie muss für den Transport ausgegeben werden.


Book
Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen
Author:
Year: 2007 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

In dieser Arbeit wird ein Konzept entwickelt und untersucht, mit dem ein Sensornetz Daten sicher, d. h. vertraulich und authentisch, zu einer Datensenke transportiert.Der Benutzer bestimmt dabei einen Kompromiss zwischen Sicherheit und dem in Sensornetzen kritischen Energiebedarf. Je sicherer Daten im Netz transportiert werden sollen, desto mehr Energie muss für den Transport ausgegeben werden.


Book
Zertifikatsbasierte Zugriffskontrolle in verteilten Informationssytemen
Author:
Year: 2005 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Bekannte Techniken für die Verwaltung und Überprüfung von Zertifikaten wurden zur Unterstützung von PKIs entwickelt. Aufgrund verschiedener Defizite dieser Techniken bezüglich Performanz und Sicherheit wird ein eigener Ansatz vorgestellt. Dieser Ansatz greift auf Vorgängerarbeiten zurück, im Wesentlichen auf Arbeiten von Ralph Charles Merkle, Irene Gassko et. al und Ahto Buldas. Einen wichtigen Baustein des vorgestellten Ansatzes bildet die Datenstruktur mit der Bezeichnung Improved Certification Verification Tree (I-CVT). Diese ermöglicht die kosteneffiziente und sichere Verwaltung und Überprüfung von Attributszertifikaten und kann die Basis einer sogenannten Privilege Management Infrastructure bilden. Basierend auf der I-CVT-Technik können die mit Attributszertifikaten verbundenen Verwaltungskosten niedrig gehalten werden. Wichtiger noch, dass mit Hilfe von I-CVTs die Überprüfung sowohl einzelner als auch gleichzeitig mehrerer Attributszertifikate einer Zertifizierungsstelle effizient und sicher durchführbar ist. Anhand von I-CVTs lassen sich so genannte Vollständigkeitsbeweise generieren. Diese verhindern die unbemerkte Zurückhaltung von auf eine Anfrage passenden Attributszertifikaten durch die diese speichernde Datenbank. Angenommen wird dabei, dass der Anfragende die Anzahl jener Attributszertifikate im Voraus nicht kennt. Einen Spezialfall für Vollständigkeitsbeweise bilden Anfragen, welche höchstens einen Treffer haben können. In solchen Fällen können so genannte Existenz-Beweise beziehungsweise Nicht-Existenz-Beweise generiert und vom Anfragenden ausgewertet werden, je nach Erfolg der jeweiligen Suche. Die Möglichkeit, solche Beweise zu generieren macht den Einsatz von I-CVTs neben der gewünschten sicheren Zugriffskontrolle auch für zahlreiche andere Szenarien attraktiv, die auf Datenbankanfragen basieren. Aus Sicht der performanten Überprüfung während der Zugriffskontrolle haben Attributszertifikate, welche durch Delegierung entstanden, eine Sonderstellung. Bei der zertifikatsbasierten Rechtedelegierung entstehen so genannte Delegierungsnetzwerke, die in den einfachsten Fällen eine Delegierungskette (engl. Delegation Chain) bilden. Ein solches Netzwerk besteht aus Zertifikaten, die von verschiedenen Stellen ausgestellt wurden. Den vertrauten Ursprung solcher Netzwerke, falls es überhaupt einen gibt, während der Zugriffskontrolle zu finden, kann lange Wartezeiten im System verursachen. Ein Vorschlag von Tuomas Aura den hiermit verbundenen Aufwand zu reduzieren, war die Reduktion derartiger Netzwerke auf Attributszertifikate, welche direkt von vertrauten Instanzen ausgestellt werden. Dies hat eine wesentliche Vereinfachung der Ursprungsprüfung delegierter Berechtigungen zur Folge. Einen sicheren Dienst für diesen Zweck innerhalb einer PMI zu konstruieren wirft aber etliche Probleme auf, welche diskutiert werden. In dieser Arbeit wird deshalb neben anderen Konzepten die Technik der so genannten Offline-Delegierung vorgeschlagen. Sie bietet eine einfache Lösung des Problems, indem die gleiche Nutzfunktionalität - sprich die Weitergabe von Berechtigungen - ganz ohne das Entstehen von Delegierungsnetzwerken geschieht. Dies macht die Ursprungsprüfung der Delegierungen einfacher sowie eine nachträgliche Reduzierung von Delegierungsnetzwerken unnötig. Die kombinierte Verwendung von I-CVTs und der Offline-Delegierung bildet das theoretische Fundament eines prototypisch implementierten Systems mit der Kurzbezeichnung PAMINA (Privilege Administration and Management INfrAstructure). Die den jeweiligen Bedürfnissen anpassbare und erweiterbare Komponenten des Systems PAMINA Administration Server, Privilege Database und Certificate Verifier ermöglichen eine flexible Einführung in eine Betriebsumgebung. Die Tragfähigkeit von PAMINA wurde bei der Absicherung eines an der Universität Karlsruhe entwickelten internetbasierten Lernsystems mit der Bezeichnung ed.tec demonstriert.


Book
Information security and cryptology : ICISC 2008
Authors: ---
ISBN: 9783642007293 Year: 2009 Publisher: Berlin : Springer,


Book
Computer and information security handbook
Authors: ---
ISBN: 9780128039298 0128039299 0128038438 9780128038437 Year: 2017 Publisher: Cambridge, England : Morgan Kaufmann Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions


Book
Detection of Intrusions and Malware, and Vulnerability Assessment : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
Authors: --- --- ---
ISBN: 3642392342 3642392350 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Keywords

Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing


Book
Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers
Authors: --- ---
ISBN: 9783540891734 3540890955 9783540890959 9786613437914 1283437910 3540891730 Year: 2008 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are organized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling.

Keywords

Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Logiciels --- Computer security --- Computers --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Information storage and retrieval systems --- Systèmes d'information --- Kritische Informationsinfrastruktur --- Computersicherheit --- Datensicherung --- Kryptoanalyse --- Risikoanalyse --- Computer communication systems. --- Computer security. --- Algorithms. --- User interfaces (Computer systems). --- Computers and civilization. --- User Interfaces and Human Computer Interaction. --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Software, Computer


Book
Wireless Algorithms, Systems, and Applications : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 364239700X 3642397018 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Keywords

Computer science. --- Computer Communication Networks. --- Computer system performance. --- Computer software. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Computer Science, general. --- Wireless communication systems --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Management --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Software, Computer --- Informatics --- Computer communication systems. --- Computer system failures. --- Algorithms. --- Datensicherung. --- Datenverwaltung. --- Drahtloses Sensorsystem. --- Funknetz. --- Netzwerktopologie. --- Netzwerkverwaltung. --- Topologie --- Netzform --- Netzstruktur --- Netztopologie --- Netzarchitektur --- Rechnernetz --- Radio network --- Wireless network --- Drahtloses Telekommunikationsnetz --- Telekommunikationsnetz --- Wireless sensor network --- Drahtloses Sensornetz --- Sensorsystem --- Datenmanagement --- Dateiverwaltung --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Netzwerkmanagement --- Network management --- Netzmanagement --- Telecommunication systems --- Netzwerk --- Datenverarbeitung --- Science --- Computer systems --- Application software. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Failures --- Distributed processing --- Foundations --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.


Book
Web-Age Information Management : WAIM 2013 International Workshops: HardBD, MDSP, BigEM, TMSN, LQPM, BDMS, Beidaihe, China, June 14-16, 2013. Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 3642395260 3642395279 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).

Keywords

Computer science. --- Computer Communication Networks. --- Computer software. --- Database management. --- Data mining. --- Information storage and retrieval systems. --- Computer Science. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Data Mining and Knowledge Discovery. --- Database Management. --- Algorithm Analysis and Problem Complexity. --- Database management --- Information storage and retrieval systems --- Web databases --- Data mining --- Engineering & Applied Sciences --- Computer Science --- Informatics --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Software, Computer --- Computer communication systems. --- Algorithms. --- Information storage and retrieval. --- Abfrageverarbeitung. --- Data Mining. --- Datenbanksystem. --- Datensicherung. --- Information Retrieval. --- World Wide Web. --- WWW --- Hypermedia --- Internet --- Informationsretrieval --- Information --- Informationsrecherche --- Informationswiedergewinnung --- Retrieval --- Informationsrückgewinnung --- Informationsgewinnung --- Literaturrecherche --- Online-Recherche --- Recherche --- Information Extraction --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Datenbankverwaltungssystem --- DBMS --- Datenbankbetriebssystem --- Datenbank --- Datenbankmanagementsystem --- Data base management system --- Data base system --- Datenbanksoftware --- Datenbankprogramm --- Datamining --- Datenmustererkennung --- Data-Mining --- Suchverfahren --- Wissensextraktion --- Anfrageverarbeitung --- Anfrageausführung --- Anfragebearbeitung --- Query processing --- Abfragesprache --- Wiedergewinnung --- Datenverarbeitung --- Betriebssystem --- Programm --- Information storage and retrieva. --- Computer systems --- Electronic data processing --- Database searching --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Informationssicherheit --- Application software. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Foundations --- Distributed processing

Listing 1 - 10 of 10
Sort by