000 | 03405nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-23082-0 | ||
003 | DE-He213 | ||
005 | 20240730201411.0 | ||
007 | cr nn 008mamaa | ||
008 | 110809s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642230820 _9978-3-642-23082-0 |
||
024 | 7 |
_a10.1007/978-3-642-23082-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aFoundations of Security Analysis and Design VI _h[electronic resource] : _bFOSAD Tutorial Lectures / _cedited by Alessandro Aldini, Roberto Gorrieri. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aVII, 275 p. 91 illus., 33 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6858 |
|
520 | _aFOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9167010 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aCompilers (Computer programs). _93350 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9167011 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputer Science Logic and Foundations of Programming. _942203 |
650 | 2 | 4 |
_aCompilers and Interpreters. _931853 |
700 | 1 |
_aAldini, Alessandro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9167012 |
|
700 | 1 |
_aGorrieri, Roberto. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9167013 |
|
710 | 2 |
_aSpringerLink (Online service) _9167014 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642230813 |
776 | 0 | 8 |
_iPrinted edition: _z9783642230837 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6858 _9167015 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-23082-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96509 _d96509 |