Security in Computing Systems

Challenges, Approaches and Solutions

By Joachim Biskup

Security in Computing Systems Cover Image

This monograph provides a wide-ranging and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field.

Full Description

  • ISBN13: 978-3-5407-8441-8
  • 722 Pages
  • User Level: Science
  • Publication Date: November 14, 2008
  • Available eBook Formats: PDF
  • eBook Price: $99.00
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description
With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.
Table of Contents

Table of Contents

  1. Part I: Challenges and Basic Approaches: 1) Introduction
  2. 2) Fundamental Challenges
  3. 3) Computing Systems and their Basic Vulnerabilities.
  4. Part II: Fundamentals of Information Flow and Inference Control
  5. 4) Messages, Inferences, Information and Knowledge
  6. 5) Preventive Inference Control.
  7. Part III: Security Mechanisms.
  8. 6) Key Ideas and Examples
  9. 7) Combined Techniques
  10. 8) Techniques of Control and Monitoring
  11. 9) Conceptual Access Rights
  12. 10) Elements of a Security Architecture
  13. 11) Monitoring and Intrusion Detection
  14. 12) Techniques of Cryptography
  15. 13) Encryption
  16. 14) Authentication
  17. 15) Anonymization
  18. 16) Some Further Cryptographic Protocols.
  19. Part IV: Implementations
  20. 17) Design of Selected Systems.
  21. Appendix, References, Index.
Errata

Please Login to submit errata.

No errata are currently published