Secure communicating systems: design, analysis, and implementation
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge
Cambridge University Press
2001
|
Schlagwörter: | |
Links: | https://doi.org/10.1017/CBO9781139164870 https://doi.org/10.1017/CBO9781139164870 https://doi.org/10.1017/CBO9781139164870 |
Zusammenfassung: | More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Umfang: | 1 online resource (x, 283 pages) |
ISBN: | 9781139164870 |
DOI: | 10.1017/CBO9781139164870 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043942871 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2001 xx o|||| 00||| eng d | ||
020 | |a 9781139164870 |c Online |9 978-1-139-16487-0 | ||
024 | 7 | |a 10.1017/CBO9781139164870 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781139164870 | ||
035 | |a (OCoLC)704460638 | ||
035 | |a (DE-599)BVBBV043942871 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 | ||
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Huth, Michael |d 1962- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure communicating systems |b design, analysis, and implementation |c Michael R A Huth |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2001 | |
300 | |a 1 online resource (x, 283 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Secure communication in modern information societies -- Public-key cryptography -- Symmetric-key cryptography -- Security protocol design and analysis -- Optimal public-key encryption with RSA -- Secure information-flow analysis | |
520 | |a More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented | ||
650 | 4 | |a Telecommunication / Security measures | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikation |0 (DE-588)4031883-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Kommunikation |0 (DE-588)4031883-7 |D s |
689 | 1 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-00188-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-80731-9 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9781139164870 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029351841 | |
966 | e | |u https://doi.org/10.1017/CBO9781139164870 |l DE-12 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9781139164870 |l DE-92 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818982571057348608 |
---|---|
any_adam_object | |
author | Huth, Michael 1962- |
author_facet | Huth, Michael 1962- |
author_role | aut |
author_sort | Huth, Michael 1962- |
author_variant | m h mh |
building | Verbundindex |
bvnumber | BV043942871 |
classification_rvk | ST 273 ST 276 ST 277 |
collection | ZDB-20-CBO |
contents | Secure communication in modern information societies -- Public-key cryptography -- Symmetric-key cryptography -- Security protocol design and analysis -- Optimal public-key encryption with RSA -- Secure information-flow analysis |
ctrlnum | (ZDB-20-CBO)CR9781139164870 (OCoLC)704460638 (DE-599)BVBBV043942871 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1017/CBO9781139164870 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04071nam a2200637zc 4500</leader><controlfield tag="001">BV043942871</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2001 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139164870</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-139-16487-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9781139164870</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781139164870</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)704460638</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043942871</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Huth, Michael</subfield><subfield code="d">1962-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure communicating systems</subfield><subfield code="b">design, analysis, and implementation</subfield><subfield code="c">Michael R A Huth</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 283 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Secure communication in modern information societies -- Public-key cryptography -- Symmetric-key cryptography -- Security protocol design and analysis -- Optimal public-key encryption with RSA -- Secure information-flow analysis</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikation</subfield><subfield code="0">(DE-588)4031883-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kommunikation</subfield><subfield code="0">(DE-588)4031883-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-00188-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-80731-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9781139164870</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029351841</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139164870</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139164870</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043942871 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:49:19Z |
institution | BVB |
isbn | 9781139164870 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029351841 |
oclc_num | 704460638 |
open_access_boolean | |
owner | DE-12 DE-92 |
owner_facet | DE-12 DE-92 |
physical | 1 online resource (x, 283 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Huth, Michael 1962- Verfasser aut Secure communicating systems design, analysis, and implementation Michael R A Huth Cambridge Cambridge University Press 2001 1 online resource (x, 283 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Secure communication in modern information societies -- Public-key cryptography -- Symmetric-key cryptography -- Security protocol design and analysis -- Optimal public-key encryption with RSA -- Secure information-flow analysis More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented Telecommunication / Security measures Internet (DE-588)4308416-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Kommunikation (DE-588)4031883-7 gnd rswk-swf Verteiltes System (DE-588)4238872-7 s Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s 1\p DE-604 Internet (DE-588)4308416-3 s Kommunikation (DE-588)4031883-7 s Sicherheit (DE-588)4054790-5 s 2\p DE-604 Erscheint auch als Druckausgabe 978-0-521-00188-5 Erscheint auch als Druckausgabe 978-0-521-80731-9 https://doi.org/10.1017/CBO9781139164870 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Huth, Michael 1962- Secure communicating systems design, analysis, and implementation Secure communication in modern information societies -- Public-key cryptography -- Symmetric-key cryptography -- Security protocol design and analysis -- Optimal public-key encryption with RSA -- Secure information-flow analysis Telecommunication / Security measures Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Kryptologie (DE-588)4033329-2 gnd Verteiltes System (DE-588)4238872-7 gnd Kommunikation (DE-588)4031883-7 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4011144-1 (DE-588)4054790-5 (DE-588)4033329-2 (DE-588)4238872-7 (DE-588)4031883-7 |
title | Secure communicating systems design, analysis, and implementation |
title_auth | Secure communicating systems design, analysis, and implementation |
title_exact_search | Secure communicating systems design, analysis, and implementation |
title_full | Secure communicating systems design, analysis, and implementation Michael R A Huth |
title_fullStr | Secure communicating systems design, analysis, and implementation Michael R A Huth |
title_full_unstemmed | Secure communicating systems design, analysis, and implementation Michael R A Huth |
title_short | Secure communicating systems |
title_sort | secure communicating systems design analysis and implementation |
title_sub | design, analysis, and implementation |
topic | Telecommunication / Security measures Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Kryptologie (DE-588)4033329-2 gnd Verteiltes System (DE-588)4238872-7 gnd Kommunikation (DE-588)4031883-7 gnd |
topic_facet | Telecommunication / Security measures Internet Datensicherung Sicherheit Kryptologie Verteiltes System Kommunikation |
url | https://doi.org/10.1017/CBO9781139164870 |
work_keys_str_mv | AT huthmichael securecommunicatingsystemsdesignanalysisandimplementation |