Update cookies preferences

E-book: Foundations of Security Analysis and Design: Tutorial Lectures

Edited by , Edited by
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 2171
  • Pub. Date: 30-Jun-2003
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783540456087
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 2171
  • Pub. Date: 30-Jun-2003
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783540456087

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).

More info

Springer Book Archives
Mathematical Models of Computer Security.- The Logic of Authentication
Protocols.- Access Control: Policies, Models, and Mechanisms.- Security
Goals: Packet Trajectories and Strand Spaces.- Notes on Nominal Calculi for
Security and Mobility.- Classification of Security Properties.