Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Analysis techniques for information security (Record no. 561841)

000 -LEADER
fixed length control field 05203nam a2200565 i 4500
001 - CONTROL NUMBER
control field 6813004
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152902.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100430s2010 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781598296297 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781598296303 (electronic bk.)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00260ED1V01Y201003SPT002
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00005978
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)631262531
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number A528 2010
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Analysis techniques for information security
Medium [electronic resource] /
Statement of responsibility, etc. Anupam Datta ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of publisher, distributor, etc. Morgan & Claypool,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent 1 electronic text (ix, 152 p. : ill.) :
Other physical details digital file.
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, and trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 2
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 133-149).
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Bibliography -- Authors' biographies.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Analyzing security protocols -- Protocol analysis methodology -- Protocol composition logic -- Modelling protocols -- Protocol logic -- Proof system -- Example -- Other protocol analysis approaches -- Recent advances -- Secure composition -- Computational soundness -- Conclusions --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note A. Formalizing static analysis -- A.1. Programs -- Expressions and conditionals -- Support for nondeterminism -- Evaluation of expressions and conditional expressions -- Concrete semantics of a program -- The concrete collecting semantics of a program -- A.2. Abstraction and abstract domains -- Abstract semantics of a program -- Abstract collecting semantics -- A.3. Iterative computation -- Kleene iteration -- Widening -- Narrowing -- Chaotic iteration --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Analyzing security policies -- Access-matrix-based systems -- RBAC -- Security policies -- Trust management -- SPKI/SDSI -- The basic connection between SPKI/SDSI and pushdown systems -- The generalized authorization problem -- Using semirings in other kinds of authorization specifications -- Discussion -- RT --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Detecting buffer overruns using static analysis -- Overall tool architecture -- Codesurfer -- Constraint generation -- Taint analysis -- Constraint solving -- Detecting overruns -- Constraint resolution using linear programming -- Handling infeasible linear programs -- Implementation -- Solving constraint systems hierarchically -- Adding context sensitivity -- Summary constraints -- Experience with the tool -- WU-FTP Daemon -- Sendmail -- Performance -- Adding context sensitivity -- Effects of pointer analysis -- Shortcomings -- Related work --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. Foundations -- Static analysis -- What is static analysis -- How is static analysis carried out -- Dataflow analysis, pushdown systems, and weighted pushdown systems -- Interprocedural dataflow analysis -- Pushdown systems -- Boolean programs -- Weighted pushdown systems -- Datalog --
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction --
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
520 3# - SUMMARY, ETC.
Summary, etc. Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF t.p. (viewed on April 30, 2010).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Mathematical models.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
General subdivision Mathematical models.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Datta, Anupam.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 2.
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813004
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE341 2020-04-13 2020-04-13 E books

Powered by Koha