Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cryptographic security architectured...
~
Gutmann, Peter.
Cryptographic security architecturedesign and verification /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Cryptographic security architecture/ Peter Gutmann.
其他題名:
design and verification /
作者:
Gutmann, Peter.
出版者:
New York :Springer,�004.
面頁冊數:
1 online resource (xviii, 320 pages) :illustrations
標題:
Computer security. -
電子資源:
Click here for online access to this book (查閱全文) (EBSCO eBook)
ISBN:
0387215514
ISBN:
9780387215518
ISBN:
0387953876
ISBN:
9780387953878
Cryptographic security architecturedesign and verification /
Gutmann, Peter.
Cryptographic security architecture
design and verification /[electronic resource] :Peter Gutmann. - New York :Springer,�004. - 1 online resource (xviii, 320 pages) :illustrations
Includes bibliographical references and index.
The software architecture -- The security architecture -- The kernel implementation -- Verification techniques -- Verification of the CryptLib kernel -- Random number generation -- Hardware encryption modules.
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles and cognitive psychology. Its novel security-kernel design implements a reference monitor that controls access to security-relevant objects and attributes based on a configurable security policy. Topics and features: * Builds a concise architectural design that can be easily extended in the future * Develops an application-specific security kernel that enforces a fully customizable, rule-based security policy * Presents a new verification technique that allows verification from the high-level specification down to the running code * Describes effective security assurance in random number generation, and the pitfalls associated therewith * Examines the generation and protection of cryptovariables, as well as application of the architectural design to cryptographic hardware The work provides an in-depth presentation of a flexible, platform-independent cryptographic security architecture suited to software, hardware, and hybrid implementations. Security design practitioners, professionals, researchers, and advanced students will find the work an essential resource.
ISBN: 0387215514Subjects--Topical Terms:
146870
Computer security.
Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: QA76.9.A25 / G88 2004eb
Dewey Class. No.: 005.8
Cryptographic security architecturedesign and verification /
LDR
:03954nmm 22004574a 4500
001
1000049946
005
20150318135841.0
006
m o d
007
cr cnu|||unuuu
008
040806s2004 nyua ob 001 0 eng d
019
$a
182738894
$a
320967193
$a
606035211
$a
647511350
020
$a
0387215514
$q
(electronic bk.)
020
$a
9780387215518
$q
(electronic bk.)
020
$a
0387953876
$q
(alk. paper)
020
$a
9780387953878
035
$a
(OCoLC)56103712
$z
(OCoLC)182738894
$z
(OCoLC)320967193
$z
(OCoLC)606035211
$z
(OCoLC)647511350
035
$a
ocm56103712
040
$a
N$T
$b
eng
$e
pn
$c
N$T
$d
OCLCQ
$d
YDXCP
$d
OCLCQ
$d
EBLCP
$d
OCLCQ
$d
TUU
$d
OCLCQ
$d
OCLCO
$d
OCLCQ
$d
GW5XE
$d
OCLCF
$d
OCLCQ
$d
UAB
$d
BAKER
$d
B24X7
$d
CNTRU
$d
E7B
$d
OCLCQ
049
$a
MAIN{me_controlnum}
050
4
$a
QA76.9.A25
$b
G88 2004eb
072
7
$a
COM
$x
060040
$2
bisacsh
072
7
$a
COM
$x
043050
$2
bisacsh
072
7
$a
COM
$x
053000
$2
bisacsh
082
0 4
$a
005.8
$2
22
100
1
$a
Gutmann, Peter.
$3
1000063704
245
1 0
$a
Cryptographic security architecture
$h
[electronic resource] :
$b
design and verification /
$c
Peter Gutmann.
260
$a
New York :
$b
Springer,
$c
�004.
300
$a
1 online resource (xviii, 320 pages) :
$b
illustrations
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
The software architecture -- The security architecture -- The kernel implementation -- Verification techniques -- Verification of the CryptLib kernel -- Random number generation -- Hardware encryption modules.
520
$a
A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles and cognitive psychology. Its novel security-kernel design implements a reference monitor that controls access to security-relevant objects and attributes based on a configurable security policy. Topics and features: * Builds a concise architectural design that can be easily extended in the future * Develops an application-specific security kernel that enforces a fully customizable, rule-based security policy * Presents a new verification technique that allows verification from the high-level specification down to the running code * Describes effective security assurance in random number generation, and the pitfalls associated therewith * Examines the generation and protection of cryptovariables, as well as application of the architectural design to cryptographic hardware The work provides an in-depth presentation of a flexible, platform-independent cryptographic security architecture suited to software, hardware, and hybrid implementations. Security design practitioners, professionals, researchers, and advanced students will find the work an essential resource.
588
0
$a
Print version record.
650
0
$a
Computer security.
$3
146870
650
0
$a
Cryptography.
$3
154053
650
4
$a
Computer science.
$3
148780
650
7
$a
COMPUTERS
$x
Internet
$x
Security.
$2
bisacsh
$3
1000063705
650
7
$a
COMPUTERS
$x
Networking
$x
Security.
$2
bisacsh
$3
1000063706
650
7
$a
COMPUTERS
$x
Security
$x
General.
$2
bisacsh
$3
1000063707
655
4
$a
Electronic books.
$2
local.
$3
172687
776
0 8
$i
Print version:
$a
Gutmann, Peter.
$t
Cryptographic security architecture.
$d
New York : Springer, �004
$z
0387953876
$w
(DLC) 2002070742
$w
(OCoLC)49902906
856
4 0
$3
EBSCOhost
$u
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=108039
$z
Click here for online access to this book (查閱全文) (EBSCO eBook)
938
$a
Books 24x7
$b
B247
$n
bks00016215
938
$a
Baker & Taylor
$b
BKTY
$c
99.00
$d
99.00
$i
0387953876
$n
0004006680
$s
active
938
$a
EBL - Ebook Library
$b
EBLB
$n
EBL264796
938
$a
ebrary
$b
EBRY
$n
ebr10129892
938
$a
EBSCOhost
$b
EBSC
$n
108039
938
$a
YBP Library Services
$b
YANK
$n
2296096
0 筆讀者評論
館藏地:
全部
線上資料庫
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0044129
線上資料庫
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入