top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Dependability metrics : advanced lectures / / Irene Eusgeld, Felix C. Freiling, Ralf Reussner (eds.)
Dependability metrics : advanced lectures / / Irene Eusgeld, Felix C. Freiling, Ralf Reussner (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, : Springer, 2008
Descrizione fisica 1 online resource (XI, 305 p.)
Disciplina 004
Altri autori (Persone) EusgeldIrene
FreilingFelix C
ReussnerRalf
Collana Lecture notes in computer science
LNCS sublibrary. SL 2, Programming and software engineering
Soggetto topico Computer systems - Reliability
ISBN 3-540-68947-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto to Dependability Metrics -- to Dependability Metrics -- I Foundations -- On Metrics and Measurements -- Validation of Predictions with Measurements -- Consistent Metric Usage: From Design to Deployment -- Basic and Dependent Metrics -- Goal, Question, Metric -- Quality of Service Modeling Language -- Markov Models -- II Reliability Metrics -- Hardware Reliability -- Software Reliability -- III Security Metrics -- to Security Metrics -- Cryptographic Attack Metrics -- Security Measurements and Metrics for Networks -- Industrial Approaches and Standards for Security Assessment -- Economic Security Metrics -- Human Factors -- IV Performance Metrics -- to Performance Metrics -- Performance-Related Metrics in the ISO 9126 Standard -- Analytical Performance Metrics -- Performance Metrics in Software Design Models -- Measuring Performance Metrics: Techniques and Tools -- Performance Metrics for Specific Domains -- V Overlapping Metrics -- to Overlapping Attributes -- Performability -- Reliability vs. Security: A Subjective Overview.
Record Nr. UNINA-9910767553403321
Berlin, : Springer, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings / / edited by Dieter Gollmann, Felix C. Freiling
Information Security [[electronic resource] ] : 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings / / edited by Dieter Gollmann, Felix C. Freiling
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 402 p. 87 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Special purpose computers
Computers and civilization
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
Math Applications in Computer Science
Special Purpose and Application-Based Systems
Computers and Society
ISBN 3-642-33383-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy-Preserving Speaker Authentication.- Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data.  Differential Attacks on Reduced RIPEMD-160.- Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.- Strong Authentication with Mobile Phone.- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road.- Domain-Specific Pseudonymous Signatures for the German Identity Card.- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks -- Learning Fine-Grained Structured Input for Memory Corruption Detection.- Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.- An Empirical Study of Dangerous Behaviors in Firefox Extensions.- Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.- Selective Document Retrieval from Encrypted Database.- Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.- Secure Hierarchical Identity-Based Identification without Random Oracles.- Efficient Two-Move Blind Signatures in the Common Reference String Model.- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.- A Quantitative Approach for Inexact Enforcement of Security Policies.- OSDM: An Organizational Supervised Delegation Model for RBAC.- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.- Intended Actions: Risk Is Conflicting Incentives.- On the Self-similarity Nature of the Revocation Data. .
Record Nr. UNISA-996465770203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui