Skip to main content
  • Book
  • © 2009

Security in Computing Systems

Challenges, Approaches and Solutions

Authors:

  • Broad and comprehensive coverage of all issues related to computer security
  • Presents both informal surveys as well as rigorous formalizations when necessary
  • Includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 chapters)

  1. Front Matter

    Pages i-xxvii
  2. Challenges and Basic Approaches

    1. Front Matter

      Pages 1-1
    2. Introduction

      Pages 3-28
  3. Fundamentals of Information Flow and Inference Control

    1. Front Matter

      Pages 65-65
  4. Security Mechanisms

    1. Front Matter

      Pages 155-155
    2. Key Ideas and Examples

      Pages 157-180
    3. Combined Techniques

      Pages 181-202
    4. Conceptual Access Rights

      Pages 209-301
    5. Encryption

      Pages 429-478
    6. Authentication

      Pages 479-512
    7. Anonymization

      Pages 513-525

About this book

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

Authors and Affiliations

  • Fakultät für Informatik, Technische Universität Dortmund, Dortmund, Germany

    Joachim Biskup

About the author

Joachim Biskup has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim and University of Dortmund again. He has done research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security. He served on the program committees of many international conferences, including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Database and Applications Security.

Bibliographic Information

  • Book Title: Security in Computing Systems

  • Book Subtitle: Challenges, Approaches and Solutions

  • Authors: Joachim Biskup

  • DOI: https://doi.org/10.1007/978-3-540-78442-5

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2009

  • Hardcover ISBN: 978-3-540-78441-8Published: 18 November 2008

  • Softcover ISBN: 978-3-642-09719-5Published: 19 October 2010

  • eBook ISBN: 978-3-540-78442-5Published: 14 November 2008

  • Edition Number: 1

  • Number of Pages: XXVIII, 694

  • Topics: Cryptology, Systems and Data Security, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access