Publication Type. More Filters. A case for validating remote application integrity for data processing systems. View 1 excerpt, cites background. Abstract : As information systems evolved within the Department of Defense DoD , safeguards were developed to protect the information being stored and processed. The levels of protection put in … Expand.
Enhancing security in distributed systems with trusted computing hardware. The need to increase the hostile attack resilience of distributed and internet-worked computer systems is critical and pressing. This thesis contributes to concrete improvements in distributed … Expand. Highly Influenced. View 4 excerpts, cites background. Attack-defense trees. Verification of security protocols based on multicast communication. Security Engineering towards Building a Secure Software.
An intrusion-tolerant firewall design for protecting SIEM systems. AEGIS: architecture for tamper-evident and tamper-resistant processing. View 2 excerpts, cites methods and background. Proactive public key and signature systems. CCS ' Emerging applications like electronic commerce and secure communications over open networks have made clear the fundamental role of public key cryptography as a unique enabler for world-wide scale … Expand.
Denial of service: an example. Network security - private communication in a public world. Prentice Hall series in computer networking and distributed systems.
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. This book will help you understand how to incorporate practical security techniques into all phases of the development lifecycle. Few address the entire life cycle with a comprehensive overview and discussion of emerging trends and topics as well as this one.
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering.
Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security throughout your full system development and acquisition lifecycles. Drawing on their pioneering work at the Software Engineering Institute SEI and Carnegie Mellon University, Mead and Woody introduce seven core principles of software assurance, and show how to apply them coherently and systematically.
0コメント