My Library

University LibraryCatalogue

For faster,
simpler
access.
Use Lean
Library.
Get it now
Don't show me again

LEADER 00000nam a22007091i 4500 
003    MOCL 
005    20160818110131.0 
006    m    eo  d         
007    cr cn |||m|||a 
008    100430t20102010caua   foab   000 0 eng d 
019    201003SPT002 
020    |z9781598296297|q(paperback) 
020    9781598296303|q(electronic bk.) 
024 7  10.2200/S00260ED1V01Y201003SPT002|2doi 
035    (OCoLC)631262531 
035    (CaBNVSL)swl00005978 
035    .b54107027 
040    CaBNVSL|beng|cCaBNVSL|dCaBNVSL 
050  4 QA76.9.A25|bA528 2010 
082 04 005.8|222 
245 00 Analysis techniques for information security /|cAnupam 
       Datta ... [and others]. 
264  1 San Rafael, Calif. (1537 Fourth Street, San Rafael, CA  
       94901 USA) :|bMorgan & Claypool,|c[2010] 
264  4 |c©2010 
300    1 electronic text (ix, 152 pages :|billustrations) :
       |bdigital file. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc|0http://rdaregistry.info/termList/
       RDAColourContent/1003 
347    text file|2rdaft|0http://rdaregistry.info/termList/
       fileType/1002 
490 1  Synthesis lectures on information security, privacy, and 
       trust,|x1945-9750 ;|v# 2. 
500    Part of: Synthesis digital library of engineering and 
       computer science. 
500    Series from website. 
504    Includes bibliographical references (pages 133-149). 
505 8  Bibliography -- Authors' biographies. 
505 8  5. Analyzing security protocols -- Protocol analysis 
       methodology -- Protocol composition logic -- Modelling 
       protocols -- Protocol logic -- Proof system -- Example -- 
       Other protocol analysis approaches -- Recent advances -- 
       Secure composition -- Computational soundness -- 
       Conclusions -- 
505 8  A. Formalizing static analysis -- A.1. Programs -- 
       Expressions and conditionals -- Support for nondeterminism
       -- Evaluation of expressions and conditional expressions -
       - Concrete semantics of a program -- The concrete 
       collecting semantics of a program -- A.2. Abstraction and 
       abstract domains -- Abstract semantics of a program -- 
       Abstract collecting semantics -- A.3. Iterative 
       computation -- Kleene iteration -- Widening -- Narrowing -
       - Chaotic iteration -- 
505 8  4. Analyzing security policies -- Access-matrix-based 
       systems -- RBAC -- Security policies -- Trust management -
       - SPKI/SDSI -- The basic connection between SPKI/SDSI and 
       pushdown systems -- The generalized authorization problem 
       -- Using semirings in other kinds of authorization 
       specifications -- Discussion -- RT -- 
505 8  3. Detecting buffer overruns using static analysis -- 
       Overall tool architecture -- Codesurfer -- Constraint 
       generation -- Taint analysis -- Constraint solving -- 
       Detecting overruns -- Constraint resolution using linear 
       programming -- Handling infeasible linear programs -- 
       Implementation -- Solving constraint systems 
       hierarchically -- Adding context sensitivity -- Summary 
       constraints -- Experience with the tool -- WU-FTP Daemon -
       - Sendmail -- Performance -- Adding context sensitivity --
       Effects of pointer analysis -- Shortcomings -- Related 
       work -- 
505 8  2. Foundations -- Static analysis -- What is static 
       analysis -- How is static analysis carried out -- Dataflow
       analysis, pushdown systems, and weighted pushdown systems 
       -- Interprocedural dataflow analysis -- Pushdown systems -
       - Boolean programs -- Weighted pushdown systems -- Datalog
       -- 
505 0  1. Introduction -- 
506 1  Abstract freely available; full-text restricted to 
       subscribers or individual document purchasers. 
510 0  Google book search. 
510 0  INSPEC. 
510 0  Google scholar. 
510 0  Compendex. 
520 3  Increasingly our critical infrastructures are reliant on 
       computers. We see examples of such infrastructures in 
       several domains, including medical, power, 
       telecommunications, and finance. Although automation has 
       advantages, increased reliance on computers exposes our 
       critical infrastructures to a wider variety and higher 
       likelihood of accidental failures and malicious attacks. 
       Disruption of services caused by such undesired events can
       have catastrophic effects, such as disruption of essential
       services and huge financial losses. The increased reliance
       of critical services on our cyberinfrastructure and the 
       dire consequences of security breaches have highlighted 
       the importance of information security. Authorization, 
       security protocols, and software security are three 
       central areas in security in which there have been 
       significant advances in developing systematic foundations 
       and analysis methods that work for practical systems. This
       book provides an introduction to this work, covering 
       representative approaches, illustrated by examples, and 
       providing pointers to additional work in the area. 
530    Also available in print. 
538    Mode of access: World Wide Web. 
538    System requirements: Adobe Acrobat Reader. 
588    Title from PDF t.p. (viewed on April 30, 2010). 
650  0 Computer security|0http://id.loc.gov/authorities/subjects/
       sh90001862|xMathematical models.|0http://id.loc.gov/
       authorities/subjects/sh2002007921 
650  0 Data protection|0http://id.loc.gov/authorities/subjects/
       sh85035859|xMathematical models.|0http://id.loc.gov/
       authorities/subjects/sh2002007921 
700 1  Datta, Anupam.|0http://id.loc.gov/authorities/names/
       no2010040960 
830  0 Synthesis digital library of engineering and computer 
       science.|0http://id.loc.gov/authorities/names/n2016188085 
830  0 Synthesis lectures on information security, privacy and 
       trust.|0http://id.loc.gov/authorities/names/no2008187254
       |x1945-9750 ;|v# 2. 
856 48 |3Abstract with links to full text|uhttps://
       ezp.lib.unimelb.edu.au/login?url=http://dx.doi.org/10.2200
       /S00260ED1V01Y201003SPT002|zConnect to ebook (University 
       of Melbourne only) 
907    .b54107027 
990    MARCIVE MELB 201906 
990    Synthesis Digital Library, Coll. 1-6 
990    Batch Ebook load (bud2) - do not edit, delete or attach 
       any records. 
Location Call No. Status
 UniM INTERNET resource    AVAILABLE