logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013)

(8th International Workshop, Stm 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers)

Pierangela Samarati, Audun J?ang (엮은이)
Springer-Verlag New York Inc
110,990원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
91,010원 -18% 0원
4,560원
86,450원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
eBook 미리보기

책 정보

· 제목 : Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013) (8th International Workshop, Stm 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers)
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9783642380037
· 쪽수 : 321쪽
· 출판일 : 2013-04-19

목차

Policy Enforcement and Monitoring.- Cost-Aware Runtime Enforcement of Security Policies.- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.- Lazy Security Controllers.- Access Control.- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities.- Labeled Goal-Directed Search in Access Control Logic.- A Use-Based Approach for Enhancing UCON.- Analysis of Communicating Authorization Policies.- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation.- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures.- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy.- Distributed Systems and Physical Security.- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification.- DOT-COM: Decentralized Online Trading and COMmerce.- Formalizing Physical Security Procedures.- Authentication.- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items.- Authenticating Email Search Results.- Software Authentication to Enhance Trust in Body Sensor Networks.- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM.- Security Policies.- Boosting Model Checking to Analyse Large ARBAC Policies.- Constrained Role Mining.- A Datalog Semantics for Paralocks.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책