Plus d’un million de livres à portée de main !
Bookbot

Walter Fumy

    Kryptographie
    Sicherheitsschnittstellen
    Standards und Patente zur IT-Sicherheit
    Enterprise security
    Advances in cryptology
    • Advances in cryptology

      • 507pages
      • 18 heures de lecture

      EUROCRYPT '97, the 15th annual conference on cryptographic techniques, was organized by the International Association for Cryptologic Research (IACR), which hosts two series of international conferences each year: EUROCRYPT in Europe and CRYPTO in the United States. The conference originated 15 years ago in Germany with the Burg Feuerstein Workshop, initiated by Thomas Beth, bringing together 76 participants from 14 countries for the first open meeting focused on modern cryptography. Since then, the conference has been held annually in various European locations, such as Udine, Paris, and Saint-Malo, and has seen steady growth. The IACR became involved after the second conference, and the name EUROCRYPT has been used since the Paris meeting in 1984. For its 15th anniversary, the conference returned to Germany. The scientific program for EUROCRYPT '97 was curated by an 18-member committee that reviewed 104 high-quality submissions, resulting in 34 accepted papers presented in these proceedings. Additionally, the conference featured two invited talks by Ernst Bovelander and Gerhard Frey.

      Advances in cryptology
    • Enterprise security

      • 264pages
      • 10 heures de lecture
      3,7(3)Évaluer

      Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise. Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cryptographic techniques, intelligent tokens, public key infrastructures, IAM technologies) is provided. The book features detailed discussions of practical experiences in different sectors, including the automotive industry, financial services, e-health, and e-government.

      Enterprise security
    • InhaltsverzeichnisSchnittstellendesign.Sicherheitsschnittstellen und formale Software-Entwicklung.Evaluationen von Security APIs.Designmethoden für kryptographische Schnittstellen und deren Subsysteme.Konzept und Realisierung einer allgemeinen Key Management Schnittstelle.Sicherheitsschnittstellen in verteilten Systemen.Security API in Client-Server-Systemen mit rollenbasierter Zugriffskontrolle.CryptoManager — Eine intuitive Programmierschnittstelle für kryptpographische Systeme.X/Open and Security.GSS-API Implementierung für X.509 Strong Authentication.Security-API in SecuDE.Security-API eines Sicherheits-Moduls für den Einsatz in heterogenen Rechnerumgebungen.Smart Card APIs im Einsatz am Beispiel der STARMOD API.Sicherheitsschnittstellen im Banken- und Telekombereich.Kryptographisches Application Programming Interface.TeleTrusT Security API — Aufgabe der TeleTrusT-Arbeitsgruppe ‚Anwendungen‘.Eine Sicherheitsplattform für zukünftige Telekommunikationsanwendungen und –dienste.Secure Common ISDN Application Programming Interface (S-CAPI).

      Sicherheitsschnittstellen