
Cryptographic Security Architecture: Design and Verification
US $22.00US $22.00
Jul 22, 05:05Jul 22, 05:05
Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Cryptographic Security Architecture: Design and Verification
US $22.00
ApproximatelyRM 92.66
Condition:
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Economy Shipping.
Located in: South San Francisco, California, United States
Delivery:
Estimated between Wed, 20 Aug and Fri, 22 Aug to 94104
Returns:
No returns accepted.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:356307988384
All net proceeds will support Goodwill of the San Francisco Bay
- Official eBay for Charity listing. Learn more
- This sale benefits a verified non-profit partner.
Item specifics
- Condition
- ISBN
- 9780387953878
About this product
Product Identifiers
Publisher
Springer New York
ISBN-10
0387953876
ISBN-13
9780387953878
eBay Product ID (ePID)
2348835
Product Key Features
Number of Pages
Xviii, 320 Pages
Language
English
Publication Name
Cryptographic Security Architecture : Design and Verification
Subject
Information Theory, Communication Studies, Hardware / General, Security / Cryptography, Security / General
Publication Year
2003
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Format
Hardcover
Dimensions
Item Weight
27.6 Oz
Item Length
9.3 in
Item Width
7 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2002-070742
Dewey Edition
22
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
The Software Architecture.- The Security Architecture.- The Kernel Implementation.- Verification Techniques.- Verification of the cryptlib Kernel.- Random Number Generation.- Hardware Encryption Modules.- Conclusion.
Synopsis
This new book provides a detailed presentation of a flexible, platform-independent cryptographic security architecture which is suited to software, hardware and hybrid implementations. Using the design architecture, portions of the architecture can be replaced or updated with a minimum of effort, while guaranteeing a consistent interface and handling of objects., A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles and cognitive psychology. Its novel security-kernel design implements a reference monitor that controls access to security-relevant objects and attributes based on a configurable security policy. Topics and features: * Builds a concise architectural design that can be easily extended in the future * Develops an application-specific security kernel that enforces a fully customizable, rule-based security policy * Presents a new verification technique that allows verification from the high-level specification down to the running code * Describes effective security assurance in random number generation, and the pitfalls associated therewith * Examines the generation and protection of cryptovariables, as well as application of the architectural design to cryptographic hardware The work provides an in-depth presentation of a flexible, platform-independent cryptographic security architecture suited to software, hardware, and hybrid implementations. Security design practitioners, professionals, researchers, and advanced students will find the work an essential resource.
LC Classification Number
QA268
Item description from the seller
Seller feedback (310,019)
This item (1)
All items (310,019)
- 9***m (20)- Feedback left by buyer.Past monthVerified purchaseArrived quickly and in good condition.
- 0***u (28)- Feedback left by buyer.Past monthVerified purchaseGreat condition came as described.
- o***i (123)- Feedback left by buyer.Past monthVerified purchaseCondition excellent.
- _***c (380)- Feedback left by buyer.Past monthVerified purchaseSmooth transaction, authentic item, happy buyer, A+++ seller!
More to explore :
- Architecture & Design Magazines,
- Architecture & Design Magazines in Italian,
- Architecture & Design Magazines 1940-1979,
- College Architecture and Design Education Textbooks,
- Architecture & Design Magazines 1900-1939,
- Architectural Digest Magazines,
- Architecture Nonfiction Books,
- Architecture Architectural Digest 2000-Now Magazines,
- Architecture Antiquarian & Collectible Books,
- Architecture Monthly Magazines