Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this book belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. There is currently no monitoring mechanism for controlling information flow during runtime that support behavior configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behavior or modify the way that information flows while the program is executing.
"Sinopsis" puede pertenecer a otra edición de este libro.
Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this book belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. There is currently no monitoring mechanism for controlling information flow during runtime that support behavior configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behavior or modify the way that information flows while the program is executing.
Dr. Mohamed Khalefa Sarrab has Ph.D. degree in Computer Science from De Montfort University UK 2011. He received his B.Sc in computer science from Seventh of April University Libya 1997 and also received M.Sc in Computer Science and Information Technology from VSB Technical University of Ostrava Czech Republic 2006.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this book belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. There is currently no monitoring mechanism for controlling information flow during runtime that support behavior configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behavior or modify the way that information flows while the program is executing. 288 pp. Englisch. Nº de ref. del artículo: 9783845432748
Cantidad disponible: 2 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Sarrab Mohamed KhalefaDr. Mohamed Khalefa Sarrab has Ph.D. degree in Computer Science from De Montfort University UK 2011. He received his B.Sc in computer science from Seventh of April University Libya 1997 and also received M.Sc in. Nº de ref. del artículo: 5482277
Cantidad disponible: Más de 20 disponibles
Librería: preigu, Osnabrück, Alemania
Taschenbuch. Condición: Neu. Runtime Verification of Information flow | Policy-Based Runtime Verification of Information Flow Control | Mohamed Khalefa Sarrab | Taschenbuch | 288 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783845432748 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Nº de ref. del artículo: 106861086
Cantidad disponible: 5 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this book belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. There is currently no monitoring mechanism for controlling information flow during runtime that support behavior configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behavior or modify the way that information flows while the program is executing.Books on Demand GmbH, Überseering 33, 22297 Hamburg 288 pp. Englisch. Nº de ref. del artículo: 9783845432748
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Standard security mechanism such as Access control, Firewall and Encryption only focus on controlling the release of information but no limitations are placed on controlling the propagation of that confidential information. The principle problem of controlling sensitive information confidentiality starts after access is granted. The research described in this book belongs to the constructive research field where the constructive refers to knowledge contributions being developed as a new framework, theory, model or algorithm. There is currently no monitoring mechanism for controlling information flow during runtime that support behavior configurability and User interaction. Configurability is an important requirement because what is considered to be secure today can be insecure tomorrow. The interaction with users is very important in flexible and reliable security monitoring mechanism because different users may have different security requirements. The interaction with monitoring mechanism enables the user to change program behavior or modify the way that information flows while the program is executing. Nº de ref. del artículo: 9783845432748
Cantidad disponible: 1 disponibles