Zdjęcie okładki
10,50 zł
Dział: Informatyka
Henryk Piech
Monografia, Informatyka Monografia nr 278, Wyd. I, 172 s., 2013 r., 100 egz.
Spis treści
  1. General introduction
  2. Security protocol analysis on base of binary decision diagram BDD
    1. Introduction: Elementary security protocols, its rules and tasks
    2. The exploitation of BDD in analysis security protocol procedures
    3. Infrastructure with intruder described by Boolean function and BDD
    4. Run operations in BDD
    5. Transmission information operations leading to breaking principles of authentication and confidentiality
    6. Threat sequence searching algorithm
    7. Conclusions
  3. Probability of retrieving information in multi encrypted environment
    1. Introduction
    2. Grammar base for chosen encryption notions
    3. Threats follows from set of multi-encrypted operations
    4. Encryption with given threshold of security
    5. Conclusions
  4. The probabilistic conception of parameterization communications protocols security
    1. Introduction: General formalism of protocol security characteristics
    2. The regarding the user structure in security communication model
    3. The regarding attribute lifetime in security communication model
    4. The conception of security model base on probabilistic time system PTS
    5. The integration of security modeling stages
    6. Conclusions
  5. The checking model for estimation the communication protocol security level
    1. Introduction
    2. Description of the algorithm
    3. The procedure regarding lifetime of security attributes
    4. The procedure of the number users influence on security level
    5. Conclusions
  6. The exploitation Petri net structure for presentation the cryptography operations
    1. Introduction
    2. Fundamental predicates of communication BAN logic used for description knowledge distribution in network
    3. Verification of transmission methods in relation to authentication, confidentiality and security
    4. Petri net characteristics according to cryptography protocols
    5. Token types presentation
    6. The authentication application processes on base of Petri nets structures
    7. Conclusions
  7. The formal - symbolic convention of communication protocol security probability estimation
    1. Introduction
    2. Formalization on base of measure theory
    3. Semantics of probability timed automata PTA
    4. Conclusions
  8. Syntactic formalisms of communication security assessment
    1. Introduction
    2. Data presentation in formal logic description
    3. General definition of secure correction rules
    4. Adaptation probability - time automata PTA to secure attributes investigation
    5. Conclusions
  9. The formalisms of time, clocks and clock constrains in security protocol analysis
    1. 9.1.Introduction
    2. The conjunction time characteristics with number automaton state
    3. The organization of security investigation during protocol run realization
    4. Time influences on security attributes
    5. The reachability of time security state
    6. Conclusions
  10. The reachability of threaten state in communications protocol runs
    1. Introduction
    2. The rules of state changing
    3. The formalisms of state changing grammar
    4. Features of state and attribute paths
    5. Reachability assessment
    6. The probability of given state reachable
    7. Conclusions
  11. Parallel Petri Net Model for investigation the security level in communication protocols runs
    1. Introduction
    2. Formalisms in communication security description
    3. Parallel modeling of security communication auditing
    4. Matching the type of Petri net to parallel communication security investigation
    5. Conclusions
  12. Modeling algorithm of communication run operations in network
    1. Introduction
    2. Grammar of communication run modeling
    3. The procedure of protocol action influences
    4. The procedure of security distribution analysis
    5. Conclusions
  13. The organization of communication security investigation
    1. Introduction
    2. Actions and attribute grammars
    3. Conclusions
  14. Communication security prognosis realized as parallel dynamic auditing intelligent system
    1. Introduction
    2. Structure of security auditing intelligent systems in referring to parallel realization predispositions
    3. Searching the useful communication prognosis form
    4. Security prognosis formalisms and grammar
    5. Conclusions
  15. Using rough set theory in communication security analysis
    1. Introduction
    2. The security communication parameters
    3. The data preparing to rough set theory analysis
    4. The creation of evaluation security segments according with rough set theory
    5. Conclusions