Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
43,989
result(s) for
"Computers Access control"
Sort by:
Attribute-Based Access Control
by
Chandramouli, Ramaswamy
,
Ferraiolo, David F
,
Hu, Vincent C
in
Computer networks-Access control
,
Computer security
,
Computers-Access control
2017
This book presents a combination of technical and administrative instructions for the development of attribute-based access control to improve information sharing within organizations.
Identity Management for Internet of Things
by
Mahalle, Parikshit N
,
Railkar, Poonam N
in
Communication, Networking and Broadcast Technologies
,
Computers
,
Computers-Access control
2020,2015,2022
The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include: • Internet of Things; • Identity Management; • Identity models in Internet of Things; • Identity management and trust in the Internet of Things context; • Authentication and access control; Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.Key milestones identified for Identitymanagement are clustering with hierarchical addressing, trust management, mutual authentication and access control. Identitymanagement for Internet of Things is ideal forpersonnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering andtelecommunication systems Internet, and cloud computing.
Network security : private communication in a public world
by
Kaufman, Charlie, author
,
Perlman, Radia, author
,
Speciner, Michael, author
in
Computer security.
,
Computer networks Security measures.
,
Computers Access control.
2023
The classic guide to cryptography and network security -- now fully updated! \"Alice and Bob are back!\" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) - back of cover.
Instant Java password and authentication security
2013
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way. It’s assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.
Passwords : philology, security, authentication
Today we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls \"crypto-philology\" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- Provided by publisher
THE ‘REALNESS’ KEY TO COMPELLED PASSCODE PRODUCTION
2025
This Article explains how the Foregone Conclusion exception to the Fifth Amendment’s privilege against self-incrimination applies to compelled passcode production. The Supreme Court fashioned the Foregone Conclusion exception in connection with the compelled production of documentary evidence. It facilitates government access to real evidence despite the implicit factual communications inherent in a target’s act of producing it (i.e., that the real evidence exists, is accessible, and is what the state demanded). Engaging with the ‘real evidence’ limitation for compelled acts of production, the Article shows that focusing on unlocked devices and/or stored passcodes as the real evidence to be produced in compelled passcode entry cases can resolve splits among courts and commentators while protecting targets from compelled revelation of mere information.
This Article goes beyond the technological nuances of encryption to consider realness based on the average user’s experience of a passcode as something that exists outside the mind. Applying Act of Production first principles to the real evidence of unlocked devices and stored passcodes clarifies that the government need not demonstrate pre-production knowledge of the contents of a locked device to satisfy the Foregone Conclusion exception. It further confirms that the reasonable particularity standard often associated with the exception and the Foregone Conclusion exception’s authentication requirement play only limited roles in passcode cases. The Article concludes with a brief explanation of how the first-principles approach to compelled passcode production can also demystify compelled use of biometrics to unlock digital devices.
Journal Article
Becoming the hacker : the playbook for getting inside the mind of an attacker
\"Things you will learn : study the mindset of an attacker, adopt defensive strategies, classify and plan for standard web application security threats, prepare to combat standard system security problems, defend WordPress and mobile applications, use security tools and plan for defense against remote execution.\"--Back cover.
Integrated Security Systems Design
2007
Enterprise-class security for government and corporate installations worldwide.