Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Cryptographic Security Architecture
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Cryptographic Security Architecture

Cryptographic Security Architecture

Design and Verification

Peter Gutmann

320 pages, parution le 29/10/2003

Résumé

A cryptographic security architecture constitutes the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. Traditional security architectures have concentrated mostly on defining a programming interface (API) and left the internals up to individual implementors. The work carefully presents a design for a portable, flexible security architecture based on traditional security models involving a security kernel that controls access to security-relevant objects and attributes based on a configurable security policy.
Layered on top of the kernel are various objects that abstract core functionality, such as encryption and digital signature capabilities, certificate management, and secure sessions and data enveloping (email encryption) in a manner that allows them to be easily moved into cryptographic devices, such as smart cards and crypto accelerators for extra performance or security. An alternative means of building a trustworthy system based on concepts from cognitive psychology and established software engineering principles is presented, and its application to verifying the correctness of an implementation of the architecture down to the level of the running code is examined. The versatility of the design has been proven through its use in implementations ranging from 16-bit microcontrollers through to supercomputers, as well as a number of unusual areas, such as security modules in ATMs. Security design practitioners, professionals, and advanced students will find the book useful for understanding design techniques for security architecture.

Written for:
Practitioners professionals researchers

Contents

  • The software architecture
  • The security architecture
  • The Kernel implementation
  • Verification techniques
  • Verification of the cryptLib kernel
  • Random number generation
  • Hardware encryption modules
  • Conclusion
  • Glossary
  • Index

Caractéristiques techniques

  PAPIER
Éditeur(s) Springer
Auteur(s) Peter Gutmann
Parution 29/10/2003
Nb. de pages 320
Format 18 x 24
Couverture Relié
Poids 765g
Intérieur Noir et Blanc
EAN13 9780387953878
ISBN13 978-0-387-95387-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription