Kod: 05326705
Enterprise workflows and web services may be highly security critical, because they may be in control of important processes of organizations, while communicating with external partners over the network. On the other hand, these t ... więcej
Za ten zakup dostaniesz 207 punkty
Enterprise workflows and web services may be highly security critical, because they may be in control of important processes of organizations, while communicating with external partners over the network. On the other hand, these technologies frequently represent data as XML documents, which can be modeled as trees. Therefore, this work introduces general methods to enforce and verify information flow properties of computer programs, which are later specialized to tree-manipulating processes. First, the class of programs are considered that implement transformations from initial states into final states. A runtime monitor and a static analysis are introduced for the enforcement and verification of the information flow properties of these programs. Later, a model checking approach is presented, in order to verify systems that exchange a potentially unbounded sequence of data values with their environment during an execution. In all of the methods discussed abstraction techniques are applied to overapproximate the sets of positions of secrets in the tree-shaped data-values before they are released to the environment.
Kategoria Książki po angielsku Computing & information technology Information technology: general issues
358.53 zł
Od roku 2008 obsłużyliśmy wielu miłośników książek, ale dla nas każdy był tym wyjątkowym.
Copyright! ©2008-24 libristo.pl Wszelkie prawa zastrzeżonePrywatnieCookies
Dobre na wszystkich stronach
Koszyk ( pusty )