qThis book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technologyq--Provided by publisher.A model of an intruder who can read, alter and destroy traffic, and who can also control some legitimate members of the system. ... model checker (Huima, 1999), Brutus (Clarke, Jha, aamp; Marrero, 2000) and Athena (Song, Berezin, aamp; Perrig 2001). ... The manual application of formal techniques remains difficult and error-prone.
|Title||:||Handbook of Research on Information Security and Assurance|
|Author||:||Gupta, Jatinder N. D.|
|Publisher||:||IGI Global - 2008-08-31|