Automated Security Management. (Record no. 804687)

001 - CONTROL NUMBER
control field EBL1538876
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
additional material characteristics m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr -n---------
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131119s2013||||||| s|||||||||||eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319014333
Terms of availability 79.99 (NL)
035 ## - SYSTEM CONTROL NUMBER
System control number (AU-PeEL)1538876
040 ## - CATALOGING SOURCE
Original cataloging agency AU-PeEL
Language of cataloging eng
Transcribing agency AU-PeEL
Modifying agency AU-PeEL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9 .A25
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) QA76.9 .A25
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Al-Shaer, Ehab.
245 10 - TITLE STATEMENT
Title Automated Security Management.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Dordrecht :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2013.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (185 p.)
490 0# - SERIES STATEMENT
Series statement eBooks on Demand
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface; Contents; Part I Configuration Modeling and Checking; 1 Towards a Unified Modeling and Verification of Network and System Security Configurations; 1.1 Introduction; 1.2 Framework Overview; 1.3 Network Model; 1.3.1 State Representation; 1.3.2 Network Devices; 1.4 Application Layer Model; 1.4.1 Application Layer Access-Control; 1.4.2 State Representation; 1.5 Querying the Model; 1.5.1 Model Checking; 1.5.2 Query Structure and Features; 1.5.3 Example Properties; 1.6 Evaluation; 1.7 Related Work; 1.8 Conclusion; References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2 Modeling and Checking the Security of DIFC SystemConfigurations2.1 Introduction; 2.2 Preliminaries; 2.2.1 Tags and Labels; 2.2.2 Capabilities; 2.2.3 Declassification; 2.2.4 Configuration and Security Policy; 2.3 Threat Model; 2.4 Formal Model; 2.4.1 DIFC Configuration Schemes; 2.4.1.1 States; 2.4.1.2 State Transition Rules; 2.4.1.3 Properties; 2.4.2 Security Analysis Problem for DIFC Configuration; 2.5 Our Approach; 2.5.1 Model Checking; 2.5.2 Preprocessing; 2.6 Experiment and Evaluation; 2.7 Discussion; 2.8 Related Works; 2.8.1 Decentralized Information Flow Control
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.8.2 Security Analysis of Access Control2.9 Conclusion; References; Part II Vulnerability and Risk Assessment; 3 Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework; 3.1 Introduction; 3.2 Related Work; 3.3 Vulnerability Assessment Process Model; 3.4 An OVAL-Based Framework for Assessing Android Vulnerabilities; 3.4.1 Architecture and Main Components; 3.4.2 Optimized Assessment Strategy; 3.5 Implementation Prototype; 3.6 Performance Evaluation; 3.6.1 Analytical Evaluation; 3.6.2 Technical Experimentation; 3.7 Conclusions and Future Work; References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4 A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure4.1 Introduction; 4.2 Background and Challenges; 4.2.1 AMI System Complexity; 4.2.2 Potential Threats in AMI; 4.3 AMISecChecker Architecture; 4.4 AMI Configuration Model; 4.4.1 AMI Physical Components; 4.4.2 AMI Network Topology; 4.4.3 AMI Data Delivery Modes; 4.4.4 Miscellaneous Modeling; 4.5 AMI Threat Analysis; 4.5.1 AMI Configuration Analysis; 4.5.1.1 Reachability Analysis; 4.5.1.2 Data Delivery Analysis; 4.5.1.3 Schedule Misconfiguration Analysis; 4.5.2 AMI Security Control Analysis
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.5.2.1 Analyzing DoS Attacks4.5.2.2 Analyzing Violation of Boundary Protection; 4.5.2.3 Miscellaneous Threat Analysis; 4.6 Implementation and Evaluation; 4.6.1 Efficacy; 4.6.2 Scalability; 4.7 Related Work; 4.8 Conclusion; References; 5 Risk Based Access Control Using Classification; 5.1 Introduction; 5.2 Preliminaries; 5.2.1 RBAC; 5.2.2 Classification; 5.3 Risk Based Access Control; 5.3.1 Risk Based Permission Authorization; 5.3.2 Risk Based Authorization of Roles; 5.4 Experimental Evaluation; 5.4.1 Risk-Based Permission Authorization; 5.4.2 Risk-Based Role Authorization; 5.5 Related Work
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.6 Conclusions
520 ## - SUMMARY, ETC.
Summary, etc In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen
588 ## -
-- Description based upon print version of record.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks -- Security measures -- Standards.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security -- Management.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection -- Standards.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ou, Xinming.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Xie, Geoffrey.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Al-Shaer, Ehab
Title Automated Security Management
Place, publisher, and date of publication Dordrecht : Springer,c2013
International Standard Book Number 9783319014326
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://uttyler.eblib.com/patron/FullRecord.aspx?p=1538876">http://uttyler.eblib.com/patron/FullRecord.aspx?p=1538876</a>
Link text Click here to view this ebook.
901 ## - LOCAL DATA ELEMENT A, LDA (RLIN)
Platform EBL
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Book
Source of classification or shelving scheme
Holdings
Withdrawn status Lost item Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type
          UT Tyler Online UT Tyler Online Online 2013-11-19 QA76.9 .A25 EBL1538876 2013-11-19 http://uttyler.eblib.com/patron/FullRecord.aspx?p=1538876 2013-11-19 Electronic Book