Multilevel modeling of secure systems in QoP-ML

This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Topics include: quality of protec...

Full description

Saved in:
Bibliographic Details
Main Author: Ksįeżopolski, Bogdan (Author)
Format: Book
Language:English
Published: Boca Raton, FL CRC Press, Taylor & Francis 2015
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 98372
003 MY-KLNDU
005 20241220022530.0
008 221104 20162016flua bi 001 0 eng d
020 |a 9781482202557 (Hardback) 
039 9 |a 202211041134  |b VLOAD  |c 201605031617  |d faezah  |y 201512091902  |z zubir 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9.A25  |b K79 2016 
100 1 |a Ksįeżopolski, Bogdan  |e author 
245 1 0 |a Multilevel modeling of secure systems in QoP-ML  |c Bogdan Ksiezopolski 
264 1 |a Boca Raton, FL  |b CRC Press, Taylor & Francis  |c 2015 
264 4 |c © 2016 
300 |a xx, 242 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
400 0 |a Bogdan Ksiezopolski 
504 |a Includes bibliographical references and index 
505 0 |a Chapter 1: Introduction to multilevel modeling of secure systems; Chapter 2: Basis of QoP-ML -- Chapter 3: Quality of protection evaluation of security mechanisms -- Chapter 4: Advanced communication and energy efficiency modeling -- Chapter 5: Environmental impact and financial costs analysis -- Chapter 6: Reputation analysis in QoP-ML -- Chapter 7: Security metrics -- Methodology -- Chapter 8: Tool support -- Chapter 9: Functionality and usability of QoP-ML; 
520 |a This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Topics include: quality of protection evaluation of IT Systems; financial, economic, and CO2 emission analysis phase; multilevel analysis of cloud-based data centers; structures for advanced communication modeling and energy analysis; security and energy efficiency trade-offs for the protocols of wireless sensor network architectures; security metrics of cryptographic primitives; compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework 
592 |a IN/11523  |b 03/03/2016  |c RM 400.00  |h Innowawasan 
650 0 |a Computer security  |x Computer simulation 
650 0 |a Computers  |x Access control  |x Computer simulation 
650 0 |a Computer networks  |x Security measures  |x Data processing 
650 0 |a Risk assessment  |x Data processing 
999 |a vtls000056041  |c 98372  |d 98372