Multilevel modeling of secure systems in QoP-ML
This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Topics include: quality of protec...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press, Taylor & Francis
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 98372 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220022530.0 | ||
| 008 | 221104 20162016flua bi 001 0 eng d | ||
| 020 | |a 9781482202557 (Hardback) | ||
| 039 | 9 | |a 202211041134 |b VLOAD |c 201605031617 |d faezah |y 201512091902 |z zubir | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b K79 2016 | ||
| 100 | 1 | |a Ksįeżopolski, Bogdan |e author | |
| 245 | 1 | 0 | |a Multilevel modeling of secure systems in QoP-ML |c Bogdan Ksiezopolski |
| 264 | 1 | |a Boca Raton, FL |b CRC Press, Taylor & Francis |c 2015 | |
| 264 | 4 | |c © 2016 | |
| 300 | |a xx, 242 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 400 | 0 | |a Bogdan Ksiezopolski | |
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a Chapter 1: Introduction to multilevel modeling of secure systems; Chapter 2: Basis of QoP-ML -- Chapter 3: Quality of protection evaluation of security mechanisms -- Chapter 4: Advanced communication and energy efficiency modeling -- Chapter 5: Environmental impact and financial costs analysis -- Chapter 6: Reputation analysis in QoP-ML -- Chapter 7: Security metrics -- Methodology -- Chapter 8: Tool support -- Chapter 9: Functionality and usability of QoP-ML; | |
| 520 | |a This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Topics include: quality of protection evaluation of IT Systems; financial, economic, and CO2 emission analysis phase; multilevel analysis of cloud-based data centers; structures for advanced communication modeling and energy analysis; security and energy efficiency trade-offs for the protocols of wireless sensor network architectures; security metrics of cryptographic primitives; compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework | ||
| 592 | |a IN/11523 |b 03/03/2016 |c RM 400.00 |h Innowawasan | ||
| 650 | 0 | |a Computer security |x Computer simulation | |
| 650 | 0 | |a Computers |x Access control |x Computer simulation | |
| 650 | 0 | |a Computer networks |x Security measures |x Data processing | |
| 650 | 0 | |a Risk assessment |x Data processing | |
| 999 | |a vtls000056041 |c 98372 |d 98372 | ||


