2010
DOI: 10.1002/wics.106
|View full text |Cite
|
Sign up to set email alerts
|

Computer security

Abstract: Computer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies. We will put various enforcement mechanisms into context with the policies and the IT architectures they were originally designed for. We will also briefly touch on network security and conclude with remarks on security evaluation. Copyright © 2010 … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
3

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 123 publications
(47 citation statements)
references
References 28 publications
0
44
0
3
Order By: Relevance
“…Gollmann's computer security textbook acknowledges from the first edition in 1999 that it is "not easy to give a concise definition" [15] of integrity. Other definitions of integrity allow to differentiate between authorized and unauthorized modifications.…”
Section: State Of the Art And Definitionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Gollmann's computer security textbook acknowledges from the first edition in 1999 that it is "not easy to give a concise definition" [15] of integrity. Other definitions of integrity allow to differentiate between authorized and unauthorized modifications.…”
Section: State Of the Art And Definitionsmentioning
confidence: 99%
“…Other definitions of integrity allow to differentiate between authorized and unauthorized modifications. [15] We do not want to do another hunt for an integrity definition. For this paper it is sufficient to see integrity as a state describing data which is verifiably to be "as it was supposed to be" [15] since the integrity protection was applied.…”
Section: State Of the Art And Definitionsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is done using evidences [9] that allow to decide unquestionably in favor of the fair principal whenever there is a dispute. In particular, non-repudiation of origin provides the recipient with proof of origin while non-repudiation of receipt provides the originator with proof of receipt.…”
Section: Non-repudiation Analysismentioning
confidence: 99%
“…Given this history, it is not surprising that in the security community, there is a perception that secure watermarking is "theoretically impossible," as expressed, for instance, in [1,17,18]. While this idea is intuitively appealing, it is difficult to prove something is (im)possible without first formally defining the notion.…”
Section: Introductionmentioning
confidence: 99%