Advances in computers Volume ninety four Volume ninety four /

Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal ar...

Descripción completa

Detalles Bibliográficos
Otros Autores: Hurson, A. R., author (author), Hurson, A. R., editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts ; San Diego, California : Elsevier 2014.
Edición:First edition
Colección:Advances in Computers, Volume 94
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628241106719
Tabla de Contenidos:
  • Front Cover; Advances in Computers; Copyright; Contents; Preface; Chapter One: Comparison of Security Models: Attack Graphs Versus Petri Nets; 1. Introduction; 2. Static and Dynamic Security Models; 2.1 Attack Graphs; 2.2 Stochastic Attack Graphs ; 2.3 Petri Nets; 2.4 Stochastic Petri Nets; 3. Model-Based Analysis of System Security; 3.1 Security Analysis Based on Classical Attack Graph Model; 3.1.1 Reachability Analysis; 3.1.2 Minimization Analysis; 3.1.3 Model Checking Analysis; 3.1.4 Attribute Analysis; 3.2 Security Analysis Based on the Stochastic Attack Graph Model
  • 3.2.1 State Risk-Level Analysis3.2.2 Stochastic Shortest Path Analysis; 4. Security Analysis Based on Petri Nets; 4.1 Security Analysis Based on Classical Petri Nets; 4.1.1 Behavioral Analysis of Petri Nets; 4.2 Security Analysis Based on Stochastic Petri Nets; 5. Conclusions; Chapter Two: A Survey on Zero-Knowledge Proofs; 1. Background and Motivation; 2. Introduction; 2.1 Interactive Proof and Its Properties; 2.2 A Simple Example; 2.3 Computational Indistinguishability; 2.4 One-Way Function; 2.5 Simulation Paradigm; 2.6 Definition of ZKP; 2.7 Witness Indistinguishability
  • 2.8 Honest Verifier Versus General Cheating Verifier2.9 Black-Box Simulator Versus Non-Black-Box Simulator; 2.10 Quality of ZKPs; 3. NP Problem and ZKPs; 4. ZKP Applications; 4.1 ZKP for Graph Three Colorability; 4.2 ZKP for Feige-Fiat-Shamir Identification Scheme; 4.3 ZKP for GI; 4.4 ZKP for Hamiltonian Cycle; 4.5 Another ZKP for Graph Three Colorability; 4.6 ZKP Sketch for SAT; 4.7 ZKP for Circuit Computations; 4.8 ZKP for Exact Cover; 4.9 ZKP for 0-1 Knapsack; 5. Advanced Topics in Composing ZKPs; 5.1 Composing ZKPs; 5.1.1 The Richardson-Kilian Concurrent ZKP Protocol
  • 5.1.2 The Improved Concurrent ZKP Protocol5.2 Efficiency Considerations; 5.3 Knowledge Complexity; 5.4 Noninteractive Zero Knowledge; 6. Conclusion; References; Chapter Three: Similarity of Private Keyword Search over Encrypted Document Collection; 1. Introduction; 2. Background and Definitions; 2.1 Similarity Metric; 2.2 Searchable Encryption; 2.2.1 Symmetric Searchable Encryption; 2.2.2 Asymmetric Searchable Encryption; 2.2.3 Security Requirements; 2.3 Terminologies and Other Basic Tools; 3. Constructing Similarity Keyword Set; 3.1 Enumeration Technique; 3.2 Wildcard-Based Technique
  • 4. Constructing Secure Index4.1 Inverted-Index-Based Secure Index; 4.2 Symbol-Trie-Based Secure Index; 4.3 LSH-Based Secure Index; 4.4 Bed-Tree-Based Secure Index; 4.5 Bilinear-Based Secure Index; 5. Overview of Some Existing Schemes; 5.1 Symmetric-Key PKS; 5.2 Verifiable Symmetric-Key PKS; 5.3 Verifiable Symmetric-Key PKS Using Twin Cloud; 5.4 LSH-Based PKS; 5.5 Bed-Tree Multi-PKS; 5.6 Public-Key PKS; 5.7 Classification; 6. Conclusion; Chapter Four: Multiobjective Optimization for Software Refactoring and Evolution; 1. Introduction; 1.1 Research Context; 1.2 Problem Statement
  • 1.2.1 Automating Defects Detection