Advances in computers Volume ninety four Volume ninety four /
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal ar...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Massachusetts ; San Diego, California :
Elsevier
2014.
|
Edición: | First edition |
Colección: | Advances in Computers,
Volume 94 |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628241106719 |
Tabla de Contenidos:
- Front Cover; Advances in Computers; Copyright; Contents; Preface; Chapter One: Comparison of Security Models: Attack Graphs Versus Petri Nets; 1. Introduction; 2. Static and Dynamic Security Models; 2.1 Attack Graphs; 2.2 Stochastic Attack Graphs ; 2.3 Petri Nets; 2.4 Stochastic Petri Nets; 3. Model-Based Analysis of System Security; 3.1 Security Analysis Based on Classical Attack Graph Model; 3.1.1 Reachability Analysis; 3.1.2 Minimization Analysis; 3.1.3 Model Checking Analysis; 3.1.4 Attribute Analysis; 3.2 Security Analysis Based on the Stochastic Attack Graph Model
- 3.2.1 State Risk-Level Analysis3.2.2 Stochastic Shortest Path Analysis; 4. Security Analysis Based on Petri Nets; 4.1 Security Analysis Based on Classical Petri Nets; 4.1.1 Behavioral Analysis of Petri Nets; 4.2 Security Analysis Based on Stochastic Petri Nets; 5. Conclusions; Chapter Two: A Survey on Zero-Knowledge Proofs; 1. Background and Motivation; 2. Introduction; 2.1 Interactive Proof and Its Properties; 2.2 A Simple Example; 2.3 Computational Indistinguishability; 2.4 One-Way Function; 2.5 Simulation Paradigm; 2.6 Definition of ZKP; 2.7 Witness Indistinguishability
- 2.8 Honest Verifier Versus General Cheating Verifier2.9 Black-Box Simulator Versus Non-Black-Box Simulator; 2.10 Quality of ZKPs; 3. NP Problem and ZKPs; 4. ZKP Applications; 4.1 ZKP for Graph Three Colorability; 4.2 ZKP for Feige-Fiat-Shamir Identification Scheme; 4.3 ZKP for GI; 4.4 ZKP for Hamiltonian Cycle; 4.5 Another ZKP for Graph Three Colorability; 4.6 ZKP Sketch for SAT; 4.7 ZKP for Circuit Computations; 4.8 ZKP for Exact Cover; 4.9 ZKP for 0-1 Knapsack; 5. Advanced Topics in Composing ZKPs; 5.1 Composing ZKPs; 5.1.1 The Richardson-Kilian Concurrent ZKP Protocol
- 5.1.2 The Improved Concurrent ZKP Protocol5.2 Efficiency Considerations; 5.3 Knowledge Complexity; 5.4 Noninteractive Zero Knowledge; 6. Conclusion; References; Chapter Three: Similarity of Private Keyword Search over Encrypted Document Collection; 1. Introduction; 2. Background and Definitions; 2.1 Similarity Metric; 2.2 Searchable Encryption; 2.2.1 Symmetric Searchable Encryption; 2.2.2 Asymmetric Searchable Encryption; 2.2.3 Security Requirements; 2.3 Terminologies and Other Basic Tools; 3. Constructing Similarity Keyword Set; 3.1 Enumeration Technique; 3.2 Wildcard-Based Technique
- 4. Constructing Secure Index4.1 Inverted-Index-Based Secure Index; 4.2 Symbol-Trie-Based Secure Index; 4.3 LSH-Based Secure Index; 4.4 Bed-Tree-Based Secure Index; 4.5 Bilinear-Based Secure Index; 5. Overview of Some Existing Schemes; 5.1 Symmetric-Key PKS; 5.2 Verifiable Symmetric-Key PKS; 5.3 Verifiable Symmetric-Key PKS Using Twin Cloud; 5.4 LSH-Based PKS; 5.5 Bed-Tree Multi-PKS; 5.6 Public-Key PKS; 5.7 Classification; 6. Conclusion; Chapter Four: Multiobjective Optimization for Software Refactoring and Evolution; 1. Introduction; 1.1 Research Context; 1.2 Problem Statement
- 1.2.1 Automating Defects Detection