Adaptive Cryptographic Access Control: 48 (Advances in Information Security)
Adaptive Cryptographic Access Control: 48 (Advances in Information Security) is backordered and will ship as soon as it is back in stock.
Couldn't load pickup availability
Genuine Products Guarantee
Genuine Products Guarantee
We guarantee 100% genuine products, and if proven otherwise, we will compensate you with 10 times the product's cost.
Delivery and Shipping
Delivery and Shipping
Products are generally ready for dispatch within 1 day and typically reach you in 3 to 5 days.
Book Details
-
Author: Kayem, Anne V. D. M.
-
Brand: Springer
-
Edition: 2010 ed.
-
Binding: Hardcover
-
Format: Import
-
Number of Pages: 138
-
Release Date: 16-08-2010
-
ISBN: 9781441966544
-
Languages: English
-
Package Dimensions:
-
Length: 9.3 inches
-
Width: 6.4 inches
-
Height: 0.6 inches
-
About The Book
"Adaptive Cryptographic Access Control" by Anne V. D. M. Kayem is an essential resource for understanding the challenges and solutions in securing data using cryptographic methods. The book presents the concept of Cryptographic Access Control (CAC), which uses encryption and keys to ensure that only authorized users can decrypt data or perform further encryptions. This approach is crucial for organizations in the corporate, governmental, and military sectors, where controlled access to information is imperative.
The book emphasizes the need for adaptability in cryptographic access control schemes, particularly for dynamic environments such as the Internet. It offers insights into the design of hierarchical cryptographic key management algorithms that can adapt to changing environments. The book suggests solutions to overcome the challenges inherent in implementing Adaptive Access Control, making it a key resource for professionals dealing with security in dynamic contexts.
With a balance of theoretical concepts and practical applications, the book includes case studies and examples that help to clarify the implementation of these advanced access control methods. It is a must-read for anyone interested in the future of cryptographic access control and its evolving role in securing sensitive data.