APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS.

Richard DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison, Richard J. Lipton

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Scopus citations

Abstract

The security of a computer system is considered in these lectures and three important aspects of system security are surveyed: cryptography, software approaches and cryptographic protocols. Data security is discussed paying particular attention to modern techniques of encryption and cryptanalysis. Technical basis of access control modeling and multilevel system requirements is presented and most useful models for multilevel security are highlighted. Views are expressed on how security requirements can be met through the use of protocols built on highly secure cryptographic techniques.

Original languageEnglish (US)
Title of host publicationProceedings of Symposia in Applied Mathematics
PublisherAmerican Mathematical Soc
Volume29
ISBN (Print)0821800418
StatePublished - 1983

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS.'. Together they form a unique fingerprint.

  • Cite this

    DeMillo, R., Davida, G. I., Dobkin, D. P., Harrison, M. A., & Lipton, R. J. (1983). APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS. In Proceedings of Symposia in Applied Mathematics (Vol. 29). American Mathematical Soc.