This Title All WIREs
How to cite this WIREs title:
WIREs Comp Stat

Computer security

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

Abstract Computer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies. We will put various enforcement mechanisms into context with the policies and the IT architectures they were originally designed for. We will also briefly touch on network security and conclude with remarks on security evaluation. Copyright © 2010 John Wiley & Sons, Inc. This article is categorized under: Algorithms and Computational Methods > Networks and Security

Access control = authentication + authorization.

[ Normal View | Magnified View ]

Placing the reference monitor. (a) RM in kernel, (b) interpreter, and (c) In‐line RM.

[ Normal View | Magnified View ]

Reflected cross‐site scripting with cookie stealing.

[ Normal View | Magnified View ]

Man‐in‐the‐middle attack on secure application layer sessions.

[ Normal View | Magnified View ]

Browse by Topic

Algorithms and Computational Methods > Networks and Security

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts