|
![]() |
|||
|
||||
OverviewIn order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security. Full Product DetailsAuthor: Bogdan KsiezopolskiPublisher: Taylor & Francis Ltd Imprint: CRC Press Weight: 0.480kg ISBN: 9781138894594ISBN 10: 1138894591 Pages: 262 Publication Date: 31 January 2024 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationBogdan Księżopolski is an assistant professor at the Polish-Japanese Academy of Information Technology in Warsaw and Maria Sklodowska-Curie University in Lublin. He received his M.Sc. in computer physics from Maria Curie-Sklodowska University in Lublin and his Ph.D. in computer science from Polish-Japanese Academy of Information Technology in Warsaw, Poland. His research interests include information security, cryptology, security metrics, security engineering, and cryptographic protocols. He has published over 40 papers on computers security. He is the founder and creator of the Quality of Protection Modeling Language (QoP-ML) which enables multilevel modeling of secure systems. Tab Content 6Author Website:Countries AvailableAll regions |