Publisher's Synopsis
This book presents the structure of security mechanisms in the form of interrelated areas such as protection of entities, secure communications, database protection, process control and cryptography, in formal sequences of defined steps. This approach renders the mechanisms suitable for formal analysis and for practical implementation: these mechanisms are also listed in a table.;Other mechanisms, not presented in this table, are provided in descriptive form - such as authorization and protection in a distributed system - thus enabling the book to be used as the basis for other activities in the area of secure computer networks. These include research into new mechanisms, services and secure network application, implementation, usage and other practical activities or integration into large secure and reliable network architectures.;The text is based on the up-dated section of a CEC COST-11 Ter Project, and reflects the co-ordinated work of universities, research institutes and companies in computer networking.