Cover image for Information security policies and actions in modern integrated systems
Title:
Information security policies and actions in modern integrated systems
Publication Information:
Hershey, P.A. : Idea Group Pub., 2004
ISBN:
9781591402916

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010067757 QA76.9.A25 I53 2004 Open Access Book Book
Searching...
Searching...
30000010081731 QA76.9.A25 I53 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

A discussion of research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Topics covered in the text include XML-based management systems, security of multimedia data, and technology and use of smart cards.


Table of Contents

Guido Bertoni and Jorge Guajardo and Christof PaarDiana Berbecaru and Corrado Derenale and Antonio LioyGerald Maradan and Pierre Cotte and Thierry FornasDuminda Wijesekera and Sushil JajodiaAbdelmounaam Rezgui and Athman Bouguettaya and Zaki MalikElisa Bertino and Barbara Carminati and Elena FerrariEduardo Fernandez-Medina and Sabrina De Capitani di Vimercati and Ernesto Damiani and Mario Piattini and Pierangela SamaratiPing Lin and K. Selcuk CandanEduardo B. Fernandez and Michael Thomsen and Minjie H. Fernandez
Prefacep. vi
Section I Cryptography
Chapter I Architectures for Advanced Cryptographic Systemsp. 1
Chapter II Digital Certificates and Public-Key Infrastructuresp. 64
Chapter III Smart Card Applications and Systems: Market Trend and Impact on Other Technological Developmentsp. 98
Section II Authorization Frameworks
Chapter IV A Flexible Authorization Frameworkp. 149
Chapter V Enforcing Privacy on the Semantic Webp. 177
Section III Data Distribution and Dissemination on the Net
Chapter VI Secure Data Disseminationp. 198
Chapter VII Multimedia Security and Digital Rights Management Technologyp. 230
Section IV Service Oriented Computing Frameworks
Chapter VIII Data and Application Security for Distributed Application Hosting Servicesp. 273
Chapter IX Comparing the Security Architectures of Sun ONE and Microsoft .NETp. 317
About the Authorsp. 331
Indexp. 339