did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781591401865

Information Security Policies and Actions in Modern Integrated Systems

by ;
  • ISBN13:

    9781591401865

  • ISBN10:

    1591401860

  • Format: Hardcover
  • Copyright: 2004-02-01
  • Publisher: Igi Global
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $79.95
  • Digital
    $89.94
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

It is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Table of Contents

Preface vi
Section I: Cryptography
Chapter I Architectures for Advanced Cryptographic Systems
1(63)
Guido Bertoni, Politecnico di Milano, Italy
Jorge Guajardo, Infineon Technologies AG, Germany
Christof Paar, Ruhr Universitat Bochum, Germany
Chapter II Digital Certificates and Public-Key Infrastructures
64(34)
Diana Berbecaru, Politecnico di Torino, Italy
Corrado Derenale, Politecnico di Torino, Italy
Antonio Lioy, Politecnico di Torino, Italy
Chapter III Smart Card Applications and Systems: Market Trend and Impact on Other Technological Developments
98(51)
Gerald Maradan, STMicroelectronics, France
Pierre Cotte, STMicroelectronics, France
Thierry Fornas, STMicroelectronics, France
Section II: Authorization Frameworks
Chapter IV A Flexible Authorization Framework
149(28)
Duminda Wijesekera, George Mason University, USA
Sushil Jajodia, George Mason University, USA
Chapter V Enforcing Privacy on the Semantic Web
177(21)
Abdelmounaam Rezgui, Virginia Tech, USA
Athman Bouguettaya, Virginia Tech, USA
Zaki Malik, Virginia Tech, USA
Section III: Data Distribution and Dissemination on the Net
Chapter VI Secure Data Dissemination
198(32)
Elisa Bertino, Università degli Studi di Milano, Italy
Barbara Carminati, Università degli Studi di Milano, Italy
Elena Ferrari, Università degli Studi dell'Insubria, Italy
Chapter VII Multimedia Security and Digital Rights Management Technology
230(43)
Eduardo Fernandez-Medina, Universidad de Castilla-La Mancha, Spain
Sabrina De Capitani di Vimercati, Universitá di Milano, Italy
Ernesto Damiani, Universitá di Milano, Italy
Mario Piattini, Universidad de Castilla-La Mancha, Spain
Pierangela Samarati, Universitá di Milano, Italy
Section IV: Service Oriented Computing Frameworks
Chapter VIII Data and Application Security for Distributed Application Hosting Services
273(44)
Ping Lin, Arizona State University, USA
K. Selçuk Candan, Arizona State University, USA
Chapter IX Comparing the Security Architectures of Sun ONE and Microsoft .NET
317(14)
Eduardo B. Fernandez, Florida Atlantic University, USA
Michael Thomsen, Florida Atlantic University, USA
Minjie H. Fernandez, Florida Atlantic University, USA
About the Authors 331(8)
Index 339

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program