Plus d’un million de livres à portée de main !
Bookbot

Information systems security

Paramètres

  • 342pages
  • 12 heures de lecture

En savoir plus sur le livre

This collection explores various aspects of security in distributed applications and information systems. It discusses enhanced security measures, including location-based and video information in access control policies, and addresses mutable internet pathogens and parasitic behavior. The text highlights India's potential as a hub for secure software development, emphasizing opportunities for the ICT industry. Key topics include auditable anonymous delegation, robust auction protocols, and trust management systems based on vector models. The analysis of trust in distributed systems is complemented by privacy enforcement techniques using ECA rules and mapping local to credential-based access control policies. The protection of relationships in XML documents is examined through the XML-BB model, while enterprise application security solutions for databases are also presented. Event detection in multilevel secure databases and key management for multicast fingerprinting are discussed alongside key reshuffling schemes for wireless sensor networks. Techniques for detecting ARP spoofing and masquerade detection are explored, as well as game-theoretic approaches to credit card fraud detection and modifications to SHA-0. The text also delves into key escrow and identity revocation in identity-based encryption schemes, broadcast encryption with random key pre-distribution, and the intersection of skill specialization, gender inequit

Édition

Achat du livre

Information systems security, Sushil Jajodia

Langue
Année de publication
2005
product-detail.submit-box.info.binding
(souple)
Nous vous informerons par e-mail dès que nous l’aurons retrouvé.

Modes de paiement

Personne n'a encore évalué .Évaluer