Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Ferrari E. — Web and Information Security
Ferrari E. — Web and Information Security

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Web and Information Security

Автор: Ferrari E.

Аннотация:

Edited versions of selected papers from a 2002 IEEE COMPSAC workshop held in Oxford, UK, together with several additional papers on state- of-the-art topics, cover key developments, directions, and challenges for securing the semantic Web, managing and enforcing security policies, and securing emerging systems such as multimedia and collaborative networks. The audience for the text includes students in upper-level undergraduate and graduate courses in information security that have a focus on Web security as well as technologists, researchers, managers, and developers who want o know more about emerging security technologies


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 300

Добавлена в каталог: 30.12.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Access, control      2 53 57 149 176 227
Access, control language      61
Access, modeling      152
Access, policies      149
Accountability      7
Aggressive Chinese Wall Security Policy (ACWSP)      197 201
Anonymity      59 246 253
Anonymization      134
Anti-reflexive      201
Anti-transitive      201
Application, level policy      175
Approximate retrieval      198
ARCE      161
ARCE, project      150
Ariadne Development Method (ADM)      150
Authentication      38 53 176
Authenticity      180
Authorization      42 54
Automatic authorship identification      136
B2C      176 180
Bayesian model      224
Binary granulation      198
Binary neighborhood systems (BNS)      198
Blocking, based techniques      291
BNS      198
Business, to consumer (B2C)      176 180
Chinese Wall Security Policy      196
CIR      197
Client      54
Clustering      105
Collaborative Pervasive Computing Applications      265
Collaborative Pervasive Computing Environments      265
Common Information Model (CIM)      184
Complementarity      247
Compliance mechanism      7
Conceptive landmark      284
Conceptual system architecture      220
Confidence level coefficient (CLC)      82
Confidentiality      41 53 180 241 244
Conflict of interest (CIR)      197
Consistency analysis module      222
content analysis      224
content filtering      112
Content label      116
Context Extractor (CEx)      221
COPCA      265
COPCE      265
Correlated data      82
Credential evaluator (CEv)      221
Credentials authority      60
Critical system      241
Cryptography      63
DAC      198
Dag      157
Data, analysis      217
Data, confidentiality      73
Data, integrity      53
Data, linkage      77
Data, mining      77 97 105 135 216 282
Data, modification      289
Data, partitioning      288
Data, restriction techniques      290
Data, sharing      265 267
Database inference      77
Deployment landmark      284
developer      175
Digital credentials      60
Digital rights management (DRM)      61
Digital signature      41
Direct filtering      116
Directed Acyclic Graph (DAG)      157
Discretionary access control (DAC)      10 58 154 198
Discretionary Access Control (DAC), models      270
DRM      61
Dynamic classifier selection (DCS)      224
e-Business      56
E-commerce      176 180
e-mail      113
Encryption      41
Enterprise Privacy Authorization Language (EPAL)      66
EPAL      66
eXtensible Access Control Markup Language (XACML)      61 183
Extensible markup language (XML)      75 92
Extensible Rights Markup Language (XrML)      61
Filtering      115 225
Filtering services      115
FragIDs      9
Fuzzy logic control system      198
General Purpose Techniques (GPT)      292
Global access mediation module      222
Global grid      96
Global policy base      222
Google      115
Google SafeSearch      115
Granular computing      196
Heterogeneity      218
Heterogeneity, management      222
Hsiao      198
HTML      13 93
Hypermedia      151
Hypermedia, access models      153
Hypermedia, Web systems      149
Hypertext, Transfer Protocol (HTTP)      12
Hypertext, Transport Protocol (http)      1
IBM      37 61
ICRA      116
Identification      176
Inconsistency      12
Indirect filtering      116
Inference      73 77
Information, extraction      105 135 136
Information, infrastructure      216
Information, security      215
Information, systems security      173
Integration      98 102
Integrity      41 244
Interdependency      247
Internet      34 41 113 287
Internet, Content Rating Association (ICRA)      116
Interoperability      35 177
k-anonymity      134 138
Keyword blocking      116
knowledge management      98 103
Labyrinth hypermedia model      157
Language      61 75
Law      4
Liberty Alliance Project      36
Long-ranged data analysis      217
MAC      270
Machine learning      134
Mandatory access control (MAC)      57 270
MARAH model      157
matchmaking      269
Memory      252
Message Understanding Conferences (MUCs)      135
Metadata      80
Microsoft      37 61
Motro      198
MPEG-21      113
MPEG-7      113
Multilevel content analysis      224
Multimedia      93
Multimedia, data      217
Multimedia, security      216
Multistrategy Filtering Model (MFM)      120
Naive — Bayes      224
Natural language database      135
Network security policy      175
Noise addition techniques      289
non-repudiation      53
OASIS      37
ODRL      61
Off-line environment      5
Online, environment      5
Online, multimedia      113
Ontology      92 95
Ontology, languages      75
Ontology, mapping      106
Open Digital Rights Language (ODRL)      61
Originator control (ORCON)      58
OWL-S      96
Owner-Retained Access Control (ORAC)      59
Oxsegin      81
P3P Preference Exchange Language (APPEL)      64
Parallel processing      96
Password      6 8
Performance      114
Personal data      76
Personalization      56
Platform for Enterprise Privacy Practices (E-P3P)      65
Policy, aware      4
Policy, aware Web      1
Policy, based management (PBM)      173
Policy, composition interface      220
Policy, console      178
Policy, decision point (PDP)      175 187
Policy, enforcement, agent (PEA)      189
Policy, enforcement, point (PEP)      188
Policy, language      176
Policy, management, process      179
Policy, management, tool (PMT)      175 187
Policy, propagation      119
Policy, repository      187
Ponder      181
Privacy      45 52 63 74 104 133 180 227 244 282
Privacy Preferences (P3P)      6
Privacy, conscious entities (PCEs)      136
Privacy, management      217
Privacy, preferencesproject (P3P)      63
Privacy, preserving data mining      282
Privacy, violation      285
Proof, carrying authentication (PCA)      19
Property      94
Prospective landmark      284
Protection      114
Public policy      4
QoS Policies      178
Quality of service (QoS)      217
Rating system      119
RBAC      270
RDF      79 92
RDF, Schema (RDFS)      73
Real-time, content analysis      224
Real-time, data analysis      217
Reliability      274
Resource      94
Resource, description framework (RDF)      14 73 92
Role, based access control (RBAC)      58 154 270
Rule, based access      1 8
Rules engines      13
Sanitization      134
Sanitization, based techniques      291
Search, engine      134
Search, global grid      101
Search, integration      102
Search, key management      248
Search, knowledge management      103
Search, multi-party computation (SMC)      288
Secure semantic, grid      99
Secure semantic, Web      100
Security      2 32 37 74 84 107 133 175 199 216 241 244
Security, policy languages      181
Security, violation pointer (SVP)      82
Self-rating      115
Semantic, grids      91
Semantic, modeling      79
Semantic, Web      1 34 73 91 100 112
Semantic, Web, community portal      75
Semantic, Web, inference      76
Semantic, Web, mining      104
Semantic, Web, proof engine      15
Sensor network      243 253
Sensornet      241 249
Service, discovery      269
Service, oriented architecture (SOA)      35
Service, session management module (SMM)      220
Service, specification language      268
SOA      35
SOAP      35
Social      3
Software agent      96
software development process      152
Space transformation techniques      290
Stakeholder      151
Statement      94
Sun Microsystems      36
Symmetric binary relation      202
Task, based access control (TBAC)      59
Text, mining      134
Text, sanitization      140
Third-party rating      115
Tracing authorities (TA)      66
Transparency      6
Trust      34 43 66 95 266
UDDI      35
Unified Policy Management (UPM)      189
Unified Resource Identifier (URI)      94
UPM      189
URI      94
User      8 35 59 118
User profile      118
Value class membership      140
Value dissociation      140
Value distortion      140
Virtual Private Network      41
W3C XML Digital Signature      39
Web browser      179
Web data techniques (WDT)      292
Web filtering      115
Web information system (WIS)      180
Web Ontology Language (OWL)      73
Web rating      115
Web security services      52
Web Service      96
Web service, description language (WSDL)      268
Web Services      32 53
Web services, interoperability organization (WS-I)      36
Web services, security      32
WordNet      105
World Wide Web (WWW)      1 76 133
World Wide Web (WWW), Consortium (W3C)      9 36 75
WS-Authorization      61
WS-Policy      61
WSDL      35
X.800      52
XACML      61
XDCM      220
XML      35 61 75 92 229
XPref      64
XrML      61
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2017
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте