Авторизация
Поиск по указателям
Ferrari E. — Web and Information Security
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Web and Information Security
Автор: Ferrari E.
Аннотация: Edited versions of selected papers from a 2002 IEEE COMPSAC workshop held in Oxford, UK, together with several additional papers on state- of-the-art topics, cover key developments, directions, and challenges for securing the semantic Web, managing and enforcing security policies, and securing emerging systems such as multimedia and collaborative networks. The audience for the text includes students in upper-level undergraduate and graduate courses in information security that have a focus on Web security as well as technologists, researchers, managers, and developers who want o know more about emerging security technologies
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2005
Количество страниц: 300
Добавлена в каталог: 30.12.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Access, control 2 53 57 149 176 227
Access, control language 61
Access, modeling 152
Access, policies 149
Accountability 7
Aggressive Chinese Wall Security Policy (ACWSP) 197 201
Anonymity 59 246 253
Anonymization 134
Anti-reflexive 201
Anti-transitive 201
Application, level policy 175
Approximate retrieval 198
ARCE 161
ARCE, project 150
Ariadne Development Method (ADM) 150
Authentication 38 53 176
Authenticity 180
Authorization 42 54
Automatic authorship identification 136
B2C 176 180
Bayesian model 224
Binary granulation 198
Binary neighborhood systems (BNS) 198
Blocking, based techniques 291
BNS 198
Business, to consumer (B2C) 176 180
Chinese Wall Security Policy 196
CIR 197
Client 54
Clustering 105
Collaborative Pervasive Computing Applications 265
Collaborative Pervasive Computing Environments 265
Common Information Model (CIM) 184
Complementarity 247
Compliance mechanism 7
Conceptive landmark 284
Conceptual system architecture 220
Confidence level coefficient (CLC) 82
Confidentiality 41 53 180 241 244
Conflict of interest (CIR) 197
Consistency analysis module 222
content analysis 224
content filtering 112
Content label 116
Context Extractor (CEx) 221
COPCA 265
COPCE 265
Correlated data 82
Credential evaluator (CEv) 221
Credentials authority 60
Critical system 241
Cryptography 63
DAC 198
Dag 157
Data, analysis 217
Data, confidentiality 73
Data, integrity 53
Data, linkage 77
Data, mining 77 97 105 135 216 282
Data, modification 289
Data, partitioning 288
Data, restriction techniques 290
Data, sharing 265 267
Database inference 77
Deployment landmark 284
developer 175
Digital credentials 60
Digital rights management (DRM) 61
Digital signature 41
Direct filtering 116
Directed Acyclic Graph (DAG) 157
Discretionary access control (DAC) 10 58 154 198
Discretionary Access Control (DAC), models 270
DRM 61
Dynamic classifier selection (DCS) 224
e-Business 56
E-commerce 176 180
e-mail 113
Encryption 41
Enterprise Privacy Authorization Language (EPAL) 66
EPAL 66
eXtensible Access Control Markup Language (XACML) 61 183
Extensible markup language (XML) 75 92
Extensible Rights Markup Language (XrML) 61
Filtering 115 225
Filtering services 115
FragIDs 9
Fuzzy logic control system 198
General Purpose Techniques (GPT) 292
Global access mediation module 222
Global grid 96
Global policy base 222
Google 115
Google SafeSearch 115
Granular computing 196
Heterogeneity 218
Heterogeneity, management 222
Hsiao 198
HTML 13 93
Hypermedia 151
Hypermedia, access models 153
Hypermedia, Web systems 149
Hypertext, Transfer Protocol (HTTP) 12
Hypertext, Transport Protocol (http) 1
IBM 37 61
ICRA 116
Identification 176
Inconsistency 12
Indirect filtering 116
Inference 73 77
Information, extraction 105 135 136
Information, infrastructure 216
Information, security 215
Information, systems security 173
Integration 98 102
Integrity 41 244
Interdependency 247
Internet 34 41 113 287
Internet, Content Rating Association (ICRA) 116
Interoperability 35 177
k-anonymity 134 138
Keyword blocking 116
knowledge management 98 103
Labyrinth hypermedia model 157
Language 61 75
Law 4
Liberty Alliance Project 36
Long-ranged data analysis 217
MAC 270
Machine learning 134
Mandatory access control (MAC) 57 270
MARAH model 157
matchmaking 269
Memory 252
Message Understanding Conferences (MUCs) 135
Metadata 80
Microsoft 37 61
Motro 198
MPEG-21 113
MPEG-7 113
Multilevel content analysis 224
Multimedia 93
Multimedia, data 217
Multimedia, security 216
Multistrategy Filtering Model (MFM) 120
Naive — Bayes 224
Natural language database 135
Network security policy 175
Noise addition techniques 289
non-repudiation 53
OASIS 37
ODRL 61
Off-line environment 5
Online, environment 5
Online, multimedia 113
Ontology 92 95
Ontology, languages 75
Ontology, mapping 106
Open Digital Rights Language (ODRL) 61
Originator control (ORCON) 58
OWL-S 96
Owner-Retained Access Control (ORAC) 59
Oxsegin 81
P3P Preference Exchange Language (APPEL) 64
Parallel processing 96
Password 6 8
Performance 114
Personal data 76
Personalization 56
Platform for Enterprise Privacy Practices (E-P3P) 65
Policy, aware 4
Policy, aware Web 1
Policy, based management (PBM) 173
Policy, composition interface 220
Policy, console 178
Policy, decision point (PDP) 175 187
Policy, enforcement, agent (PEA) 189
Policy, enforcement, point (PEP) 188
Policy, language 176
Policy, management, process 179
Policy, management, tool (PMT) 175 187
Policy, propagation 119
Policy, repository 187
Ponder 181
Privacy 45 52 63 74 104 133 180 227 244 282
Privacy Preferences (P3P) 6
Privacy, conscious entities (PCEs) 136
Privacy, management 217
Privacy, preferencesproject (P3P) 63
Privacy, preserving data mining 282
Privacy, violation 285
Proof, carrying authentication (PCA) 19
Property 94
Prospective landmark 284
Protection 114
Public policy 4
QoS Policies 178
Quality of service (QoS) 217
Rating system 119
RBAC 270
RDF 79 92
RDF, Schema (RDFS) 73
Real-time, content analysis 224
Real-time, data analysis 217
Reliability 274
Resource 94
Resource, description framework (RDF) 14 73 92
Role, based access control (RBAC) 58 154 270
Rule, based access 1 8
Rules engines 13
Sanitization 134
Sanitization, based techniques 291
Search, engine 134
Search, global grid 101
Search, integration 102
Search, key management 248
Search, knowledge management 103
Search, multi-party computation (SMC) 288
Secure semantic, grid 99
Secure semantic, Web 100
Security 2 32 37 74 84 107 133 175 199 216 241 244
Security, policy languages 181
Security, violation pointer (SVP) 82
Self-rating 115
Semantic, grids 91
Semantic, modeling 79
Semantic, Web 1 34 73 91 100 112
Semantic, Web, community portal 75
Semantic, Web, inference 76
Semantic, Web, mining 104
Semantic, Web, proof engine 15
Sensor network 243 253
Sensornet 241 249
Service, discovery 269
Service, oriented architecture (SOA) 35
Service, session management module (SMM) 220
Service, specification language 268
SOA 35
SOAP 35
Social 3
Software agent 96
software development process 152
Space transformation techniques 290
Stakeholder 151
Statement 94
Sun Microsystems 36
Symmetric binary relation 202
Task, based access control (TBAC) 59
Text, mining 134
Text, sanitization 140
Third-party rating 115
Tracing authorities (TA) 66
Transparency 6
Trust 34 43 66 95 266
UDDI 35
Unified Policy Management (UPM) 189
Unified Resource Identifier (URI) 94
UPM 189
URI 94
User 8 35 59 118
User profile 118
Value class membership 140
Value dissociation 140
Value distortion 140
Virtual Private Network 41
W3C XML Digital Signature 39
Web browser 179
Web data techniques (WDT) 292
Web filtering 115
Web information system (WIS) 180
Web Ontology Language (OWL) 73
Web rating 115
Web security services 52
Web Service 96
Web service, description language (WSDL) 268
Web Services 32 53
Web services, interoperability organization (WS-I) 36
Web services, security 32
WordNet 105
World Wide Web (WWW) 1 76 133
World Wide Web (WWW), Consortium (W3C) 9 36 75
WS-Authorization 61
WS-Policy 61
WSDL 35
X.800 52
XACML 61
XDCM 220
XML 35 61 75 92 229
XPref 64
XrML 61
Реклама