Narrow your search

Library

VUB (49)

KU Leuven (48)

UGent (37)

ULiège (37)

ULB (36)

Odisee (31)

Thomas More Kempen (31)

Thomas More Mechelen (31)

UCLL (31)

VIVES (31)

More...

Resource type

book (113)

digital (25)


Language

English (124)


Year
From To Submit

2023 (1)

2022 (9)

2021 (20)

2020 (16)

2019 (10)

More...
Listing 1 - 10 of 124 << page
of 13
>>
Sort by

Book
Security for web services and service-oriented architectures
Author:
ISBN: 3540877894 354087741X 3540877428 9786612836282 1282836285 Year: 2010 Publisher: Heidelberg ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with users is ensured if Web services technology is to live up to its promise. However, the very features that make it attractive – such as greater and ubiquitous access to data and other resources, dynamic application configuration and reconfiguration through workflows, and relative autonomy – conflict with conventional security models and mechanisms. Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA. They cover in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation, as well as recent research on access control for simple and conversation-based Web services, advanced digital identity management techniques, and access control for Web-based workflows. They explain how these implement means for identification, authentication, and authorization with respect to security aspects such as integrity, confidentiality, and availability. This book will serve practitioners as a comprehensive critical reference on Web service standards, with illustrative examples and analyses of critical issues; researchers will use it as a state-of-the-art overview of ongoing research and innovative new directions; and graduate students will use it as a textbook on advanced topics in computer and system security.


Book
Data protection from insider threats
Author:
ISBN: 9781608457694 9781608457687 Year: 2012 Publisher: San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) Morgan & Claypool

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Data Protection from Insider Threats
Author:
ISBN: 3031018907 Year: 2012 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.


Book
ECOOP 2000 - Object-oriented programming : 14th European conference, Sophia Antipolis and Cannes, France, June 2000. Proceedings
Author:
Year: 2000 Publisher: New York, NY ; Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Object-oriented methodologies and systems. International symposium, ISOOMS'94, Palermo, Italy, September 1994. Proceedings
Authors: ---
ISBN: 354058451X 3540488049 Year: 1994 Volume: 858 Publisher: Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume presents the proceedings of the International Symposium on Object-Oriented Methodologies and Systems (ISOOMS '94), held in Palermo, Italy in September 1994 in conjunction with the AICA 1994 Italian Computer Conference. The 25 full papers included cover not only technical areas of object-orientation, such as databases, programming languages, and methodological aspects, but also application areas. The book is organized in chapters on object-oriented databases, object-oriented analysis, behavior modeling, object-oriented programming languages, object-oriented information systems, and object-oriented systems development.

ECOOP 2000-object-oriented programming: 14th European Conference, Sophia Antipolis and Cannes, France, June 12-16, 2000, proceedings
Authors: ---
ISSN: 03029743 ISBN: 3540676600 9783540676607 3540451021 Year: 2000 Volume: 1850 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Following a 13-year tradition of excellence, the 14th ECOOP conference repeated the success of its predecessors. This excellence is certainly due to the level of maturity that object-oriented technology has reached, which warrants its use as a key paradigm in any computerized system. The principles of the object-oriented paradigm and the features of systems, languages, tools, and methodologies based on it are a source of research ideas and solutions to many in all areas of computer science. ECOOP 2000 showed a thriving eld characterized by success on the practical side and at the same time by continuous scienti c growth. Firmly established as a leading forum in the object-oriented arena, ECOOP 2000 received 109 high quality submissions. After a thorough review process, the program committee selected 20 papers, which well re?ect relevant trends in object-oriented research: object modeling, type theory, distribution and coo- ration, advanced tools, programming languages. The program committee, c- sisting of 31 distinguished researchers in object-orientation, met in Milan, Italy, to select the papers for inclusion in the technical program of the conference.

Keywords

Object-oriented programming (Computer science) --- Computer Science --- Engineering & Applied Sciences --- 681.3*D15 --- 681.3*D2 --- Computer programming --- Object-oriented methods (Computer science) --- Document Object Model (Web site development technology) --- 681.3*D15 Software: object-oriented programming --- Software: object-oriented programming --- 681.3*D2 Software engineering: protection mechanisms standards--See also {681.3*K63} {681.3*K51} --- Software engineering: protection mechanisms standards--See also {681.3*K63} {681.3*K51} --- Programming --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Computer programming. --- Software engineering. --- Computer logic. --- Computer Science. --- Programming Techniques. --- Software Engineering. --- Logics and Meanings of Programs. --- Computer Communication Networks. --- IT in Business. --- Data processing. --- 681.3*D2 Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Software engineering: protection mechanisms; standards--See also {681.3*K63}; {681.3*K51} --- Computer science logic --- Logic, Symbolic and mathematical --- Computer software engineering --- Engineering --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Distributed processing --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Business—Data processing. --- Object-oriented programming (Computer science) - Congresses

Object-oriented database systems : concepts and architectures
Authors: ---
ISBN: 0201624397 Year: 1993 Publisher: Wokingham : Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Identity Management
Authors: ---
ISBN: 1608070409 9781608070398 1608070395 9781608070404 Year: 2010 Publisher: Boston, MA London Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL.


Book
Roles, Trust, and Reputation in Social Media Knowledge Markets : Theory and Methods
Authors: ---
ISBN: 9783319054674 331905466X 9783319054667 3319054678 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This title discusses the emerging trends in defining, measuring, and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book also proposes a future research agenda related to these issues—with the ultimate goal of shaping the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. Roles, Trust, and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories, and methodologies proposed here offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow’s information consumers make smarter choices, developers to create new tools, and researchers to launch new research programs.

Keywords

Physics. --- Complex Networks. --- Data Mining and Knowledge Discovery. --- Complex Systems. --- Methodology of the Social Sciences. --- Computer Appl. in Social and Behavioral Sciences. --- Data mining. --- Social sciences --- Physique --- Exploration de données (Informatique) --- Sciences sociales --- Data processing. --- Methodology. --- Informatique --- Méthodologie --- Social sciences_xData processing. --- Social sciences_xMethodology. --- Physics --- Physical Sciences & Mathematics --- Physics - General --- Knowledge, Sociology of. --- Social media. --- Knowledge, Theory of (Sociology) --- Sociology of knowledge --- User-generated media --- Application software. --- System theory. --- Social sciences. --- Communication --- User-generated content --- Knowledge, Theory of --- Public opinion --- Sociology --- Social epistemology --- Applications of Graph Theory and Complex Networks. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Systems, Theory of --- Systems science --- Science --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Philosophy


Digital
Roles, Trust, and Reputation in Social Media Knowledge Markets : Theory and Methods
Authors: ---
ISBN: 9783319054674 9783319054667 9783319054681 9783319349411 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This title discusses the emerging trends in defining, measuring, and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book also proposes a future research agenda related to these issues—with the ultimate goal of shaping the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. Roles, Trust, and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories, and methodologies proposed here offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow’s information consumers make smarter choices, developers to create new tools, and researchers to launch new research programs.

Listing 1 - 10 of 124 << page
of 13
>>
Sort by