Narrow your search

Library

KU Leuven (48)

ULiège (37)

ULB (36)

VUB (34)

Odisee (31)

Thomas More Kempen (31)

Thomas More Mechelen (31)

UCLL (31)

VIVES (31)

UGent (27)

More...

Resource type

book (98)

digital (25)


Language

English (108)

German (1)


Year
From To Submit

2023 (2)

2022 (6)

2021 (14)

2020 (12)

2019 (10)

More...
Listing 1 - 10 of 109 << page
of 11
>>
Sort by

Book
Security for web services and service-oriented architectures
Author:
ISBN: 3540877894 354087741X 3540877428 9786612836282 1282836285 Year: 2010 Publisher: Heidelberg ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with users is ensured if Web services technology is to live up to its promise. However, the very features that make it attractive – such as greater and ubiquitous access to data and other resources, dynamic application configuration and reconfiguration through workflows, and relative autonomy – conflict with conventional security models and mechanisms. Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA. They cover in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation, as well as recent research on access control for simple and conversation-based Web services, advanced digital identity management techniques, and access control for Web-based workflows. They explain how these implement means for identification, authentication, and authorization with respect to security aspects such as integrity, confidentiality, and availability. This book will serve practitioners as a comprehensive critical reference on Web service standards, with illustrative examples and analyses of critical issues; researchers will use it as a state-of-the-art overview of ongoing research and innovative new directions; and graduate students will use it as a textbook on advanced topics in computer and system security.


Book
Data Protection from Insider Threats
Author:
ISBN: 3031018907 Year: 2012 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Chapter One introduces the notion of insider threat and reports some data about data breaches due to insider threats. Chapter Two covers authentication and access control techniques, and Chapter Three shows how these general security techniques can be extended and used in the context of protection from insider threats. Chapter Four addresses anomaly detection techniques that are used to determine anomalies in data accesses by insiders. These anomalies are often indicative of potential insider data attacks and therefore play an important role in protection from these attacks. Security information and event management (SIEM) tools and fine-grained auditing are discussed in Chapter Five. These tools aim at collecting, analyzing, and correlating -- in real-time -- any information and event that may be relevant for the security of an organization. As such, they can be a key element in finding a solution to such undesirable insider threats. Chapter Six goes on to provide a survey of techniques for separation-of-duty (SoD). SoD is an important principle that, when implemented in systems and tools, can strengthen data protection from malicious insiders. However, to date, very few approaches have been proposed for implementing SoD in systems. In Chapter Seven, a short survey of a commercial product is presented, which provides different techniques for protection from malicious users with system privileges -- such as a DBA in database management systems. Finally, in Chapter Eight, the book concludes with a few remarks and additional research directions. Table of Contents: Introduction / Authentication / Access Control / Anomaly Detection / Security Information and Event Management and Auditing / Separation of Duty / Case Study: Oracle Database Vault / Conclusion.


Book
ECOOP 2000 - Object-oriented programming : 14th European conference, Sophia Antipolis and Cannes, France, June 2000. Proceedings
Author:
Year: 2000 Publisher: New York, NY ; Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Object-oriented database systems : concepts and architectures
Authors: ---
ISBN: 0201624397 Year: 1993 Publisher: Wokingham : Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Identity management : concepts, technologies, and systems
Authors: ---
ISBN: 1608070409 9781608070398 1608070395 9781608070404 Year: 2011 Publisher: Boston, MA ; London, UK : ARTECH,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle"--EBL.


Book
Roles, Trust, and Reputation in Social Media Knowledge Markets : Theory and Methods
Authors: ---
ISBN: 9783319054674 331905466X 9783319054667 3319054678 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This title discusses the emerging trends in defining, measuring, and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book also proposes a future research agenda related to these issues—with the ultimate goal of shaping the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. Roles, Trust, and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories, and methodologies proposed here offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow’s information consumers make smarter choices, developers to create new tools, and researchers to launch new research programs.

Keywords

Physics. --- Complex Networks. --- Data Mining and Knowledge Discovery. --- Complex Systems. --- Methodology of the Social Sciences. --- Computer Appl. in Social and Behavioral Sciences. --- Data mining. --- Social sciences --- Physique --- Exploration de données (Informatique) --- Sciences sociales --- Data processing. --- Methodology. --- Informatique --- Méthodologie --- Social sciences_xData processing. --- Social sciences_xMethodology. --- Physics --- Physical Sciences & Mathematics --- Physics - General --- Knowledge, Sociology of. --- Social media. --- Knowledge, Theory of (Sociology) --- Sociology of knowledge --- User-generated media --- Application software. --- System theory. --- Social sciences. --- Communication --- User-generated content --- Knowledge, Theory of --- Public opinion --- Sociology --- Social epistemology --- Applications of Graph Theory and Complex Networks. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Systems, Theory of --- Systems science --- Science --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Philosophy


Digital
Roles, Trust, and Reputation in Social Media Knowledge Markets : Theory and Methods
Authors: ---
ISBN: 9783319054674 9783319054667 9783319054681 9783319349411 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This title discusses the emerging trends in defining, measuring, and operationalizing reputation as a new and essential component of the knowledge that is generated and consumed online. The book also proposes a future research agenda related to these issues—with the ultimate goal of shaping the next generation of theoretical and analytic strategies needed for understanding how knowledge markets are influenced by social interactions and reputations built around functional roles. Roles, Trust, and Reputation in Social Media Knowledge Markets exposes issues that have not been satisfactorily dealt with in the current literature. In a broader sense, the volume aims to change the way in which knowledge generation in social media spaces is understood and utilized. The tools, theories, and methodologies proposed here offer concrete avenues for developing the next generation of research strategies and applications that will help: tomorrow’s information consumers make smarter choices, developers to create new tools, and researchers to launch new research programs.


Book
Homomorphic Encryption and Applications
Authors: --- ---
ISBN: 3319122290 3319122282 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.

Intelligent database systems
Authors: --- ---
ISBN: 0201877368 9780201877366 Year: 2001 Publisher: Harlow: Addison-Wesley,


Book
Network and System Security : 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings
Authors: --- ---
ISBN: 3642346006 3642346014 Year: 2012 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Database management. --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Database Management. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Information Systems. --- Cryptology. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer networks --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing

Listing 1 - 10 of 109 << page
of 11
>>
Sort by