000 | 03793nam a22005055i 4500 | ||
---|---|---|---|
001 | u373270 | ||
003 | SIRSI | ||
005 | 20160812084138.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2010 gw | s |||| 0|eng d | ||
020 |
_a9783540877424 _9978-3-540-87742-4 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aBertino, Elisa. _eauthor. |
|
245 | 1 | 0 |
_aSecurity for Web Services and Service-Oriented Architectures _h[recurso electrónico] / _cby Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aXII, 218p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aWeb Service Technologies, Principles, Architectures, and Standards -- Web Services Threats, Vulnerabilities, and Countermeasures -- Standards for Web Services Security -- Digital Identity Management and Trust Negotiation -- Access Control for Web Services -- Secure Publishing Techniques -- Access Control for Business Processes -- Emerging Research Trends. | |
520 | _aWeb services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with users is ensured if Web services technology is to live up to its promise. However, the very features that make it attractive – such as greater and ubiquitous access to data and other resources, dynamic application configuration and reconfiguration through workflows, and relative autonomy – conflict with conventional security models and mechanisms. Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA. They cover in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation, as well as recent research on access control for simple and conversation-based Web services, advanced digital identity management techniques, and access control for Web-based workflows. They explain how these implement means for identification, authentication, and authorization with respect to security aspects such as integrity, confidentiality, and availability. This book will serve practitioners as a comprehensive critical reference on Web service standards, with illustrative examples and analyses of critical issues; researchers will use it as a state-of-the-art overview of ongoing research and innovative new directions; and graduate students will use it as a textbook on advanced topics in computer and system security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData protection. | |
650 | 0 | _aInformation systems. | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
650 | 2 | 4 | _aBusiness Information Systems. |
650 | 2 | 4 | _aSoftware Engineering. |
700 | 1 |
_aMartino, Lorenzo. _eauthor. |
|
700 | 1 |
_aPaci, Federica. _eauthor. |
|
700 | 1 |
_aSquicciarini, Anna. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540877417 |
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-540-87742-4 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c201150 _d201150 |