Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems
Click to enlarge
Author(s): Thuraisingham, Bhavani
Thuraisingham, Bhavani M.
ISBN No.: 9781420073317
Pages: 463
Year: 201012
Format: Trade Cloth (Hard Cover)
Price: $ 231.76
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Introduction Services and Security Technologies Secure Services Trustworthy Services Secure Semantic Services Specialized Secure Services Organization of This Book Next Steps SERVICES AND SECURITY TECHNOLOGIES Service-Oriented Computing Services Service-Oriented Computing SOA and Web Services Service-Oriented Analysis and Design Specialized Services Semantic Web and Services SOA and Web Services Standards Organizations SOA Web Services Overview Web Services Protocol Stack RESTful Web Services Amazon Web Services Service-Oriented Analysis and Design Service-Oriented Life Cycle Service-Oriented Analysis and Design Service Modeling SOAD Approaches Specialized Web Services Web Services for Data Management Web Services for Complex Data Management Web Services for Information Management Web Services for Knowledge Management Web Services for Activity Management Domain Web Services Emerging Web Services Semantic Web Services Layered Technology Stack XML RDF Ontologies Web Rules and SWRL Semantic Web Services Trustworthy Systems Secure Systems Dependable Systems Web Security SECURE SERVICES TECHNOLOGIES Secure Service-Oriented Computing Secure Services Secure Service-Oriented Computing Secure SOA and Web Services Secure Service-Oriented Analysis and Design Federated Identity Management Access Control Delegation Model Secure SOA and Web Services WS-Security WS-* Security Summary and Directions Exercises References Secure Service-Oriented Analysis and Design Secure Object-Oriented Analysis and Design Secure Service-Oriented Life Cycle Secure Service-Oriented Analysis and Design Secure Service Modeling Secure SOAD Approaches Access Control for Web Services SAML XACML Attribute-Based Access Control Inference Control Digital Identity Management Single Sign-On and Federated Identity Management Identity Metasystem and Information Card Open-ID Shibboleth Liberty Alliance Security Models for Web Services Delegation Model Information Flow Model Multilevel Secure Web Services DEPENDABLE WEB SERVICES Trust Management and Web Services Trust Management Trust and Web Services Privacy and Web Services Privacy Management Privacy Management and Web Services Integrity Management, Data Provenance, and Web Services Integrity, Data Quality, and Provenance Integrity Management and Web Services SECURE SEMANTIC WEB SERVICES Secure Semantic Web and Web Services Overview Security for the Semantic Web Privacy and Trust for the Semantic Web Secure Semantic Web and Web Services Security, XML, and Web Services Overview Example XML Document XML Security Standards Issues in XML Security Policy Specification in XML Access Control for XML Documents Secure Publication of XML Documents Secure XML Databases XML, Security, and Web Services Security, RDF, and Web Services Example of an RDF Document Issues in RDF Security Policy Specification in RDF Access Control Secure RDF Databases Security, RDF, and Web Services Security, Ontologies, and Web Services OWL Example Securing Ontologies Policy Specification in OWL Access Control Secure OWL Databases Ontology for Policy and Data Integration Security, Ontologies, and Web Services Security, Rules, and Web Services Nonmonotonic-Typed Multilevel Logic for Secure Data and Knowledge Management Securing Rules Policy Specification Using Rules Inference Problem and Policy Reasoning Security, Rules, and Web Services EMERGING SECURE WEB SERVICES Web Services for Secure Data, Information, and Knowledge Management Web Services for Secure Data Management Secure Information Management Secure Knowledge Management Secure Geospatial, Multimedia, and Sensor Web Services Overview Secure Geospatial Semantic Web Secure Multimedia Data Management Secure Sensor Web Services Web Services for Secure Activity Management Secure E-Commerce Secure Workflow and Collaboration Secure Information Interoperability Secure Information Sharing Secure Social Networking Secure Supply Chain Secure Specialized Web Services Secure Domain Web Services Security for X as a Service Security for Amazon Web Services Secure Web Services for Cloud and Grid Summary and Directions About This Chapter Summary of This Book Directions foriented Life Cycle Service-Oriented Analysis and Design Service Modeling SOAD Approaches Specialized Web Services Web Services for Data Management Web Services for Complex Data Management Web Services for Information Management Web Services for Knowledge Management Web Services for Activity Management Domain Web Services Emerging Web Services Semantic Web Services Layered Technology Stack XML RDF Ontologies Web Rules and SWRL Semantic Web Services Trustworthy Systems Secure Systems Dependable Systems Web Security SECURE SERVICES TECHNOLOGIES Secure Service-Oriented Computing Secure Services Secure Service-Oriented Computing Secure SOA and Web Services Secure Service-Oriented Analysis and Design Federated Identity Management Access Control Delegation Model Secure SOA and Web Services WS-Security WS-* Security Summary and Directions Exercises References Secure Service-Oriented Analysis and Design Secure Object-Oriented Analysis and Design Secure Service-Oriented Life Cycle Secure Service-Oriented Analysis and Design Secure Service Modeling Secure SOAD Approaches Access Control for Web Services SAML XACML Attribute-Based Access Control Inference Control Digital Identity Management Single Sign-On and Federated Identity Management Identity Metasystem and Information Card Open-ID Shibboleth Liberty Alliance Security Models for Web Services Delegation Model Information Flow Model Multilevel Secure Web Services DEPENDABLE WEB SERVICES Trust Management and Web Services Trust Management Trust and Web Services Privacy and Web Services Privacy Management Privacy Management and Web Services Integrity Management, Data Provenance, and Web Services Integrity, Data Quality, and Provenance Integrity Management and Web Services SECURE SEMANTIC WEB SERVICES Secure Semantic Web and Web Services Overview Security for the Semantic Web Privacy and Trust for the Semantic Web Secure Semantic Web and Web Services Security, XML, and Web Services Overview Example XML Document XML Security Standards Issues in XML Security Policy Specification in XML Access Control for XML Documents Secure Publication of XML Documents Secure XML Databases XML, Security, and Web Services Security, RDF, and Web Services Example of an RDF Document Issues in RDF Security Policy Specification in RDF Access Control Secure RDF Databases Security, RDF, and Web Services Security, Ontologies, and Web Services OWL Example Securing Ontologies Policy Specification in OWL Access Control Secure OWL Databases Ontology for Policy and Data Integration Security, Ontologies, and Web Services Security, Rules, and Web Services Nonmonotonic-Typed Multilevel Logic for Secure Data and Knowledge Management Securing Rules Policy Specification Using Rules Inference Problem and Policy Reasoning Security, Rules, and Web Services EMERGING SECURE WEB SERVICES Web Services for Secure Data, Information, and Knowledge Management Web Services for Secure Data Management Secure Information Management Secure Knowledge Management Secure Geospatial, Multimedia, and Sensor Web Services Overview Secure Geospatial Semantic Web Secure Multimedia Data Management Secure Sensor Web Services Web Services for Secure Activity Management Secure E-Commerce Secure Workflow and Collaboration Secure Information Interoperability Secure Information Sharing Secure Social Networking Secure Supply Chain Secure Specialized Web Services Secure Domain Web Services Security for X as a Service Security for Amazon Web Services Secure Web Services for Cloud and Grid Summary and Directions About This Chapter Summary of This Book Directions foervices Secure Service-Oriented Computing Secure SOA and Web Services Secure Service-Oriented Analysis and Design<.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...