Attribute-based infrastructures for authentication and authorisation:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Lohmar [u.a.]
Eul
2008
|
Ausgabe: | 1. Aufl. |
Schriftenreihe: | Reihe: Electronic Commerce
36 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Zugl.: Regensburg, Univ., Diss., 2008 |
Beschreibung: | XXI, 271 S. Ill., graph. Darst. |
ISBN: | 9783899366709 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023193799 | ||
003 | DE-604 | ||
005 | 20080505 | ||
007 | t | ||
008 | 080303s2008 ad|| m||| 00||| eng d | ||
020 | |a 9783899366709 |9 978-3-89936-670-9 | ||
035 | |a (OCoLC)244010094 | ||
035 | |a (DE-599)BVBBV023193799 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 381.142 |2 22/ger | |
084 | |a ST 520 |0 (DE-625)143678: |2 rvk | ||
100 | 1 | |a Schläger, Christian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Attribute-based infrastructures for authentication and authorisation |c Christian Schläger |
250 | |a 1. Aufl. | ||
264 | 1 | |a Lohmar [u.a.] |b Eul |c 2008 | |
300 | |a XXI, 271 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Reihe: Electronic Commerce |v 36 | |
500 | |a Zugl.: Regensburg, Univ., Diss., 2008 | ||
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a Reihe: Electronic Commerce |v 36 |w (DE-604)BV012856254 |9 36 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-016380160 |
Datensatz im Suchindex
_version_ | 1804137467005108224 |
---|---|
adam_text | Contents
IX
Contents
1
Introduction
........................................................................................................1
1.1 Research
Questions
............................................................................................
З
1.2 Research
Methodology
.......................................................................................4
1.2.1 Design Research
Methodology....................................................................
6
1.2.2
Philosophical Assumptions
..........................................................................9
1.3
Chapter Structure
.............................................................................................12
Part I: Motivation and Application
2
Motivation
........................................................................................................19
2.1
Developments in b2c e-commerce
...................................................................25
2.2
Defining AAls
.....................................................................................................32
3
Parties and Scenarios in b2c e-commerce
..........................................................35
3.1 Clientsand
Users
...............................................................................................37
3.2
Service Providers and Vendors
.........................................................................44
3.3
Scenario
.............................................................................................................49
Part II: Security Fundamentals
4
Basic Technologies
............................................................................................53
4.1
Authentication
..................................................................................................53
4.1.1
Proof by Possession
...................................................................................56
4.1.2
Proof by Knowledge
..................................................................................56
4.1.3
Proof by Property
(Biometrie
Approaches)
...............................................58
4.1.4
Public Key Infrastructures
..........................................................................58
4.2
Authorisation and Access Control
.....................................................................61
4.2.1
Discretionary Access Control
-DAC
..........................................................62
4.2.2
Mandatory Access Control
-
MAC
.............................................................65
Contents
4.2.3
Role-based
Access
Control
-
RBAC
............................................................
œ
4.2.4
Attribute-based Access Control-ABAC
....................................................
72
4.3
Attribute Infrastructures
...................................................................................
79
4.3.1
Requirements on Attribute Infrastructures
..............................................
80
4.3.2
SAML
..........................................................................................................
82
4.3.3
Attribute Certificates
.................................................................................
89
4.3.4
SAMLvs. Attribute Certificates
..................................................................
91
4.4
Privacy Enhancing Technologies
.......................................................................
9^
Part III: Existing AAls
5
AAI
Survey
.......................................................................................................
I 1
5.1
WWW-based AAls
...........................................................................................
104
5.2
Privilege Management Infrastructures
...........................................................116
5.3
Kerberos-based Systems
.................................................................................121
5.4
Grid Systems
...................................................................................................126
Part IV: Proposed Reference Architecture
6
Developing an ABAC-enabled
AAI
....................................................................131
6.1
Single Sign-On User Interface
.........................................................................133
6.2
Federated Service Providers
...........................................................................137
6.3
Attribute Infrastructure
..................................................................................140
6.4
XACML Elements
.............................................................................................145
6.5
Trust and Mediating Effects in AAIS
...............................................................146
6.5.1
Trust in e-commerce
...............................................................................147
6.5.2
Fuzzy Cognitive Maps
..............................................................................150
6.5.3
Using FCM for Trust Computation
...........................................................151
6.5.4
Using Trust Values in E-Commerce Service Providing
.............................152
6.6
Identity and Attributes
....................................................................................155
6.7
Overall Context
...............................................................................................158
6.7.1
Phases of an
AAI
.....................................................................................159
Contents
XI
6.7.2
Categorisation of the Proposal
................................................................166
7
Service Allocation
............................................................................................169
7.1
Allocation Possibilities
....................................................................................170
7.2
Allocation Effects
............................................................................................171
7.2.1
Allocation of
AAI
entities
.........................................................................175
7.3
Evaluation of Allocation Strategies
.................................................................182
7.4
Reference Model
.............................................................................................184
8
A Pattern System for Attribute-based AAls
......................................................187
8.1
Patterns and Security Patterns
.......................................................................188
8.2
SAML Connections
..........................................................................................190
8.2.1
Role-based Security Assertion Coordinator Pattern
...............................191
8.2.2
SAML Assertion Pattern
...........................................................................193
8.3
Security Pattern System for ABAC-enabled AAls
............................................195
8.3.1
User Authentication Block
-
1
..................................................................197
8.3.2
SAMLAssertion Block-II
........................................................................199
8.3.3
Access Control Block-III
.........................................................................200
8.3.4
Policy Enforcement Block
-
IV
.................................................................201
8.3.5
AAI
Components not Integrated
.............................................................201
8.4
Value for the Proposal
....................................................................................202
9
Prototyped Functions
......................................................................................205
9.1
Prototyped
SSO
Mechanism
...........................................................................206
9.2
Prototyped
SSO
Interface for Account Management
.....................................210
9.3
Prototyped FCM for Trust Modelling
..............................................................216
Part V: Evaluation and Future Work
10
AAI
Assessment
...............................................................................................223
10.1
Preliminaries
...................................................................................................224
10.1.1
Trust
.........................................................................................................224
10.1.2
Risk
...........................................................................................................225
XII Contents
10.1.3
Candidates
for Assessment and Comparison
..........................................225
10.2
Assessing Privacy and Usability
.......................................................................226
10.2.1
AAI
Functionalities
...................................................................................228
10.2.2
AAI
Privacy
...............................................................................................229
10.2.3
Deciding on
AAI
Usage
.............................................................................230
10.3
Risk Management and Economical Metrics
....................................................231
10.3.1
AAI
Effects for Service Providers
.............................................................231
10.3.2
Global Effects
...........................................................................................238
10.4
Outcome of the Assessment
...........................................................................240
10.4.1
Fulfilment of User and Provider Demands
..............................................241
11
Future Directions
.............................................................................................245
11.1
Changed Scenarios
..........................................................................................246
11.2
New Functionalities
........................................................................................248
12
Conclusion
.......................................................................................................253
Bibliography
...........................................................................................................257
In Germany in
2006
alone customers spend over
$ 23.9
billion online. E-commerce
is going to grow as are threats and dangers for users and providers. What is
needed is a security infrastructure in combination with an information infrastructure
satisfying both the requirements of customers as well as of Service Providers.
This work proposes an attribute-based Authentication and Authorisation Infra¬
structure
(AAI)
for b2c e-commerce which aims at mediating between the respective
demands and securing electronic transactions. Private users request ease of
use through a central account management and Single Sign-On as well as privacy
and trust in the infrastructure. Service Providers demand security through a
dynamic, fine-grained access control mechanisms and outsourcing capabilities.
By using attribute-based Access Control and open communication standards a
mediating infrastructure is built forming an intermediary. The architecture comprises
the distributed entities of Identity Providers, Service Providers in a federation, and
a central Policy Decision Point. Their involvement and tasks are defined by
guaranteeing security without restricting usability and
pseudonymity.
This book will, firstly, analyse the involved parties and possible scenarios in b2c
e-commerce and their motivations for a security infrastructure. Secondly, security
fundamentals in the areas of authentication, authorisation, access control, attribute
management, and privacy enhancing technologies will be presented. A thorough
review of existing AAls will be conducted showing where these state-of-the-art
solutions have their shortcomings. An attribute-based
AAI
will be presented
suggesting a reference protocol and a reference architecture, an allocation strategy,
a Security Pattern System, and prototypical implementations. An evaluation scheme
is used to assess the
AAI.
This work presents a new approach to the field of AAls: an attribute-based infra¬
structure tailored to the needs of both customers and vendors, securing e-
commerce, and making the process more convenient and trusted.
Christian
Schläger (*1978)
studied Business
Informatics at the University of
Regensburg.
He
received his diploma in
2004.
Since then he has
been working at the department for Information
Systems at the University of
Regensburg
with Prof.
Dr.
Günther
Pernul
and at the University of Malaga
in Spain with Prof. Dr. Javier Lopez, researching,
lecturing, and working in several
EU-
and national
projects. From
2001
till
2005
he worked and co-
founded two start-up companies. He received his
doctoral degree in
2008
(Dr. rer.
pol.).
|
adam_txt |
Contents
IX
Contents
1
Introduction
.1
1.1 Research
Questions
.
З
1.2 Research
Methodology
.4
1.2.1 Design Research
Methodology.
6
1.2.2
Philosophical Assumptions
.9
1.3
Chapter Structure
.12
Part I: Motivation and Application
2
Motivation
.19
2.1
Developments in b2c e-commerce
.25
2.2
Defining AAls
.32
3
Parties and Scenarios in b2c e-commerce
.35
3.1 Clientsand
Users
.37
3.2
Service Providers and Vendors
.44
3.3
Scenario
.49
Part II: Security Fundamentals
4
Basic Technologies
.53
4.1
Authentication
.53
4.1.1
Proof by Possession
.56
4.1.2
Proof by Knowledge
.56
4.1.3
Proof by Property
(Biometrie
Approaches)
.58
4.1.4
Public Key Infrastructures
.58
4.2
Authorisation and Access Control
.61
4.2.1
Discretionary Access Control
-DAC
.62
4.2.2
Mandatory Access Control
-
MAC
.65
Contents
4.2.3
Role-based
Access
Control
-
RBAC
.
œ
4.2.4
Attribute-based Access Control-ABAC
.
72
4.3
Attribute Infrastructures
.
79
4.3.1
Requirements on Attribute Infrastructures
.
80
4.3.2
SAML
.
82
4.3.3
Attribute Certificates
.
89
4.3.4
SAMLvs. Attribute Certificates
.
91
4.4
Privacy Enhancing Technologies
.
9^
Part III: Existing AAls
5
AAI
Survey
.
I"1
5.1
WWW-based AAls
.
104
5.2
Privilege Management Infrastructures
.116
5.3
Kerberos-based Systems
.121
5.4
Grid Systems
.126
Part IV: Proposed Reference Architecture
6
Developing an ABAC-enabled
AAI
.131
6.1
Single Sign-On User Interface
.133
6.2
Federated Service Providers
.137
6.3
Attribute Infrastructure
.140
6.4
XACML Elements
.145
6.5
Trust and Mediating Effects in AAIS
.146
6.5.1
Trust in e-commerce
.147
6.5.2
Fuzzy Cognitive Maps
.150
6.5.3
Using FCM for Trust Computation
.151
6.5.4
Using Trust Values in E-Commerce Service Providing
.152
6.6
Identity and Attributes
.155
6.7
Overall Context
.158
6.7.1
Phases of an
AAI
.159
Contents
XI
6.7.2
Categorisation of the Proposal
.166
7
Service Allocation
.169
7.1
Allocation Possibilities
.170
7.2
Allocation Effects
.171
7.2.1
Allocation of
AAI
entities
.175
7.3
Evaluation of Allocation Strategies
.182
7.4
Reference Model
.184
8
A Pattern System for Attribute-based AAls
.187
8.1
Patterns and Security Patterns
.188
8.2
SAML Connections
.190
8.2.1
Role-based Security Assertion Coordinator Pattern
.191
8.2.2
SAML Assertion Pattern
.193
8.3
Security Pattern System for ABAC-enabled AAls
.195
8.3.1
User Authentication Block
-
1
.197
8.3.2
SAMLAssertion Block-II
.199
8.3.3
Access Control Block-III
.200
8.3.4
Policy Enforcement Block
-
IV
.201
8.3.5
AAI
Components not Integrated
.201
8.4
Value for the Proposal
.202
9
Prototyped Functions
.205
9.1
Prototyped
SSO
Mechanism
.206
9.2
Prototyped
SSO
Interface for Account Management
.210
9.3
Prototyped FCM for Trust Modelling
.216
Part V: Evaluation and Future Work
10
AAI
Assessment
.223
10.1
Preliminaries
.224
10.1.1
Trust
.224
10.1.2
Risk
.225
XII Contents
10.1.3
Candidates
for Assessment and Comparison
.225
10.2
Assessing Privacy and Usability
.226
10.2.1
AAI
Functionalities
.228
10.2.2
AAI
Privacy
.229
10.2.3
Deciding on
AAI
Usage
.230
10.3
Risk Management and Economical Metrics
.231
10.3.1
AAI
Effects for Service Providers
.231
10.3.2
Global Effects
.238
10.4
Outcome of the Assessment
.240
10.4.1
Fulfilment of User and Provider Demands
.241
11
Future Directions
.245
11.1
Changed Scenarios
.246
11.2
New Functionalities
.248
12
Conclusion
.253
Bibliography
.257
In Germany in
2006
alone customers spend over
$ 23.9
billion online. E-commerce
is going to grow as are threats and dangers for users and providers. What is
needed is a security infrastructure in combination with an information infrastructure
satisfying both the requirements of customers as well as of Service Providers.
This work proposes an attribute-based Authentication and Authorisation Infra¬
structure
(AAI)
for b2c e-commerce which aims at mediating between the respective
demands and securing electronic transactions. Private users request ease of
use through a central account management and Single Sign-On as well as privacy
and trust in the infrastructure. Service Providers demand security through a
dynamic, fine-grained access control mechanisms and outsourcing capabilities.
By using attribute-based Access Control and open communication standards a
mediating infrastructure is built forming an intermediary. The architecture comprises
the distributed entities of Identity Providers, Service Providers in a federation, and
a central Policy Decision Point. Their involvement and tasks are defined by
guaranteeing security without restricting usability and
pseudonymity.
This book will, firstly, analyse the involved parties and possible scenarios in b2c
e-commerce and their motivations for a security infrastructure. Secondly, security
fundamentals in the areas of authentication, authorisation, access control, attribute
management, and privacy enhancing technologies will be presented. A thorough
review of existing AAls will be conducted showing where these state-of-the-art
solutions have their shortcomings. An attribute-based
AAI
will be presented
suggesting a reference protocol and a reference architecture, an allocation strategy,
a Security Pattern System, and prototypical implementations. An evaluation scheme
is used to assess the
AAI.
This work presents a new approach to the field of AAls: an attribute-based infra¬
structure tailored to the needs of both customers and vendors, securing e-
commerce, and making the process more convenient and trusted.
Christian
Schläger (*1978)
studied Business
Informatics at the University of
Regensburg.
He
received his diploma in
2004.
Since then he has
been working at the department for Information
Systems at the University of
Regensburg
with Prof.
Dr.
Günther
Pernul
and at the University of Malaga
in Spain with Prof. Dr. Javier Lopez, researching,
lecturing, and working in several
EU-
and national
projects. From
2001
till
2005
he worked and co-
founded two start-up companies. He received his
doctoral degree in
2008
(Dr. rer.
pol.). |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Schläger, Christian |
author_facet | Schläger, Christian |
author_role | aut |
author_sort | Schläger, Christian |
author_variant | c s cs |
building | Verbundindex |
bvnumber | BV023193799 |
classification_rvk | ST 520 |
ctrlnum | (OCoLC)244010094 (DE-599)BVBBV023193799 |
dewey-full | 381.142 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 381 - Commerce (Trade) |
dewey-raw | 381.142 |
dewey-search | 381.142 |
dewey-sort | 3381.142 |
dewey-tens | 380 - Commerce, communications, transportation |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
edition | 1. Aufl. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02001nam a2200445 cb4500</leader><controlfield tag="001">BV023193799</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080505 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080303s2008 ad|| m||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783899366709</subfield><subfield code="9">978-3-89936-670-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)244010094</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023193799</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">381.142</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 520</subfield><subfield code="0">(DE-625)143678:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schläger, Christian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Attribute-based infrastructures for authentication and authorisation</subfield><subfield code="c">Christian Schläger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Aufl.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Lohmar [u.a.]</subfield><subfield code="b">Eul</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 271 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Reihe: Electronic Commerce</subfield><subfield code="v">36</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Zugl.: Regensburg, Univ., Diss., 2008</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Reihe: Electronic Commerce</subfield><subfield code="v">36</subfield><subfield code="w">(DE-604)BV012856254</subfield><subfield code="9">36</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016380160</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV023193799 |
illustrated | Illustrated |
index_date | 2024-07-02T20:05:43Z |
indexdate | 2024-07-09T21:12:45Z |
institution | BVB |
isbn | 9783899366709 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016380160 |
oclc_num | 244010094 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XXI, 271 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Eul |
record_format | marc |
series | Reihe: Electronic Commerce |
series2 | Reihe: Electronic Commerce |
spelling | Schläger, Christian Verfasser aut Attribute-based infrastructures for authentication and authorisation Christian Schläger 1. Aufl. Lohmar [u.a.] Eul 2008 XXI, 271 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Reihe: Electronic Commerce 36 Zugl.: Regensburg, Univ., Diss., 2008 Authentifikation (DE-588)4330656-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Electronic Commerce (DE-588)4592128-3 s Computersicherheit (DE-588)4274324-2 s Authentifikation (DE-588)4330656-1 s DE-604 Reihe: Electronic Commerce 36 (DE-604)BV012856254 36 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Schläger, Christian Attribute-based infrastructures for authentication and authorisation Reihe: Electronic Commerce Authentifikation (DE-588)4330656-1 gnd Computersicherheit (DE-588)4274324-2 gnd Electronic Commerce (DE-588)4592128-3 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4274324-2 (DE-588)4592128-3 (DE-588)4113937-9 |
title | Attribute-based infrastructures for authentication and authorisation |
title_auth | Attribute-based infrastructures for authentication and authorisation |
title_exact_search | Attribute-based infrastructures for authentication and authorisation |
title_exact_search_txtP | Attribute-based infrastructures for authentication and authorisation |
title_full | Attribute-based infrastructures for authentication and authorisation Christian Schläger |
title_fullStr | Attribute-based infrastructures for authentication and authorisation Christian Schläger |
title_full_unstemmed | Attribute-based infrastructures for authentication and authorisation Christian Schläger |
title_short | Attribute-based infrastructures for authentication and authorisation |
title_sort | attribute based infrastructures for authentication and authorisation |
topic | Authentifikation (DE-588)4330656-1 gnd Computersicherheit (DE-588)4274324-2 gnd Electronic Commerce (DE-588)4592128-3 gnd |
topic_facet | Authentifikation Computersicherheit Electronic Commerce Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016380160&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV012856254 |
work_keys_str_mv | AT schlagerchristian attributebasedinfrastructuresforauthenticationandauthorisation |