Securing web services: practical usage of standards and specifications
"This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, i...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hershey, Pa. [u.a.]
Information Science Reference
2008
|
Schriftenreihe: | Premier reference source
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. |
Beschreibung: | Summary: "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. - Includes bibliographical references (p. 364-381) and index. - "Premier reference source"--Cover. - Formerly CIP |
Beschreibung: | XV, 404 S. Ill., graph. Darst. 29 cm |
ISBN: | 1599046393 9781599046396 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035014270 | ||
003 | DE-604 | ||
005 | 20080924 | ||
007 | t | ||
008 | 080821s2008 ad|| |||| 00||| eng d | ||
020 | |a 1599046393 |c (hbk.) : No price hbk. |9 1-59904-639-3 | ||
020 | |a 9781599046396 |9 978-1-59904-639-6 | ||
035 | |a (OCoLC)144570833 | ||
035 | |a (DE-599)BSZ284889709 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
050 | 0 | |a TK5105.88813 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Securing web services |b practical usage of standards and specifications |c Panos Periorellis [ed.] |
264 | 1 | |a Hershey, Pa. [u.a.] |b Information Science Reference |c 2008 | |
300 | |a XV, 404 S. |b Ill., graph. Darst. |c 29 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Premier reference source | |
500 | |a Summary: "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. - Includes bibliographical references (p. 364-381) and index. - "Premier reference source"--Cover. - Formerly CIP | ||
520 | 3 | |a "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. | |
650 | 4 | |a Internet - Sécurité - Mesures | |
650 | 4 | |a Services Web | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Web - Sécurité - Mesures | |
650 | 4 | |a Web services | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Web Services |0 (DE-588)4691234-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Web Services |0 (DE-588)4691234-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Periorellis, Panos |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-59904-641-9 |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016683464&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016683464 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804137936624549888 |
---|---|
adam_text | Titel: Securing Web services
Autor: Periorellis, Panos
Jahr: 2008
Detailed Table of Contents
Foreword...............................................................................................................................................ix
Preface..................................................................................................................................................xi
Acknowledgment................................................................................................................................xiii
Chapter I
Security in Service-Oriented Architecture: Issues, Standards, and Implementations /
Srinivas Padmanabhuni andHemant Adarkar.......................................................................................1
Through a set of core security requirements for Web services, they discuss and compare several mecha-
nisms available for addressing those challenges, from current standards to specifications under review. In
addition, their attempt to address future trends in the domain of Web service security makes this chapter
a very valuable contribution.
Chapter II
A Retrospective on the Development of Web Service Specifications / Shrideep Pallickara,
Geoffrey Fox, Mehmet S. Aktas, Harshawardhan Gadgil, Beytullah Yildiz, Sangyoon Oh,
SimaPatel, Marlon E. Pierce, andDamodar Yemme...........................................................................22
Shrideep Pallickara, Geoffrey Fox et al. discuss how service-oriented architectures are envisaged using
Web services. They address a number of specifications and as such provide a valuable insight into some
ofthe core elements of this book.
Chapter III
Secure Web Service Composition: Issues and Architectures / Barbara Carminati,
Elena Ferrari, and Patrick C. K. Hung................................................................................................50
Barbara Carminati et al. address the issue of Web service composition and discuss the challenges in
building large applications from modular pieces of software (Web services). Focusing on dependability,
the authors provide an overview ofthe main security requirements that must be taken into account when
composing Web services. In addition, a detailed survey ofthe related literature and standards relevant to
Web services are outlined. Finally, the authors present a proposal for a brokered architecture to support
secure Web services composition.
Chapter IV
High-Value B2B Interactions, Nonrepudiation, and Web Services / Nick Cook,
Paul Robinson, and Santosh K. Shrivastava.........................................................................................71
Nick Cook et al. tackles a specific security requirement; that of nonrepudiation, and provides a thorough
discussion ofthe problem of making high-value business-to-business (B2B) interactions nonrepudiable.
The chapter presents the design and implementation details ofthe authors novel Web services-based
middleware that addresses nonrepudiable interactions using existing Web service standards.
Chapter V
Dynamic Delegation of Authority in Web Services / David W. Chadwick.........................................Ill
The subject of access control sets off with the contribution of David Chadwick and his chapter on dy-
namic delegation of access control rights. David enumerates the requirements for delegation of author-
ity, discusses the various implementation and architectural models, and finally highlights the essential
elements of such an approach. David s authority and expertise in the field make this chapter one ofthe
most valuable contribution ofthe book.
Chapter VI
A Policy-Based Authorization Framework for Web Services: Integrating X-GTRBAC and
WS-Policy / Rafae Bhatti, Daniel Sanz, Elisa Bertino, andArif Ghafoor.........................................138
Rafae Bhatti et al., from IBM s Almaden Research Center, describe, and at the same time defend their
effort at defining a new access control policy description language for Web services. They make use of
some ofthe current Web services standards and show how their effort can be integrated with existing
technologies such as WS-Policy to provide a robust, fine grained mechanism for access control.
Chapter VII
Description of Policies Enriched by Semantics for Security Management /
Felix J. Garcia Clemente, Gregorio Martinez Perez, Juan A. Botia Blaya, and
Antonio F. Gomez Skarmeta................................................................................................................162
Clemente et al. provides an evaluation ofthe ongoing efforts to use semantically rich ontological lan-
guages to represent policies for distributed systems, while at the same time highlighting the architectural
considerations and implementation aspects of those efforts.
Chapter VIII
Using SAML and XACML for Web Service Security and Privacy / Tuncay Namli and
Asuman Dogac....................................................................................................................................182
Asuman Dogac et al. concludes the access control part ofthe book with what is probably the most widely
used ofthe Web Service standards, namely XACML and SAML. The authors demonstrate how they can
be combined to provide an overall authentication and authorization mechanism and at the same time
discuss their pros and cons.
Chapter IX
Protecting ASP.NET Web Services / Konstantin Beznosov................................................................206
Kostantin Beznosov presents an experience report on designing and implementing an architecture for
protecting enterprise-grade Web service applications hostedbyASP.NET. Kosta deployes his invaluable
insight into .NET security mechanisms to discuss design patterns and best practices for constructing
flexible and extensible authentication and authorization logic for .NET Web Services.
Chapter X
Building Innovative, Secure, and Interoperable E-Government Services / A. Kaliontzoglou,
T. Karantjias, andD. Polemi..............................................................................................................228
Kaliontzoglou et al. discusses a particular domain, that of e-government, and in this light the authors
outline specific requirements for e-government services, interoperability, and security. Their chapter
presents three innovative e-govemment architecture and implementation strategies based on Web service
technologies technologies, focusing on their security and interoperability aspects.
Chapter XI
Grid Business Process: Case Study / AsifAkram, Rob Allan, Sanjay Chaudhary, Prateek Jain,
and Zakir Laliwala..............................................................................................................................257
AsifAkram presents an industrial-based case study that provides a pragmatic test bed for evaluating Web
service technologies against emerging GRID scenarios. The author discusses issues such as state-full
interactions, interoperability, integration, and others.
Chapter XII
Combining Web Services and Grid Services: Practical Approaches and Implications to
Resource Discovery I Aisha Naseer andLampros K. Stergioulas......................................................298
Aisha Naseer and Lampros Stergoulias discuss infrastructural aspects of GRID computing and argue
that Grids should be developed using the underlying Web infrastructure, and GRID services should be
integrated with Web Services using inheritance techniques to produce Grid-supported Web services.
Chapter XIII
Approaches and Best Practices in Web Service Style, XML Data Binding, and Validation:
Implications to Securing Web Services / David Meredith and AsifAkram........................................318
David Meredith addresses message level reliability by providing a lot of valuable technical details on
WSDL interface style, strength of data typing, and approach to data binding and validation to demonstrate
how these have important implications on application security (and interoperability). David shows how
these Web service styles and implementation choices must be carefully considered and applied correctly
by providing implementation examples and best practice recommendations.
Chapter XIV
Enhancing Web Service Discovery and Monitoring with Quality of Service Information /
Christian Platzer, Florian Rosenberg, andSchahram Dustdar..........................................................345
Christian Platzer et al. raise quality of service-related concerns. Focusing on general Web services de-
pendability issues while leveraging his expertise and experience in distributed computing, his chapter
deals with the various ways of describing, bootstrapping, and evaluating QoS attributes. The chapter
addresses a way to bootstrap the most important performance and dependability values.
Compilation of References..............................................................................................................364
About the Contributors...................................................................................................................382
Index...................................................................................................................................................389
|
adam_txt |
Titel: Securing Web services
Autor: Periorellis, Panos
Jahr: 2008
Detailed Table of Contents
Foreword.ix
Preface.xi
Acknowledgment.xiii
Chapter I
Security in Service-Oriented Architecture: Issues, Standards, and Implementations /
Srinivas Padmanabhuni andHemant Adarkar.1
Through a set of core security requirements for Web services, they discuss and compare several mecha-
nisms available for addressing those challenges, from current standards to specifications under review. In
addition, their attempt to address future trends in the domain of Web service security makes this chapter
a very valuable contribution.
Chapter II
A Retrospective on the Development of Web Service Specifications / Shrideep Pallickara,
Geoffrey Fox, Mehmet S. Aktas, Harshawardhan Gadgil, Beytullah Yildiz, Sangyoon Oh,
SimaPatel, Marlon E. Pierce, andDamodar Yemme.22
Shrideep Pallickara, Geoffrey Fox et al. discuss how service-oriented architectures are envisaged using
Web services. They address a number of specifications and as such provide a valuable insight into some
ofthe core elements of this book.
Chapter III
Secure Web Service Composition: Issues and Architectures / Barbara Carminati,
Elena Ferrari, and Patrick C. K. Hung.50
Barbara Carminati et al. address the issue of Web service composition and discuss the challenges in
building large applications from modular pieces of software (Web services). Focusing on dependability,
the authors provide an overview ofthe main security requirements that must be taken into account when
composing Web services. In addition, a detailed survey ofthe related literature and standards relevant to
Web services are outlined. Finally, the authors present a proposal for a brokered architecture to support
secure Web services composition.
Chapter IV
High-Value B2B Interactions, Nonrepudiation, and Web Services / Nick Cook,
Paul Robinson, and Santosh K. Shrivastava.71
Nick Cook et al. tackles a specific security requirement; that of nonrepudiation, and provides a thorough
discussion ofthe problem of making high-value business-to-business (B2B) interactions nonrepudiable.
The chapter presents the design and implementation details ofthe authors' novel Web services-based
middleware that addresses nonrepudiable interactions using existing Web service standards.
Chapter V
Dynamic Delegation of Authority in Web Services / David W. Chadwick.Ill
The subject of access control sets off with the contribution of David Chadwick and his chapter on dy-
namic delegation of access control rights. David enumerates the requirements for delegation of author-
ity, discusses the various implementation and architectural models, and finally highlights the essential
elements of such an approach. David's authority and expertise in the field make this chapter one ofthe
most valuable contribution ofthe book.
Chapter VI
A Policy-Based Authorization Framework for Web Services: Integrating X-GTRBAC and
WS-Policy / Rafae Bhatti, Daniel Sanz, Elisa Bertino, andArif Ghafoor.138
Rafae Bhatti et al., from IBM's Almaden Research Center, describe, and at the same time defend their
effort at defining a new access control policy description language for Web services. They make use of
some ofthe current Web services standards and show how their effort can be integrated with existing
technologies such as WS-Policy to provide a robust, fine grained mechanism for access control.
Chapter VII
Description of Policies Enriched by Semantics for Security Management /
Felix J. Garcia Clemente, Gregorio Martinez Perez, Juan A. Botia Blaya, and
Antonio F. Gomez Skarmeta.162
Clemente et al. provides an evaluation ofthe ongoing efforts to use semantically rich ontological lan-
guages to represent policies for distributed systems, while at the same time highlighting the architectural
considerations and implementation aspects of those efforts.
Chapter VIII
Using SAML and XACML for Web Service Security and Privacy / Tuncay Namli and
Asuman Dogac.182
Asuman Dogac et al. concludes the access control part ofthe book with what is probably the most widely
used ofthe Web Service standards, namely XACML and SAML. The authors demonstrate how they can
be combined to provide an overall authentication and authorization mechanism and at the same time
discuss their pros and cons.
Chapter IX
Protecting ASP.NET Web Services / Konstantin Beznosov.206
Kostantin Beznosov presents an experience report on designing and implementing an architecture for
protecting enterprise-grade Web service applications hostedbyASP.NET. Kosta deployes his invaluable
insight into .NET security mechanisms to discuss design patterns and best practices for constructing
flexible and extensible authentication and authorization logic for .NET Web Services.
Chapter X
Building Innovative, Secure, and Interoperable E-Government Services / A. Kaliontzoglou,
T. Karantjias, andD. Polemi.228
Kaliontzoglou et al. discusses a particular domain, that of e-government, and in this light the authors
outline specific requirements for e-government services, interoperability, and security. Their chapter
presents three innovative e-govemment architecture and implementation strategies based on Web service
technologies technologies, focusing on their security and interoperability aspects.
Chapter XI
Grid Business Process: Case Study / AsifAkram, Rob Allan, Sanjay Chaudhary, Prateek Jain,
and Zakir Laliwala.257
AsifAkram presents an industrial-based case study that provides a pragmatic test bed for evaluating Web
service technologies against emerging GRID scenarios. The author discusses issues such as state-full
interactions, interoperability, integration, and others.
Chapter XII
Combining Web Services and Grid Services: Practical Approaches and Implications to
Resource Discovery I Aisha Naseer andLampros K. Stergioulas.298
Aisha Naseer and Lampros Stergoulias discuss infrastructural aspects of GRID computing and argue
that Grids should be developed using the underlying Web infrastructure, and GRID services should be
integrated with Web Services using inheritance techniques to produce Grid-supported Web services.
Chapter XIII
Approaches and Best Practices in Web Service Style, XML Data Binding, and Validation:
Implications to Securing Web Services / David Meredith and AsifAkram.318
David Meredith addresses message level reliability by providing a lot of valuable technical details on
WSDL interface style, strength of data typing, and approach to data binding and validation to demonstrate
how these have important implications on application security (and interoperability). David shows how
these Web service styles and implementation choices must be carefully considered and applied correctly
by providing implementation examples and best practice recommendations.
Chapter XIV
Enhancing Web Service Discovery and Monitoring with Quality of Service Information /
Christian Platzer, Florian Rosenberg, andSchahram Dustdar.345
Christian Platzer et al. raise quality of service-related concerns. Focusing on general Web services de-
pendability issues while leveraging his expertise and experience in distributed computing, his chapter
deals with the various ways of describing, bootstrapping, and evaluating QoS attributes. The chapter
addresses a way to bootstrap the most important performance and dependability values.
Compilation of References.364
About the Contributors.382
Index.389 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV035014270 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.88813 |
callnumber-search | TK5105.88813 |
callnumber-sort | TK 45105.88813 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)144570833 (DE-599)BSZ284889709 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03180nam a2200577 c 4500</leader><controlfield tag="001">BV035014270</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080924 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080821s2008 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1599046393</subfield><subfield code="c">(hbk.) : No price hbk.</subfield><subfield code="9">1-59904-639-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781599046396</subfield><subfield code="9">978-1-59904-639-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)144570833</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ284889709</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.88813</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing web services</subfield><subfield code="b">practical usage of standards and specifications</subfield><subfield code="c">Panos Periorellis [ed.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa. [u.a.]</subfield><subfield code="b">Information Science Reference</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 404 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">29 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Premier reference source</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Summary: "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. - Includes bibliographical references (p. 364-381) and index. - "Premier reference source"--Cover. - Formerly CIP</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Services Web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Periorellis, Panos</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-59904-641-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016683464&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016683464</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035014270 |
illustrated | Illustrated |
index_date | 2024-07-02T21:44:52Z |
indexdate | 2024-07-09T21:20:13Z |
institution | BVB |
isbn | 1599046393 9781599046396 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016683464 |
oclc_num | 144570833 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | XV, 404 S. Ill., graph. Darst. 29 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Information Science Reference |
record_format | marc |
series2 | Premier reference source |
spelling | Securing web services practical usage of standards and specifications Panos Periorellis [ed.] Hershey, Pa. [u.a.] Information Science Reference 2008 XV, 404 S. Ill., graph. Darst. 29 cm txt rdacontent n rdamedia nc rdacarrier Premier reference source Summary: "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. - Includes bibliographical references (p. 364-381) and index. - "Premier reference source"--Cover. - Formerly CIP "This book collects a complete set of studies addressing the security and dependability challenges of Web services and the development of protocols to meet them. Encompassing a complete range of topics including specifications for message level security, transactions, and identity management, it enables libraries to provide researchers an authoritative guide to a most challenging technological topic"--Provided by publisher. Internet - Sécurité - Mesures Services Web Sécurité informatique Web - Sécurité - Mesures Web services Computer security Internet / Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Web Services (DE-588)4691234-4 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Web Services (DE-588)4691234-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Internet (DE-588)4308416-3 s Periorellis, Panos Sonstige oth Erscheint auch als Online-Ausgabe 978-1-59904-641-9 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016683464&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Securing web services practical usage of standards and specifications Internet - Sécurité - Mesures Services Web Sécurité informatique Web - Sécurité - Mesures Web services Computer security Internet / Security measures Computersicherheit (DE-588)4274324-2 gnd Web Services (DE-588)4691234-4 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4691234-4 (DE-588)4308416-3 (DE-588)4143413-4 |
title | Securing web services practical usage of standards and specifications |
title_auth | Securing web services practical usage of standards and specifications |
title_exact_search | Securing web services practical usage of standards and specifications |
title_exact_search_txtP | Securing web services practical usage of standards and specifications |
title_full | Securing web services practical usage of standards and specifications Panos Periorellis [ed.] |
title_fullStr | Securing web services practical usage of standards and specifications Panos Periorellis [ed.] |
title_full_unstemmed | Securing web services practical usage of standards and specifications Panos Periorellis [ed.] |
title_short | Securing web services |
title_sort | securing web services practical usage of standards and specifications |
title_sub | practical usage of standards and specifications |
topic | Internet - Sécurité - Mesures Services Web Sécurité informatique Web - Sécurité - Mesures Web services Computer security Internet / Security measures Computersicherheit (DE-588)4274324-2 gnd Web Services (DE-588)4691234-4 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Internet - Sécurité - Mesures Services Web Sécurité informatique Web - Sécurité - Mesures Web services Computer security Internet / Security measures Computersicherheit Web Services Internet Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016683464&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT periorellispanos securingwebservicespracticalusageofstandardsandspecifications |