Security for web services and service-oriented architectures:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
ISBN: | 9783540877417 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035181615 | ||
003 | DE-604 | ||
005 | 20100111 | ||
007 | t | ||
008 | 081126s2010 gw |||| 00||| eng d | ||
015 | |a 08,N36,0017 |2 dnb | ||
016 | 7 | |a 990021777 |2 DE-101 | |
020 | |a 9783540877417 |c Gb. : ca. EUR 48.10 (freier Pr.), ca. sfr 75.00 (freier Pr.) |9 978-3-540-87741-7 | ||
024 | 3 | |a 9783540877417 | |
028 | 5 | 2 | |a 11979685 |
035 | |a (OCoLC)268931371 | ||
035 | |a (DE-599)DNB990021777 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 |a DE-860 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 004 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 235 |0 (DE-625)143622: |2 rvk | ||
084 | |a ST 252 |0 (DE-625)143627: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Bertino, Elisa |d 1957- |e Verfasser |0 (DE-588)1018830286 |4 aut | |
245 | 1 | 0 | |a Security for web services and service-oriented architectures |c Elisa Bertino ... |
250 | |a 1. ed. | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Application software |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Service-oriented architecture (Computer science) |x Security measures | |
650 | 4 | |a Web services |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Web Services |0 (DE-588)4691234-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Web Services |0 (DE-588)4691234-4 |D s |
689 | 0 | 1 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | 5 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-540-87742-4 |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016988363&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-016988363 |
Datensatz im Suchindex
_version_ | 1804138355060899840 |
---|---|
adam_text | CONTENTS 1 INTRODUCTION 1 1.1 SECURITY FOR WEB SERVICES AND SECURITY
GOALS 1 1.2 PRIVACY 3 1.3 GOALS AND SCOPE OF THE BOOK AND ITS INTENDED
AUDIENCE 4 1.4 AN OVERVIEW OF THE BOOK S CONTENT 5 2 WEB SERVICE
TECHNOLOGIES, PRINCIPLES, ARCHITECTURES, AND STANDARDS 9 2.1 SOA AND WEB
SERVICES PRINCIPLES 10 2.2 WEB SERVICES ARCHITECTURE 13 2.3 WEB SERVICES
TECHNOLOGIES AND STANDARDS 13 2.3.1 SOAP 15 2.3.2 WEB SERVICES
DESCRIPTION LANGUAGE (WSDL) 16 2.3.3 SERVICE DISCOVERY: UNIVERSAL
DESCRIPTION, DISCOVERY AND INTEGRATION (UDDI) 18 2.3.4 CONSIDERATIONS 21
2.4 WEB SERVICES INFRASTRUCTURE 22 3 WEB SERVICES THREATS,
VULNERABILITIES, AND COUNTERMEASURES 25 3.1 THREATS AND VULNERABILITIES
CONCEPT DEFINITION 26 3.2 THREAT MODELING 28 3.3 VULNERABILITY
CATEGORIZATIONS AND CATALOGS 36 3.4 THREAT AND VULNERABILITIES METRICS
40 4 STANDARDS FOR WEB SERVICES SECURITY 45 4.1 THE CONCEPT OF STANDARD
47 4.2 WEB SERVICES SECURITY STANDARDS FRAMEWORK 48 4.3 AN OVERVIEW OF
CURRENT STANDARDS 49 4.3.1 NEAR THE WIRE SECURITY STANDARDS 49 4.3.2
XML DATA SECURITY 51 4.3.3 SECURITY ASSERTIONS MARKUP LANGUAGE (SAML) 53
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/990021777 DIGITALISIERT
DURCH X CONTENTS 4.3.4 SOAP MESSAGE SECURITY 56 4.3.5 KEY AND TRUST
MANAGEMENT STANDARDS 60 4.3.6 STANDARDS FOR POLICY SPECIFICATION 64
4.3.7 ACCESS CONTROL POLICY STANDARDS 67 4.4 IMPLEMENTATIONS OF WEB
SERVICES SECURITY STANDARDS 73 4.5 STANDARDS-RELATED ISSUES 74 5 DIGITAL
IDENTITY MANAGEMENT AND TRUST NEGOTIATION 79 5.1 OVERVIEW OF DIGITAL
IDENTITY MANAGEMENT 80 5.2 OVERVIEW OF EXISTING PROPOSALS 82 5.2.1
LIBERTY ALLIANCE 83 5.2.2 WS-FEDERATION 86 5.2.3 COMPARISON OF LIBERTY
ALLIANCE AND WS-FRAMEWORK ... 89 5.2.4 OTHER DIGITAL IDENTITY MANAGEMENT
INITIATIVES 90 5.3 DISCUSSION ON SECURITY OF IDENTITY MANAGEMENT SYSTEMS
93 5.4 BUSINESS PROCESSES 95 5.4.1 DEPLOYING MULTIFACTOR AUTHENTICATION
FOR BUSINESS PROCESSES 96 5.4.2 ARCHITECTURE 97 5.5 DIGITAL IDENTITY
MANAGEMENT IN GRID SYSTEMS 97 5.6 THE TRUST NEGOTIATION PARADIGM AND ITS
DEPLOYMENT USING SOA 100 5.7 TRUST NEGOTIATION AND DIGITAL IDENTITY
MANAGEMENT 101 5.7.1 AUTOMATED TRUST NEGOTIATION AND DIGITAL IDENTITY
MANAGEMENT SYSTEMS: DIFFERENCES AND SIMILARITIES 102 5.8 INTEGRATING
IDENTITY MANAGEMENT AND TRUST NEGOTIATIONS 105 5.8.1 ARCHITECTURE OF A
SP IN FAMTN 107 5.8.2 AN EXAMPLE OF A USE CASE: FSP IN LIBERTY WEB
SERVICES FRAMEWORK 108 5.9 NEGOTIATIONS IN AN FAMTN FEDERATION 109 5.9.1
TICKETING SYSTEM IN AN FAMTN FEDERATION 109 5.9.2 IMPLEMENTING TRUST
TICKETS THROUGH COOKIES 110 5.9. CONTENTS XI 6.3.2 ACCESS CONTROL AND
CREDENTIALS 134 6.3.3 K-TRUST LEVELS AND POLICIES 135 6.3.4 ACCESS
CONTROL ENFORCEMENT 136 6.3.5 K-TRUSTWORTHINESS LEVELS COMPUTATION 138
6.3.6 ARCHITECTURE OF THE ENFORCEMENT SYSTEM 145 7 SECURE PUBLISHING
TECHNIQUES 147 7.1 THE MERKLE SIGNATURES 148 7.1.1 MERKLE SIGNATURES FOR
TREES 148 7.1.2 MERKLE SIGNATURES FOR XML DOCUMENTS 149 7.1.3 MERKLE
HASH VERIFICATION FOR DOCUMENTS WITH PARTIALLY HIDDEN CONTENTS 150 7.2
APPLICATION OF THE MERKLE SIGNATURE TO UDDI REGISTRIES 152 7.2.1 MERKLE
SIGNATURE REPRESENTATION 152 7.2.2 MERKLE HASH PATH REPRESENTATION 153
7.2.3 A COMPARISON OF MERKLE SIGNATURES WITH XML SIGNATURES 154 7.3
BIBLIOGRAPHIC NOTES 157 8 ACCESS CONTROL FOR BUSINESS PROCESSES 159 8.1
ACCESS CONTROL FOR WORKFLOWS AND BUSINESS PROCESSES 161 8.2 WEB SERVICES
BUSINESS PROCESS EXECUTION LANGUAGE (WS-BPEL) 164 8.3 RBAC-WS-BPEL: AN
AUTHORIZATION MODEL FOR WS-BPEL BUSINESS PROCESSES 166 8.4 RBAC XACML:
AUTHORIZATION SCHEMA 170 8.5 BUSINESS PROCESS CONSTRAINT LANGUAGE 170
8.6 RBAC-WS-BPEL AUTHORIZATION SPECIFICATION 171 8.7 RBAC-WS-BPEL
ENFORCEMENT 172 8.8 RBAC-WS-BPEL SYSTEM ARCHITECTURE 174 8.9 HANDLING
ACTIVITY EXECUTION AND RBAC-WS-BPEL ENFORCEMENT 176 9 EMERGING RESEARCH
TRENDS 179 9. XII CONTENTS A ACCESS CONTROL 197 A.I BASIC NOTIONS 197
A.I.I THE PROTECTION MATRIX MODEL 198 A.1.2 ACCESS CONTROL LISTS AND
CAPABILITY LISTS 199 A.1.3 NEGATIVE AUTHORIZATIONS 199 A.2 ROLE-BASED
ACCESS CONTROL 200 A.3 CONCLUDING REMARKS 204 REFERENCES 205 INDEX 223
|
adam_txt |
CONTENTS 1 INTRODUCTION 1 1.1 SECURITY FOR WEB SERVICES AND SECURITY
GOALS 1 1.2 PRIVACY 3 1.3 GOALS AND SCOPE OF THE BOOK AND ITS INTENDED
AUDIENCE 4 1.4 AN OVERVIEW OF THE BOOK'S CONTENT 5 2 WEB SERVICE
TECHNOLOGIES, PRINCIPLES, ARCHITECTURES, AND STANDARDS 9 2.1 SOA AND WEB
SERVICES PRINCIPLES 10 2.2 WEB SERVICES ARCHITECTURE 13 2.3 WEB SERVICES
TECHNOLOGIES AND STANDARDS 13 2.3.1 SOAP 15 2.3.2 WEB SERVICES
DESCRIPTION LANGUAGE (WSDL) 16 2.3.3 SERVICE DISCOVERY: UNIVERSAL
DESCRIPTION, DISCOVERY AND INTEGRATION (UDDI) 18 2.3.4 CONSIDERATIONS 21
2.4 WEB SERVICES INFRASTRUCTURE 22 3 WEB SERVICES THREATS,
VULNERABILITIES, AND COUNTERMEASURES 25 3.1 THREATS AND VULNERABILITIES
CONCEPT DEFINITION 26 3.2 THREAT MODELING 28 3.3 VULNERABILITY
CATEGORIZATIONS AND CATALOGS 36 3.4 THREAT AND VULNERABILITIES METRICS
40 4 STANDARDS FOR WEB SERVICES SECURITY 45 4.1 THE CONCEPT OF STANDARD
47 4.2 WEB SERVICES SECURITY STANDARDS FRAMEWORK 48 4.3 AN OVERVIEW OF
CURRENT STANDARDS 49 4.3.1 "NEAR THE WIRE" SECURITY STANDARDS 49 4.3.2
XML DATA SECURITY 51 4.3.3 SECURITY ASSERTIONS MARKUP LANGUAGE (SAML) 53
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/990021777 DIGITALISIERT
DURCH X CONTENTS 4.3.4 SOAP MESSAGE SECURITY 56 4.3.5 KEY AND TRUST
MANAGEMENT STANDARDS 60 4.3.6 STANDARDS FOR POLICY SPECIFICATION 64
4.3.7 ACCESS CONTROL POLICY STANDARDS 67 4.4 IMPLEMENTATIONS OF WEB
SERVICES SECURITY STANDARDS 73 4.5 STANDARDS-RELATED ISSUES 74 5 DIGITAL
IDENTITY MANAGEMENT AND TRUST NEGOTIATION 79 5.1 OVERVIEW OF DIGITAL
IDENTITY MANAGEMENT 80 5.2 OVERVIEW OF EXISTING PROPOSALS 82 5.2.1
LIBERTY ALLIANCE 83 5.2.2 WS-FEDERATION 86 5.2.3 COMPARISON OF LIBERTY
ALLIANCE AND WS-FRAMEWORK . 89 5.2.4 OTHER DIGITAL IDENTITY MANAGEMENT
INITIATIVES 90 5.3 DISCUSSION ON SECURITY OF IDENTITY MANAGEMENT SYSTEMS
93 5.4 BUSINESS PROCESSES 95 5.4.1 DEPLOYING MULTIFACTOR AUTHENTICATION
FOR BUSINESS PROCESSES 96 5.4.2 ARCHITECTURE 97 5.5 DIGITAL IDENTITY
MANAGEMENT IN GRID SYSTEMS 97 5.6 THE TRUST NEGOTIATION PARADIGM AND ITS
DEPLOYMENT USING SOA 100 5.7 TRUST NEGOTIATION AND DIGITAL IDENTITY
MANAGEMENT 101 5.7.1 AUTOMATED TRUST NEGOTIATION AND DIGITAL IDENTITY
MANAGEMENT SYSTEMS: DIFFERENCES AND SIMILARITIES 102 5.8 INTEGRATING
IDENTITY MANAGEMENT AND TRUST NEGOTIATIONS 105 5.8.1 ARCHITECTURE OF A
SP IN FAMTN 107 5.8.2 AN EXAMPLE OF A USE CASE: FSP IN LIBERTY WEB
SERVICES FRAMEWORK 108 5.9 NEGOTIATIONS IN AN FAMTN FEDERATION 109 5.9.1
TICKETING SYSTEM IN AN FAMTN FEDERATION 109 5.9.2 IMPLEMENTING TRUST
TICKETS THROUGH COOKIES 110 5.9. CONTENTS XI 6.3.2 ACCESS CONTROL AND
CREDENTIALS 134 6.3.3 K-TRUST LEVELS AND POLICIES 135 6.3.4 ACCESS
CONTROL ENFORCEMENT 136 6.3.5 K-TRUSTWORTHINESS LEVELS COMPUTATION 138
6.3.6 ARCHITECTURE OF THE ENFORCEMENT SYSTEM 145 7 SECURE PUBLISHING
TECHNIQUES 147 7.1 THE MERKLE SIGNATURES 148 7.1.1 MERKLE SIGNATURES FOR
TREES 148 7.1.2 MERKLE SIGNATURES FOR XML DOCUMENTS 149 7.1.3 MERKLE
HASH VERIFICATION FOR DOCUMENTS WITH PARTIALLY HIDDEN CONTENTS 150 7.2
APPLICATION OF THE MERKLE SIGNATURE TO UDDI REGISTRIES 152 7.2.1 MERKLE
SIGNATURE REPRESENTATION 152 7.2.2 MERKLE HASH PATH REPRESENTATION 153
7.2.3 A COMPARISON OF MERKLE SIGNATURES WITH XML SIGNATURES 154 7.3
BIBLIOGRAPHIC NOTES 157 8 ACCESS CONTROL FOR BUSINESS PROCESSES 159 8.1
ACCESS CONTROL FOR WORKFLOWS AND BUSINESS PROCESSES 161 8.2 WEB SERVICES
BUSINESS PROCESS EXECUTION LANGUAGE (WS-BPEL) 164 8.3 RBAC-WS-BPEL: AN
AUTHORIZATION MODEL FOR WS-BPEL BUSINESS PROCESSES 166 8.4 RBAC XACML:
AUTHORIZATION SCHEMA 170 8.5 BUSINESS PROCESS CONSTRAINT LANGUAGE 170
8.6 RBAC-WS-BPEL AUTHORIZATION SPECIFICATION 171 8.7 RBAC-WS-BPEL
ENFORCEMENT 172 8.8 RBAC-WS-BPEL SYSTEM ARCHITECTURE 174 8.9 HANDLING
ACTIVITY EXECUTION AND RBAC-WS-BPEL ENFORCEMENT 176 9 EMERGING RESEARCH
TRENDS 179 9. XII CONTENTS A ACCESS CONTROL 197 A.I BASIC NOTIONS 197
A.I.I THE PROTECTION MATRIX MODEL 198 A.1.2 ACCESS CONTROL LISTS AND
CAPABILITY LISTS 199 A.1.3 NEGATIVE AUTHORIZATIONS 199 A.2 ROLE-BASED
ACCESS CONTROL 200 A.3 CONCLUDING REMARKS 204 REFERENCES 205 INDEX 223 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Bertino, Elisa 1957- |
author_GND | (DE-588)1018830286 |
author_facet | Bertino, Elisa 1957- |
author_role | aut |
author_sort | Bertino, Elisa 1957- |
author_variant | e b eb |
building | Verbundindex |
bvnumber | BV035181615 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 200 ST 235 ST 252 ST 277 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)268931371 (DE-599)DNB990021777 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02592nam a2200637 c 4500</leader><controlfield tag="001">BV035181615</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100111 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081126s2010 gw |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N36,0017</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">990021777</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540877417</subfield><subfield code="c">Gb. : ca. EUR 48.10 (freier Pr.), ca. sfr 75.00 (freier Pr.)</subfield><subfield code="9">978-3-540-87741-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540877417</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11979685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)268931371</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB990021777</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 235</subfield><subfield code="0">(DE-625)143622:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 252</subfield><subfield code="0">(DE-625)143627:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1018830286</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for web services and service-oriented architectures</subfield><subfield code="c">Elisa Bertino ...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Service-oriented architecture (Computer science)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web services</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-540-87742-4</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016988363&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016988363</subfield></datafield></record></collection> |
id | DE-604.BV035181615 |
illustrated | Not Illustrated |
index_date | 2024-07-02T22:58:07Z |
indexdate | 2024-07-09T21:26:52Z |
institution | BVB |
isbn | 9783540877417 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016988363 |
oclc_num | 268931371 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-860 |
owner_facet | DE-355 DE-BY-UBR DE-860 |
psigel | ZDB-33-ESD ZDB-33-EBS |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
spelling | Bertino, Elisa 1957- Verfasser (DE-588)1018830286 aut Security for web services and service-oriented architectures Elisa Bertino ... 1. ed. Berlin [u.a.] Springer 2010 txt rdacontent n rdamedia nc rdacarrier Application software Security measures Computer networks Security measures Service-oriented architecture (Computer science) Security measures Web services Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 gnd rswk-swf Web Services (DE-588)4691234-4 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Web Services (DE-588)4691234-4 s Serviceorientierte Architektur (DE-588)4841015-9 s Kryptoanalyse (DE-588)4830502-9 s Datensicherung (DE-588)4011144-1 s Identitätsverwaltung (DE-588)7546673-9 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 Erscheint auch als Online-Ausgabe 978-3-540-87742-4 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016988363&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Bertino, Elisa 1957- Security for web services and service-oriented architectures Application software Security measures Computer networks Security measures Service-oriented architecture (Computer science) Security measures Web services Security measures Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Web Services (DE-588)4691234-4 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)7546673-9 (DE-588)4691234-4 (DE-588)4841015-9 (DE-588)4293034-0 |
title | Security for web services and service-oriented architectures |
title_auth | Security for web services and service-oriented architectures |
title_exact_search | Security for web services and service-oriented architectures |
title_exact_search_txtP | Security for web services and service-oriented architectures |
title_full | Security for web services and service-oriented architectures Elisa Bertino ... |
title_fullStr | Security for web services and service-oriented architectures Elisa Bertino ... |
title_full_unstemmed | Security for web services and service-oriented architectures Elisa Bertino ... |
title_short | Security for web services and service-oriented architectures |
title_sort | security for web services and service oriented architectures |
topic | Application software Security measures Computer networks Security measures Service-oriented architecture (Computer science) Security measures Web services Security measures Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Web Services (DE-588)4691234-4 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Application software Security measures Computer networks Security measures Service-oriented architecture (Computer science) Security measures Web services Security measures Datensicherung Kryptoanalyse Identitätsverwaltung Web Services Serviceorientierte Architektur Zugriffskontrolle |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016988363&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bertinoelisa securityforwebservicesandserviceorientedarchitectures |