Reference Hub2
Information Security Policies and Actions in Modern Integrated Systems

Information Security Policies and Actions in Modern Integrated Systems

Copyright: © 2004 |Pages: 380
ISBN13: 9781591401865|ISBN10: 1591401860|EISBN13: 9781591401872
DOI: 10.4018/978-1-59140-186-5
Cite Book Cite Book

MLA

Fugini, Maria Grazia, and Carlo Bellettini, editors. Information Security Policies and Actions in Modern Integrated Systems. IGI Global, 2004. https://doi.org/10.4018/978-1-59140-186-5

APA

Fugini, M. G. & Bellettini, C. (Eds.). (2004). Information Security Policies and Actions in Modern Integrated Systems. IGI Global. https://doi.org/10.4018/978-1-59140-186-5

Chicago

Fugini, Maria Grazia, and Carlo Bellettini, eds. Information Security Policies and Actions in Modern Integrated Systems. Hershey, PA: IGI Global, 2004. https://doi.org/10.4018/978-1-59140-186-5

Export Reference

Mendeley
Favorite Full-Book Download

Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgments
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Cryptography  (pages 18-18)
Cryptography
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Authorization Frameworks  (pages 148-148)
Authorization Frameworks
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Service Oriented Computing Frameworks
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Authors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.