Cover image for Web services security and e-business
Web services security and e-business
Title:
Web services security and e-business
Author:
Radhamani, G., 1968-
ISBN:
9781599041704
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Physical Description:
electronic texts (xvi, 394 p. : ill.) : digital files.
Contents:
I. Wireless LAN setup and security loopholes / Biju Issac, Lawan Mohammed -- II. Wireless web security using a neural network-based cipher / Isaac Woungang, Alireza Sadeghian, Shuwei Wu, Sudip Misra, Maryam Arvandi -- III. RFID systems / Dennis Wong, Raphael Phan -- IV. Mobile code and security issues / E. Samundeeswari, F. Jane -- V. A survey of key generation for secure multicast communication protocols / Win Aye, Mohammad Siddiqi -- VI. Security in mobile agent systems / Chua Fang, G. Radhamani -- VII. Intrusion detection system / Robin Salim, G. Radha Krishna Rao -- VIII. Node authentication in networks using zero-knowledge proofs / Richard Norville, Kamesh Namuduri, Ravi Pendse -- IX. Web services security in e-business / Wei-Chuen Yau, G. Radha Krishna Rao -- X. Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha, R. Sankarasubramanian -- XI. An introductory study on business intelligence security / Chan Yee, G. Radha Krishna Rao -- XII. Secure trust transfer using chain signatures / Amitabh Saxena, Ben Soh -- XIII. Distributed intrusion detection systems / Rosalind Kumari, G. Radhamani -- XIV. Subtle interactions / Raphael Phan, Bok-Min Goi -- XV. Generic algorithm for preparing unbreakable cipher / R. Balachandar, M. Balakumar, S. Kumar -- XVI. A robust watermarking scheme using codes based on the redundant residue number system / Vik Goh, Mohammad Siddiqi --

XVII. A framework for electronic bill presentment and off-line message viewing / Ezmir Razali, Ismail Ahmad, G. Radha Krishna Rao, Kenneth Khit -- XVIII. Propagation and delegation of rights in access controls and risk assessment techniques / Saravanan Muthaiyah -- XIX. IPXec overhead in dual stack IPv4/IPv6 transition mechanisms / M. Mujinga, Hippolyte Muyingi, Alfredo Terzoli, G. Radha Krishna Rao -- XX. An approach for intentional modeling of web services security risk assessment / Subhas Misra, Vinod Kumar, Uma Kumar.
Abstract:
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. This book provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.
Added Corporate Author:
Holds: Copies: