Normal view MARC view ISBD view

Architectures and protocols for secure information technology infrastructures / Antonio Ruiz Martinez, Rafael Marin-Lopez and Fernando Pereniguez Garcia, editors.

Contributor(s): Martinez, Antonio Ruiz, 1976- [editor.] | Marin-Lopez, Rafael, 1977- [editor.] | Garcia, Fernando Pereniguez, 1984- [editor.] | IGI Global.
Material type: TextTextSeries: IGI Global Research Collection.Publisher: Hershey, Pennsylvania (701 E. Chocolate Ave., Hershey, PA, 17033) : IGI Global, [2014]Description: PDFs (365 pages) : illustrations.Content type: text Media type: electronic Carrier type: online resourceISBN: 9781466645158 (ebook).Subject(s): Information technology -- Security measures | Computer networks -- Security measuresAdditional physical formats: No title; Print version:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | A73 2014Online resources: Click here to view this ebook. Also available in print.
Contents:
Security and privacy issues in cloud computing / Jaydip Sen -- Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme / Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Host-based intrusion detection systems: architectures, solutions, and challenges / Vít Bukac, Vashek Matyáš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru -- A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarín, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sánchez, Robert Kuykendall.
Abstract: "This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25 A73 2014 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4514-1 Available ocn855019703

Includes bibliographical references.

Security and privacy issues in cloud computing / Jaydip Sen -- Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme / Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Host-based intrusion detection systems: architectures, solutions, and challenges / Vít Bukac, Vashek Matyáš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru -- A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarín, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sánchez, Robert Kuykendall.

Restricted to subscribers or individual electronic text purchasers.

"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--Provided by publisher.

Also available in print.

Mode of access: World Wide Web.

Description based on title screen (IGI Global, viewed August 21, 2013).

There are no comments for this item.

Log in to your account to post a comment.