Muutke küpsiste eelistusi

E-raamat: Secure Semantic Service-Oriented Systems

(The University of Texas at Dallas, USA)
  • Formaat: 463 pages
  • Ilmumisaeg: 14-Dec-2010
  • Kirjastus: Auerbach
  • Keel: eng
  • ISBN-13: 9781420073324
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 175,50 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: 463 pages
  • Ilmumisaeg: 14-Dec-2010
  • Kirjastus: Auerbach
  • Keel: eng
  • ISBN-13: 9781420073324
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential.

Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these technologies in multiple domains. The author lays the groundwork with discussions of concepts in trustworthy information systems and security for service-oriented architecture. Next, she covers secure Web services and applicationsdiscussing how these technologies are used in secure interoperability, national defense, and medical applications.

Divided into five parts, the book describes the various aspects of secure service oriented information systems; including confidentiality, trust management, integrity, and data quality. It evaluates knowledge management and e-business concepts in services technologies, information management, semantic Web security, and service-oriented computing. You will also learn how it applies to Web services, service-oriented analysis and design, and specialized and semantic Web services.

The author covers security and design methods for service-oriented analysis, access control models for Web Services, identity management, access control and delegation, and confidentiality. She concludes by examining privacy, trust, and integrity, the relationship between secure semantic Web technologies and services, secure ontologies, and RDF. The book also provides specific consideration to activity management such as e-business, collaboration, healthcare, and finance.
Preface xix
Background xix
Organization of This Book xx
Data, Information, and Knowledge xxii
Final Thoughts xxii
Acknowledgments xxv
1 Introduction
1(14)
1.1 Overview
1(1)
1.2 Services and Security Technologies
2(4)
1.2.1 Services Technologies
2(1)
1.2.2 Specialized Web Services
3(1)
1.2.3 Semantic Services
4(1)
1.2.4 Security Technologies
4(2)
1.3 Secure Services
6(2)
1.4 Trustworthy Services
8(1)
1.5 Secure Semantic Services
8(1)
1.6 Specialized Secure Services
9(1)
1.7 Organization of This Book
10(1)
1.8 Next Steps
11(4)
PART I SERVICES AND SECURITY TECHNOLOGIES
Introduction to Part I
15(2)
2 Service-Oriented Computing
17(8)
2.1 Overview
17(1)
2.2 Services
18(2)
2.3 Service-Oriented Computing
20(1)
2.4 SOA and Web Services
21(1)
2.5 Service-Oriented Analysis and Design
21(1)
2.6 Specialized Services
22(1)
2.7 Semantic Web and Services
23(1)
2.8 Summary and Directions
24(1)
Exercises
24(1)
References
24(1)
3 SOA and Web Services
25(12)
3.1 Overview
25(1)
3.2 Standards Organizations
26(1)
3.3 SOA
27(1)
3.4 Web Services
28(2)
3.4.1 Overview
28(1)
3.4.2 Web Services Architecture
28(2)
3.4.3 Composition of Web Services
30(1)
3.5 Web Services Protocol Stack
30(3)
3.6 RESTful Web Services
33(1)
3.7 Amazon Web Services
33(1)
3.8 Summary and Directions
34(1)
Exercises
35(1)
References
35(2)
4 Service-Oriented Analysis and Design
37(8)
4.1 Overview
37(1)
4.2 Service-Oriented Life Cycle
38(1)
4.3 Service-Oriented Analysis and Design
38(2)
4.4 Service Modeling
40(1)
4.5 SOAD Approaches
41(2)
4.6 Summary and Directions
43(1)
Exercises
43(1)
References
44(1)
5 Specialized Web Services
45(38)
5.1 Overview
45(1)
5.2 Web Services for Data Management
46(4)
5.2.1 Data Management
46(1)
5.2.1.1 Data Model
46(1)
5.2.1.2 Functions
46(1)
5.2.1.3 Data Distribution
47(1)
5.2.1.4 Web Data Management
48(1)
5.2.2 Web Services for Data Management
49(1)
5.3 Web Services for Complex Data Management
50(3)
5.3.1 Concepts
50(1)
5.3.1.1 Multimedia Data Systems
50(2)
5.3.1.2 Geospatial Data Management
52(1)
5.3.2 Web Services for Complex Data Management
52(1)
5.4 Web Services for Information Management
53(9)
5.4.1 Data Mining and Warehousing
54(1)
5.4.2 Information Retrieval
55(1)
5.4.2.1 Text Retrieval
56(1)
5.4.2.2 Image Retrieval
57(1)
5.4.2.3 Video Retrieval
57(1)
5.4.2.4 Audio Retrieval
57(1)
5.4.3 Digital Libraries
58(1)
5.4.3.1 Search Engines
59(1)
5.4.3.2 Question-Answering Systems
60(1)
5.4.4 Web Services for Information Management
60(2)
5.5 Web Services for Knowledge Management
62(2)
5.5.1 Strategies, Processes, and Models
62(1)
5.5.2 Web Services for Knowledge Management
63(1)
5.6 Web Services for Activity Management
64(10)
5.6.1 E-Business and E-Commerce
64(1)
5.6.2 Collaboration and Workflow
65(2)
5.6.3 Information Integration
67(1)
5.6.4 Information Sharing
68(1)
5.6.5 Social Networking
68(1)
5.6.6 Supply Chain Management
69(2)
5.6.7 Web Services for Activity Management
71(1)
5.6.7.1 E-Business
71(1)
5.6.7.2 Collaboration and Workflow
72(1)
5.6.7.3 Information Integration
73(1)
5.6.7.4 Other Activities
73(1)
5.7 Domain Web Services
74(3)
5.7.1 Defense
74(1)
5.7.2 Healthcare and Life Sciences
75(1)
5.7.3 Finance
76(1)
5.7.4 Telecommunication
77(1)
5.8 Emerging Web Services
77(4)
5.8.1 X as a Service
77(1)
5.8.1.1 Data as a Service
77(2)
5.8.1.2 Software as a Service
79(1)
5.8.1.3 Other X as a Service
79(1)
5.8.2 Amazon Web Services
80(1)
5.8.3 Web Services for Grids and Clouds
80(1)
5.9 Summary and Directions
81(1)
Exercises
81(1)
References
81(2)
6 Semantic Web Services
83(16)
6.1 Overview
83(1)
6.2 Layered Technology Stack
84(1)
6.3 XML
85(4)
6.3.1 XML Statement and Elements
87(1)
6.3.2 XML Attributes
87(1)
6.3.3 XML DTDs
87(1)
6.3.4 XML Schemas
87(1)
6.3.5 XML Namespaces
88(1)
6.3.6 XML Federations/Distribution
88(1)
6.3.7 XML-QL, XQuery, XPath, and XSLT
88(1)
6.4 RDF
89(3)
6.4.1 RDF Basics
89(1)
6.4.2 RDF Container Model
90(1)
6.4.3 RDF Specification
90(1)
6.4.4 RDF Schemas
91(1)
6.4.5 RDF Axiomatic Semantics
91(1)
6.4.6 RDF Inferencing
91(1)
6.4.7 RDF Query
92(1)
6.5 Ontologies
92(1)
6.6 Web Rules and SWRL
93(3)
6.6.1 Web Rules
93(2)
6.6.2 SWRL
95(1)
6.7 Semantic Web Services
96(1)
6.8 Summary and Directions
97(1)
Exercises
97(1)
References
98(1)
7 Trustworthy Systems
99(30)
7.1 Overview
99(1)
7.2 Secure Systems
99(10)
7.2.1 Overview
99(1)
7.2.2 Access Control and Other Security Concepts
100(1)
7.2.3 Types of Secure Systems
101(1)
7.2.4 Secure Operating Systems
102(1)
7.2.5 Secure Database Systems
103(1)
7.2.6 Secure Networks
104(2)
7.2.7 Emerging Trends
106(1)
7.2.8 Impact of the Web
106(1)
7.2.9 Steps to Building Secure Systems
107(2)
7.3 Dependable Systems
109(3)
7.3.1 Overview
109(1)
7.3.2 Trust Management
110(1)
7.3.3 Digital Rights Management
110(1)
7.3.4 Privacy
111(1)
7.3.5 Integrity, Data Quality, and High Assurance
111(1)
7.4 Web Security
112(13)
7.4.1 Overview
112(1)
7.4.2 Threats to Web Security
113(1)
7.4.2.1 Overview
113(1)
7.4.2.2 General Cyber Threats
113(2)
7.4.2.3 Threats to Web Databases
115(2)
7.4.3 Web Security Solutions
117(1)
7.4.3.1 Overview
117(1)
7.4.3.2 Solutions for General Threats
117(3)
7.4.3.3 Risk Analysis
120(1)
7.4.3.4 Biometrics, Forensics, and Other Solutions
120(1)
7.4.3.5 Solutions for Threats to Web Databases
121(4)
7.5 Summary and Directions
125(1)
Exercises
125(1)
References
125(2)
Conclusion to Part I
127(2)
PART II SECURE SERVICES TECHNOLOGIES
Introduction to Part II
129(2)
8 Secure Service-Oriented Computing
131(10)
8.1 Overview
131(1)
8.2 Secure Services
132(1)
8.3 Secure Service-Oriented Computing
133(1)
8.4 Secure SOA and Web Services
134(2)
8.5 Secure Service-Oriented Analysis and Design
136(1)
8.6 Federated Identity Management
136(1)
8.7 Access Control
137(1)
8.8 Delegation Model
138(1)
8.9 Summary and Directions
139(1)
Exercises
139(1)
References
139(2)
9 Secure SOA and Web Services
141(8)
9.1 Overview
141(1)
9.2 WS-Security
142(2)
9.3 WS- Security
144(3)
9.4 Summary and Directions
147(1)
Exercises
148(1)
References
148(1)
10 Secure Service-Oriented Analysis and Design
149(8)
10.1 Overview
149(1)
10.2 Secure Object-Oriented Analysis and Design
149(1)
10.3 Secure Service-Oriented Life Cycle
150(1)
10.4 Secure Service-Oriented Analysis and Design
151(1)
10.5 Secure Service Modeling
152(1)
10.6 Secure SOAD Approaches
153(1)
10.7 Summary and Directions
154(1)
Exercises
154(1)
References
155(2)
11 Access Control for Web Services
157(8)
11.1 Overview
157(1)
11.2 SAML
158(1)
11.3 XACML
159(2)
11.4 Attribute-Based Access Control
161(1)
11.5 Inference Control
162(1)
11.6 Summary and Directions
162(1)
Exercises
163(1)
References
163(2)
12 Digital Identity Management
165(8)
12.1 Overview
165(1)
12.2 Single Sign-On and Federated Identity Management
166(1)
12.3 Identity Metasystem and Information Card
167(1)
12.4 Open-ID
168(1)
12.5 Shibboleth
169(1)
12.6 Liberty Alliance
170(2)
12.7 Summary and Directions
172(1)
Exercises
172(1)
References
172(1)
13 Security Models for Web Services
173(8)
13.1 Overview
173(1)
13.2 Delegation Model
174(1)
13.3 Information Flow Model
175(1)
13.4 Multilevel Secure Web Services
176(1)
13.5 Summary and Directions
177(1)
Exercises
178(1)
References
178(1)
Conclusion to Part II
179(2)
PART III DEPENDABLE WEB SERVICES
Introduction to Part III
181(2)
14 Trust Management and Web Services
183(10)
14.1 Overview
183(1)
14.2 Trust Management
184(4)
14.2.1 Trust Management and Negotiation
184(2)
14.2.2 Trust And Risk Management
186(1)
14.2.3 Reputation-Based Systems
187(1)
14.3 Trust and Web Services
188(3)
14.3.1 Trust Management as a Web Service
188(2)
14.3.2 Trust Management for Web Services
190(1)
14.4 Summary and Directions
191(1)
Exercises
192(1)
References
192(1)
15 Privacy and Web Services
193(10)
15.1 Overview
193(1)
15.2 Privacy Management
194(4)
15.2.1 Privacy Issues
194(1)
15.2.2 Privacy Problem through Inference
195(2)
15.2.3 Platform for Privacy Preferences
197(1)
15.2.4 Privacy-Preserving Semantic Web Mining
197(1)
15.3 Privacy Management and Web Services
198(3)
15.3.1 Web Services for Privacy Management
198(1)
15.3.2 Privacy for Web Services and Semantic Web
199(2)
15.4 Summary and Directions
201(1)
Exercises
201(1)
References
201(2)
16 Integrity Management, Data Provenance, and Web Services
203(10)
16.1 Overview
203(1)
16.2 Integrity, Data Quality, and Provenance
204(3)
16.2.1 Aspects of Integrity
204(1)
16.2.2 Inferencing, Data Quality, and Data Provenance
205(2)
16.3 Integrity Management and Web Services
207(3)
16.3.1 Web Services for Integrity Management
207(2)
16.3.2 Integrity for Web Services and Semantic Web
209(1)
16.4 Summary and Directions
210(1)
Exercises
211(1)
References
211(1)
Conclusion to Part III
212(1)
PART IV SECURE SEMANTIC WEB SERVICES
Introduction to Part IV
213(2)
17 Secure Semantic Web and Web Services
215(12)
17.1 Overview
215(1)
17.2 Security for the Semantic Web
216(4)
17.2.1 Overview
216(1)
17.2.2 XML Security
217(1)
17.2.3 RDF Security
218(1)
17.2.4 Security and Ontologies
219(1)
17.2.5 Secure Query and Rules Processing for the Semantic Web
219(1)
17.3 Privacy and Trust for the Semantic Web
220(3)
17.3.1 Overview
220(1)
17.3.2 Data Mining, National Security, Privacy, and the Semantic Web
220(1)
17.3.3 Solutions to the Privacy Problem
221(1)
17.3.4 Trust for the Semantic Web
222(1)
17.4 Secure Semantic Web and Web Services
223(1)
17.5 Summary and Directions
224(1)
Exercises
225(1)
References
225(2)
18 Security, XML, and Web Services
227(16)
18.1 Overview
227(1)
18.2 Example XML Document
228(4)
18.3 XML Security Standards
232(1)
18.4 Issues in XML Security
233(2)
18.5 Policy Specification in XML
235(2)
18.5.1 Credentials
235(1)
18.5.2 Policies
236(1)
18.6 Access Control for XML Documents
237(1)
18.7 Secure Publication of XML Documents
238(1)
18.8 Secure XML Databases
239(1)
18.9 XML, Security, and Web Services
240(1)
18.10 Summary and Directions
241(1)
Exercises
242(1)
References
242(1)
19 Security, RDF, and Web Services
243(12)
19.1 Overview
243(1)
19.2 Example of an RDF Document
244(1)
19.3 Issues in RDF Security
245(2)
19.3.1 Basic Concepts
245(2)
19.3.2 Advanced Concepts
247(1)
19.4 Policy Specification in RDF
247(2)
19.5 Access Control
249(1)
19.6 Secure RDF Databases
250(1)
19.7 Security, RDF, and Web Services
251(1)
19.8 Summary and Directions
252(1)
Exercises
253(1)
References
253(2)
20 Security, Ontologies, and Web Services
255(10)
20.1 Overview
255(1)
20.2 OWL Example
256(2)
20.3 Securing Ontologies
258(1)
20.4 Policy Specification in OWL
259(1)
20.5 Access Control
260(1)
20.6 Secure OWL Databases
261(1)
20.7 Ontology for Policy and Data Integration
261(1)
20.8 Security, Ontologies, and Web Services
261(1)
20.9 Summary and Directions
262(1)
Exercises
263(1)
References
263(2)
21 Security, Rules, and Web Services
265(10)
21.1 Overview
265(1)
21.2 Nonmonotonic-Typed Multilevel Logic for Secure Data and Knowledge Management
266(1)
21.3 Securing Rules
266(3)
21.4 Policy Specification Using Rules
269(1)
21.5 Inference Problem and Policy Reasoning
270(2)
21.6 Security, Rules, and Web Services
272(1)
21.7 Summary and Directions
273(1)
Exercises
273(1)
References
273(1)
Conclusion to Part IV
274(1)
PART V EMERGING SECURE WEB SERVICES
Introduction to Part V
275(2)
22 Web Services for Secure Data, Information, and Knowledge Management
277(6)
22.1 Overview
277(1)
22.2 Web Services for Secure Data Management
278(1)
22.3 Secure Information Management
279(1)
22.4 Secure Knowledge Management
280(1)
22.5 Summary and Directions
280(1)
Exercises
281(1)
References
281(2)
23 Secure Geospatial, Multimedia, and Sensor Web Services
283(18)
23.1 Overview
283(1)
23.2 Secure Geospatial Semantic Web
284(9)
23.2.1 Geospatial Semantic Web Concepts
284(2)
23.2.2 Secure Geospatial Data Management
286(2)
23.2.3 Secure Geospatial Semantic Web
288(2)
23.2.4 Secure Interoperability with GRDF
290(1)
23.2.5 GeoRSS
291(2)
23.3 Secure Multimedia Data Management
293(1)
23.4 Secure Sensor Web Services
294(3)
23.4.1 Concepts
294(2)
23.4.2 Pervasive Computing and Web Services
296(1)
23.5 Summary and Directions
297(1)
Exercises
298(1)
References
298(3)
24 Web Services for Secure Activity Management
301(16)
24.1 Overview
301(1)
24.2 Secure E-Commerce
302(2)
24.3 Secure Workflow and Collaboration
304(2)
24.4 Secure Information Interoperability
306(3)
24.5 Secure Information Sharing
309(4)
24.6 Secure Social Networking
313(1)
24.7 Secure Supply Chain
313(1)
24.8 Summary and Directions
314(1)
Exercises
315(1)
References
315(2)
25 Secure Specialized Web Services
317(6)
25.1 Overview
317(1)
25.2 Secure Domain Web Services
318(1)
25.3 Security for X as a Service
319(1)
25.4 Security for Amazon Web Services
319(1)
25.5 Secure Web Services for Cloud and Grid
320(1)
25.6 Summary and Directions
321(1)
Exercises
322(1)
References
322(1)
26 Summary and Directions
323(10)
26.1 About This
Chapter
323(1)
26.2 Summary of This Book
323(4)
26.3 Directions for Secure Semantic Service-Oriented Information Systems
327(2)
26.4 Where Do We Go from Here?
329(2)
Conclusion to Part V
331(2)
APPENDIX A DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS
333(16)
A.1 Overview
333(1)
A.2 Developments in Database Systems
334(4)
A.3 Status, Vision, and Issues
338(1)
A.4 Data Management Systems Framework
339(3)
A.5 Building Information Systems from the Framework
342(3)
A.6 Relationships among the Texts
345(1)
A.7 Summary and Directions
345(2)
References
347(2)
APPENDIX B DATABASE MANAGEMENT
349(34)
B.1 Overview
349(1)
B.2 Relational and Entity-Relationship Data Models
350(2)
B.2.1 Overview
350(1)
B.2.2 Relational Data Model
350(1)
B.2.3 Entity-Relationship Data Model
351(1)
B.3 Architectural Issues
352(1)
B.4 Database Design
353(1)
B.5 Database Administration
354(1)
B.6 Database Management System Functions
355(7)
B.6.1 Overview
355(1)
B.6.2 Query Processing
356(1)
B.6.3 Transaction Management
356(2)
B.6.4 Storage Management
358(1)
B.6.5 Metadata Management
358(2)
B.6.6 Database Integrity
360(1)
B.6.7 Fault Tolerance
360(1)
B.6.8 Other Functions
361(1)
B.7 Distributed Databases
362(1)
B.8 Heterogeneous Database Integration
363(1)
B.9 Federated Databases
364(2)
B.10 Client-Server Databases
366(2)
B.11 Migrating Legacy Databases and Applications
368(1)
B.12 Data Warehousing
368(2)
B.13 Data Mining
370(1)
B.14 Impact of the Web
371(1)
B.15 Object Technology
372(5)
B.15.1 Overview
372(1)
B.15.2 Object Data Model
373(3)
B.15.3 Other Object Technologies
376(1)
B.16 Other Database Systems
377(1)
B.17 Summary and Directions
378(1)
References
379(4)
APPENDIX C DISCRETIONARY AND MULTILEVEL SECURITY FOR OBJECT DATABASE SYSTEMS
383(26)
C.1 Overview
383(1)
C.2 Discretionary Security
384(7)
C.2.1 Overview
384(1)
C.2.2 Policy Issues
385(1)
C.2.3 Policy Enforcement
385(3)
C.2.4 Example Systems
388(1)
C.2.4.1 Overview
388(1)
C.2.4.2 ORION
388(1)
C.2.4.3 IRIS
389(1)
C.2.4.4 STARBURST
390(1)
C.2.4.5 GemStone
390(1)
C.3 Multilevel Security
391(7)
C.3.1 Overview
391(1)
C.3.2 Policy Issues
391(2)
C.3.3 System Design Issues
393(1)
C.3.4 Example Systems
394(1)
C.3.4.1 Overview
394(1)
C.3.4.2 SOAD System
394(1)
C.3.4.3 SORION Model
395(1)
C.3.4.4 SO2 Model
395(1)
C.3.4.5 Millen-Lunt Model
396(1)
C.3.4.6 Jajodia-Kogan Model
396(1)
C.3.4.7 Morgenstern's Model
397(1)
C.3.4.8 UFOS Model
397(1)
C.4 Security for Object Request Brokers
398(3)
C.4.1 Overview
398(1)
C.4.2 OMG Security Services
398(2)
C.4.3 Secure Components and Frameworks
400(1)
C.5 Object Modeling for Secure Applications
401(4)
C.5.1 Overview
401(1)
C.5.2 Multilevel OMT
402(2)
C.5.3 UML and Security
404(1)
C.6 Summary and Directions
405(1)
References
406(3)
APPENDIX D DEVELOPMENTS WITH STANDARDS, PRODUCTS, AND TOOLS
409(10)
D.1 Overview
409(1)
D.2 Oasis Service Standards
410(1)
D.3 Web Services Products
411(1)
D.3.1 Enterprise Service Bus-Related Products
411(1)
D.3.2 Web Services Suites
412(1)
D.4 Semantic Web Standards
412(3)
D.4.1 Products
413(2)
D.5 Semantic Web Products
415(1)
D.6 Summary and Directions
416(1)
References
417(2)
Index 419
Professor Bhavani Thuraisingham, Ph.D., The University of Texas, Dallas, USA