Architectures and Protocols for Secure Information Technology Infrastructures

Author: Antonio Ruiz-Martinez   Rafael Marin-Lopez   Fernando Pereniguez-Garcia  

Publisher: IGI Global‎

Publication year: 2013

E-ISBN: 9781466645158

P-ISBN(Paperback): 9781466645141

Subject: TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Chapter

Security and Privacy Issues in Cloud Computing

Towards a Certified Electronic Mail System

Mobile IPv6: Mobility Management and Security Aspects

Cryptographic Algorithms and Security Protocols

A New Encryption Algorithm based on Chaotic Map for Wireless Sensor Network

A Polling Booth-Based Electronic Voting Scheme

Challenges and Solutions for DNS Security in IPv6

Malware and Intrusion Detection Systems

Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges

Enhancing Intrusion Detection Systems Using Intelligent False Alarm Filter: Selecting the Best Machine Learning Algorithm

Towards Building Efficient Malware Detection Engines Using Hybrid CPU/GPU-Accelerated Approaches

Secure Platforms and Frameworks

A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management

The Austrian Identity Ecosystem: An E-Government Experience

Developing Secure, Unified, Multi-Device, and Multi-Domain Platforms: A Case Study from the Webinos Project

Securing XML with Role-Based Access Control: Case Study in Health Care

Compilation of References

About the Contributors

Index

The users who browse this book also browse


No browse record.