Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these technologies in multiple domains. The author lays the groundwork with discussions of concepts in trustworthy information systems and security for service-oriented architecture. Next, she covers secure Web services and applications—discussing how these technologies are used in secure interoperability, national defense, and medical applications.
Divided into five parts, the book describes the various aspects of secure service oriented information systems; including confidentiality, trust management, integrity, and data quality. It evaluates knowledge management and e-business concepts in services technologies, information management, semantic Web security, and service-oriented computing. You will also learn how it applies to Web services, service-oriented analysis and design, and specialized and semantic Web services.
The author covers security and design methods for service-oriented analysis, access control models for Web Services, identity management, access control and delegation, and confidentiality. She concludes by examining privacy, trust, and integrity, the relationship between secure semantic Web technologies and services, secure ontologies, and RDF. The book also provides specific consideration to activity management such as e-business, collaboration, healthcare, and finance.
Professor Bhavani Thuraisingham, Ph.D., The University of Texas, Dallas, USA
Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers.
Selected topics include:The filesystem and shellFile creation and editingText manipulation and pipelinesBackups and remote storageViewing and controlling processesUser account managementBecoming the superuserNetwork connectionsAudio and videoInstalling softwareProgramming with shell scripts