Flexible Network Architectures Security: Principles and Issues

CRC Press
Free sample

The future of Internet security doesn’t lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they’ll contribute to a more secure Internet.
Read more
Collapse

About the author

Dr. Bhawana Rudra is an Assistant Professor at the National Institute of Technology, Karnataka since May 2018. Her interests includes future Internet architectures, Network Protocols , security in routing, quality of service, Security in Wireless Networks, Loosely coupled protocols and its security, service and composition security, attribute-based authentication, Vector based Identification, Authorization, Confidentiality, Integrity, Availability of the resources. Recent work has focused on the design and analysis of security protocols for Future Internet With respect to Service Oriented Network Architecture with collaborative environment and middle ware. She has published extensively on this topic. Dr. Rudra earned Ph.D. degree in Information Technology, March 2015, at Indian institute of Information Technology-Allahabad. She also has a Master degree in Computer Science from SRM University, May 2010. In addition, she earned other degrees from India. She is the member for board of studies at department level in various colleges and life member for various professional societies. She is the reviewer for various Conferences and Journals like Elsevier, IEEE computer Society, etc. She is frequently invited to present lectures and tutorials and to participate in panels related to networking and security topics in various parts of India.

Read more
Collapse
Loading...

Additional Information

Publisher
CRC Press
Read more
Collapse
Published on
May 1, 2018
Read more
Collapse
Pages
298
Read more
Collapse
ISBN
9781351028295
Read more
Collapse
Read more
Collapse
Best For
Read more
Collapse
Language
English
Read more
Collapse
Genres
Computers / Information Technology
Computers / Internet / General
Computers / Security / General
Computers / Software Development & Engineering / General
Reference / Yearbooks & Annuals
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two.

Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.

This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.

Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.

It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.