The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation.
This book details the SERENITY approach towards providing security and dependability solutions for dynamic, highly-distributed and heterogeneous systems. It covers the foundations of ambient systems and includes case studies.
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It discusses securing current and next generation telecommunications networks.
Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA. They cover all standards addressing Web service security, as well as recent research on access control and advanced digital identity management techniques.
This monograph provides a wide-ranging and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field.
Global in its scope and perspective, this publication features contributing authors from around the world in the first systematic, archival volume treatment of the field. They cover the very latest advances in research and practice in this vital area of study.
This is the first technical book exclusively focused on spyware/adware. It also includes defensive techniques. The book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.
This is one of the first books to provide an overview of trust management for open service-oriented environments. It presents social network-based techniques for establishing trust in decentralized environments.
Voice over IP Security examines the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. The text also identifies current areas of risk and deficiencies in the research.