Security of e-Systems and Computer Networks

作者: Mohammad Obaidat , Noureddine Boudriga

DOI:

关键词:

摘要: E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area research, development, investment. This book presents fundamental concepts tools e-based security its range applications. core areas - authentication users; system integrity; confidentiality communication; availability business service; non-repudiation transactions covered detail. Throughout major trends, challenges e-security presented, emphasis on public key infrastructure (PKI) systems, biometric-based trust management e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, risk also discussed. Technically oriented many practical examples, this is suitable for practitioners network security, as well graduate students researchers telecommunications computer science.

参考文章(97)
Alfonso Valdes, Phillip A. Porras, Live Traffic Analysis of TCP/IP Gateways. network and distributed system security symposium. ,(1998)
Michael Anshel, Dorian Goldfeld, Zeta functions, one-way functions, and pseudorandom number generators Duke Mathematical Journal. ,vol. 88, pp. 371- 390 ,(1997) , 10.1215/S0012-7094-97-08815-3
James R Young, Robert W Hammon, Automatic Palmprint Verification Study. ,(1981)
Christos Douligeris, Dimitrios N Serpanos, None, Network Security: Current Status and Future Directions ,(2007)
Salem Benferhat, Fabien Autrel, Frédéric Cuppens, Alexandre Miège, Recognizing Malicious Intention in an Intrusion Detection Process. HIS. pp. 806- 817 ,(2002)
Lalana Kagal, Tim Finin, Yun Peng, A Delegation Based Model for Distributed Trust Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence. ,(2001)
Hossein Bidgoli, Handbook of Information Security John Wiley & Sons, Inc.. ,(2005)
Frances M. T. Brazier, D. Johansen, Distributed Open Systems ,(1994)
William Stallings, Cryptography and network security ,(1998)
Ahmed K. Elmagarmid, William J. McIver, Advances in digital government : technology, human factors, and policy Kluwer Academic Publishers. ,(2002)