Security for Web Services and Service-Oriented Architectures

Author:   Elisa Bertino ,  Lorenzo Martino ,  Federica Paci ,  Anna Squicciarini
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2010 ed.
ISBN:  

9783642426032


Pages:   226
Publication Date:   26 November 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Security for Web Services and Service-Oriented Architectures


Add your own review!

Overview

Full Product Details

Author:   Elisa Bertino ,  Lorenzo Martino ,  Federica Paci ,  Anna Squicciarini
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2010 ed.
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642426032


ISBN 10:   3642426034
Pages:   226
Publication Date:   26 November 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Reviews

From the reviews: “This book deals exclusively with SOAP based Web services. … the book could serve as a good review and reference. … The book targets three distinct audiences, practitioners, students and researchers. … I suspect students and researchers will find the first half of this book a fast paced review or a somewhat useful reference, at best. The second half of the book contains material that might be more useful to students and researchers.” (Karthik Ramachandran, ACM Computing Reviews, September, 2010)


From the reviews: This book deals exclusively with SOAP based Web services. the book could serve as a good review and reference. The book targets three distinct audiences, practitioners, students and researchers. I suspect students and researchers will find the first half of this book a fast paced review or a somewhat useful reference, at best. The second half of the book contains material that might be more useful to students and researchers. (Karthik Ramachandran, ACM Computing Reviews, September, 2010)


Author Information

Elisa Bertino is professor of Computer Science and Electrical and Computer Engineering, and research director of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. She has carried out extensive research on various security topics, such as foundations of access control systems, security for location-based applications, security for web services, digital identity management, data privacy, security and privacy for healthcare applications and for GIS; and has given numerous presentations and tutorials on these topics in scientific conferences. Recently, she recently received the IEEE Computer Society 2005 Kanai award for her research in security for distributed systems. She has also served as a member of the Microsoft Trustworthy Computing Academic Advisory Board. Lorenzo D. Martino is visiting assistant professor at the Computer and Information Technology (C&IT) department of Purdue University and at the Cyber Center of the Purdue University. He has carried out research on trust negotiation techniques and security for web services. Federica Maria Francesca Paci is a PhD Student at the University of Milan, Italy. Her main research interests include the development of access control models for constraint workflow systems, Web services access control models and secure distribution of XML documents. She has published several refereed journal and conference papers in these areas. Anna Squicciarini is a post doctoral research associate in the Computer Science Department of Purdue University. She conducts research on security for distributed systems, with particular focus on trust management, identity management and access control for grids and Web Services. She has published several refereed journal and conference papers in these areas. She has been the main architect of the Trust-X system, an innovative system supporting trust negotiation in distributed open systems.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List