Web Services Security and E-Business, 1st Edition

  • Published By:
  • ISBN-10: 1599041707
  • ISBN-13: 9781599041704
  • Grade Level Range: College Freshman - College Senior
  • 300 Pages | eBook
  • Original Copyright 2007 | Published/Released February 2007
  • This publication's content originally published in print form: 2007

  • Price:  Sign in for price



Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security -- namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. Web Services Security and E-Business provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Web Services Security and E-Business: Table of Contents.
1: Wireless LAN Setup and Security Loopholes.
2: Wireless Web Security Using a Neural Network-Based Cipher.
3: RFID Systems: Applications vs. Security and Privacy Implications.
4: Mobile Code and Security Issues.
5: A Survey of Key Generation for Secure Multicast Communication Protocols.
6: Security in Mobile Agent Systems.
7: Intrusion Detection System: A Brief Study.
8: Node Authentication in Networks Using Zero-Knowledge Proofs.
9: Web Services Security in E-Business: Attacks and Countermeasures.
10: Verifiable Encryption of Digital Signatures Using Elliptic Curve Digital Signature Algorithm and its Implementation Issues.
11: An Introductory Study on Business Intelligence Security.
12: Secure Trust Transfer Using Chain Signatures.
13: Distributed Intrusion Detection Systems: An Overview.
14: Subtle Interactions: Security Protocols and Cipher Modes of Operation.
15: Generic Algorithm for Preparing Unbreakable Cipher: A Short Study.
16: A Robust Watermarking Scheme Using Codes Based on the Redundant Residue Number System.
17: A Framework for Electronic Bill Presentment and Off-Line Message Viewing.
18: Propagation and Delegation of Rights in Access Controls and Risk Assessment Techniques.
19: IPSec Overhead in Dual Stack IPv4/IPv6 Transition Mechanisms: An Analytical Study.
20: An Approach for Intentional Modeling of Web Services Security Risk Assessment.
About the Authors.