LEADER 03791nam 2200625 a 450 001 9910809833003321 005 20200520144314.0 010 $a0-429-24963-2 010 $a1-4200-7332-X 024 7 $a10.1201/b10441 035 $a(CKB)2670000000066119 035 $a(EBL)631696 035 $a(OCoLC)697122503 035 $a(SSID)ssj0000473005 035 $a(PQKBManifestationID)11302774 035 $a(PQKBTitleCode)TC0000473005 035 $a(PQKBWorkID)10436445 035 $a(PQKB)11226711 035 $a(MiAaPQ)EBC631696 035 $a(Au-PeEL)EBL631696 035 $a(CaPaEBR)ebr10444326 035 $a(CaONFJC)MIL693710 035 $a(EXLCZ)992670000000066119 100 $a20101122d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity for service oriented systems /$fBhavani Thuraisingham 205 $a1st ed. 210 $aBoca Raton $cAuerbach Publications$d2011 215 $a1 online resource (446 p.) 300 $aAn Auerbach book. 311 $a1-4665-4944-0 311 $a1-322-62428-3 311 $a1-4200-7331-1 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Preface; Acknowledgments; Chapter 1: Introduction; Chapter 2: Service-Oriented Computing; Chapter 3: SOA and Web Services; Chapter 4: Service-Oriented Analysis and Design; Chapter 5: Specialized Web Services; Chapter 6: Semantic Web Services; Chapter 7: Trustworthy Systems; Chapter 8: Secure Service-Oriented Computing; Chapter 9: Secure SOA and Web Services; Chapter 10: Secure Service-Oriented Analysis and Design; Chapter 11: Access Control for Web Services; Chapter 12: Digital Identity Management; Chapter 13: Security Models for Web Services 327 $aChapter 14: Trust Management and Web ServicesChapter 15: Privacy and Web Services; Chapter 16: Integrity Management, Data Provenance, and Web Services; Chapter 17: Secure Semantic Web and Web Services; Chapter 18: Security, XML, and Web Services; Chapter 19: Security, RDF, and Web Services; Chapter 20: Security, Ontologies, and Web Services; Chapter 21: Security, Rules, and Web Services; Chapter 22: Web Services for Secure Data, Information, and Knowledge Management; Chapter 23: Secure Geospatial, Multimedia, and Sensor Web Services; Chapter 24: Web Services for Secure Activity Management 327 $aChapter 25: Secure Specialized Web ServicesChapter 26: Summary and Directions; Appendix A: Data Management Systems: Developments and Trends; Appendix B: Database Management; Appendix C: Secure Objects; Appendix D: Developments with Standards, Products, and Tools; Back Cover 330 $aAs the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential. Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these te 606 $aService-oriented architecture (Computer science) 606 $aComputer networks$xSecurity measures 615 0$aService-oriented architecture (Computer science) 615 0$aComputer networks$xSecurity measures. 676 $a004.6/54 700 $aThuraisingham$b Bhavani M$0253930 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910809833003321 996 $aSecurity for service oriented systems$94186714 997 $aUNINA