Innovative Solutions for Access Control Management
Title | Innovative Solutions for Access Control Management PDF eBook |
Author | Malik, Ahmad Kamran |
Publisher | IGI Global |
Pages | 357 |
Release | 2016-05-16 |
Genre | Computers |
ISBN | 1522504494 |
Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user’s information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.
Innovative Solutions for Access Control Management
Title | Innovative Solutions for Access Control Management PDF eBook |
Author | Ahmad Kamran Malik |
Publisher | Information Science Reference |
Pages | 0 |
Release | 2016 |
Genre | Computer security |
ISBN | 9781522504481 |
"This book features a comprehensive discussion on the trending topics and emergent research in IT security and governance, highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management"--
Attribute-Based Access Control
Title | Attribute-Based Access Control PDF eBook |
Author | Vincent C. Hu |
Publisher | Artech House |
Pages | 285 |
Release | 2017-10-31 |
Genre | Computers |
ISBN | 1630814962 |
This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.
Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
Title | Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities PDF eBook |
Author | Ng, Alex Chi Keung |
Publisher | IGI Global |
Pages | 259 |
Release | 2018-01-26 |
Genre | Computers |
ISBN | 1522548297 |
Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization’s identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.
ITNG 2024: 21st International Conference on Information Technology-New Generations
Title | ITNG 2024: 21st International Conference on Information Technology-New Generations PDF eBook |
Author | Shahram Latifi |
Publisher | Springer Nature |
Pages | 513 |
Release | |
Genre | |
ISBN | 3031565991 |
Web Information Systems and Technologies
Title | Web Information Systems and Technologies PDF eBook |
Author | Tim A. Majchrzak |
Publisher | Springer |
Pages | 288 |
Release | 2018-06-18 |
Genre | Computers |
ISBN | 3319935275 |
This book constitutes revised selected papers from the 13th International Conference on Web Information Systems and Technologies, WEBIST 2017, held in Porto, Portugal, in April 2017. The purpose of the WEBIST series of conferences is to bring together researches, engineers and practitioners interested in technological advances and business applications of web-based information systems. The 12 full papers presented in this volume were carefully reviewed and selected from originally 77 paper submissions. They contribute to the understanding of relevant trends of current research on Web information systems and technologies, comprising unified interfaces, Progressive Web Apps (PWAs) as well as a mobile device taxonomy, XML and open data processing, the history of Web engineering, web development for end-users, access control, Web platform assessment, rule engines, and scientific blogging.
Security Management in Mobile Cloud Computing
Title | Security Management in Mobile Cloud Computing PDF eBook |
Author | Munir, Kashif |
Publisher | IGI Global |
Pages | 266 |
Release | 2016-08-01 |
Genre | Computers |
ISBN | 1522506039 |
Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.