Self-Sovereign Identity
Title | Self-Sovereign Identity PDF eBook |
Author | Alex Preukschat |
Publisher | Simon and Schuster |
Pages | 502 |
Release | 2021-06-08 |
Genre | Computers |
ISBN | 1617296597 |
"With Christopher Allen, Fabian Vogelsteller, and 52 other leading identity experts"--Cover.
Information Security Practice and Experience
Title | Information Security Practice and Experience PDF eBook |
Author | Chunhua Su |
Publisher | Springer Nature |
Pages | 643 |
Release | 2022-11-18 |
Genre | Computers |
ISBN | 3031212800 |
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Establishing Self Sovereign Identity with Blockchain
Title | Establishing Self Sovereign Identity with Blockchain PDF eBook |
Author | Alan Sherriff |
Publisher | Frontiers Media SA |
Pages | 136 |
Release | 2022-09-29 |
Genre | Technology & Engineering |
ISBN | 2832501214 |
International Conference on Advanced Intelligent Systems for Sustainable Development
Title | International Conference on Advanced Intelligent Systems for Sustainable Development PDF eBook |
Author | Janusz Kacprzyk |
Publisher | Springer Nature |
Pages | 995 |
Release | 2023-06-09 |
Genre | Technology & Engineering |
ISBN | 3031263847 |
This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fields of computer science and engineering. The expected scientific papers covered state-of-the-art technologies, theoretical concepts, standards, product implementation, ongoing research projects, and innovative applications of Sustainable Development. This new technology highlights, the guiding principle of innovation for harnessing frontier technologies and taking full profit from the current technological revolution to reduce gaps that hold back truly inclusive and sustainable development. The fundamental and specific topics are Big Data Analytics, Wireless sensors, IoT, Geospatial technology, Engineering and Mechanization, Modeling Tools, Risk analytics, and preventive systems.
Business Transformation through Blockchain
Title | Business Transformation through Blockchain PDF eBook |
Author | Horst Treiblmaier |
Publisher | Springer |
Pages | 372 |
Release | 2018-12-30 |
Genre | Business & Economics |
ISBN | 3319990586 |
The second volume of this edited collection offers a number of contributions from leading scholars investigating Blockchain and its implications for business. Focusing on the transformation of the overall value chain, the sections cover the foundations of Blockchain and its sustainability, social and legal applications. It features a variety of use cases, from tourism to healthcare. Using a number of theoretical and methodological approaches, this innovative publication aims to further the cause of this ground-breaking technology and its use within information technology, supply chain and wider business management research.
Industrial Networks and Intelligent Systems
Title | Industrial Networks and Intelligent Systems PDF eBook |
Author | Nguyen-Son Vo |
Publisher | Springer Nature |
Pages | 279 |
Release | |
Genre | |
ISBN | 3031673573 |
A Guide to Claims-based Identity and Access Control
Title | A Guide to Claims-based Identity and Access Control PDF eBook |
Author | Dominick Baier |
Publisher | |
Pages | 0 |
Release | 2010 |
Genre | Computer security |
ISBN | 9780735640597 |
As systems have become interconnected and more complicated, programmers needed ways to identify parties across multiple computers. One way to do this was for the parties that used applications on one computer to authenticate to the applications (and/or operating systems) that ran on the other computers. This mechanism is still widely used-for example, when logging on to a great number of Web sites. However, this approach becomes unmanageable when you have many co-operating systems (as is the case, for example, in the enterprise). Therefore, specialized services were invented that would register and authenticate users, and subsequently provide claims about them to interested applications. Some well-known examples are NTLM, Kerberos, Public Key Infrastructure (PKI), and the Security Assertion Markup Language (SAML). Most enterprise applications need some basic user security features. At a minimum, they need to authenticate their users, and many also need to authorize access to certain features so that only privileged users can get to them. Some apps must go further and audit what the user does. On Windows®, these features are built into the operating system and are usually quite easy to integrate into an application. By taking advantage of Windows integrated authentication, you don't have to invent your own authentication protocol or manage a user database. By using access control lists (ACLs), impersonation, and features such as groups, you can implement authorization with very little code. Indeed, this advice applies no matter which OS you are using. It's almost always a better idea to integrate closely with the security features in your OS rather than reinventing those features yourself. But what happens when you want to extend reach to users who don't happen to have Windows accounts? What about users who aren't running Windows at all? More and more applications need this type of reach, which seems to fly in the face of traditional advice. This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates Web applications and services that require identity information about their users.